Results 1 to 10 of about 383,725 (138)

TORDES-THE NEW SYMMETRIC KEY ALGORITHM [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems.
Pawitar Dulari, Ajay Bhushan
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

A New Symmetric Key Cryptographic Algorithm using Paley Graphs and ASCII Values [PDF]

open access: yesE3S Web of Conferences, 2021
The main objective of the study conducted in this article is to introduce a new algorithm of encryption and decryption of a sensitive message after transforming it into a binary message.
Oumazouz Zhour, Karim Driss
doaj   +1 more source

Anti-attacks encryption algorithm based on DNA computing and data encryption standard

open access: yesAlexandria Engineering Journal, 2022
Data Encryption Standard (DES) is the first 56-bits secret-key standard that is widely used as a symmetric-key 64-bits block encryption/decryption algorithm. Unfortunately, the rapid increase in computing power makes it possible to find the required bits
Tarek Hagras   +2 more
doaj   +1 more source

QKD Based on Symmetric Entangled Bernstein-Vazirani

open access: yesEntropy, 2021
This paper introduces a novel entanglement-based QKD protocol, that makes use of a modified symmetric version of the Bernstein-Vazirani algorithm, in order to achieve secure and efficient key distribution.
Michael Ampatzis, Theodore Andronikos
doaj   +1 more source

3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based

open access: yesIEEE Access, 2020
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj   +1 more source

A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre

open access: yesCybernetics and Information Technologies, 2023
In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key.
Cherukuri Aswani Kumar   +9 more
doaj   +1 more source

A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module

open access: yesSensors, 2021
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we ...
Kyeeun Kim   +7 more
doaj   +1 more source

Design of Secure Chatting Application with End to End Encryption for Android Platform

open access: yesIraqi Journal for Computers and Informatics, 2017
In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques.
Ammar Hammad Ali1, Ali Makki Sagheer
doaj   +3 more sources

Secure key-sharing algorithm based on smart grid

open access: yes网络与信息安全学报, 2021
Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue. Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the ...
GU Wei, REN Yongjun, SHEN Jian
doaj   +3 more sources

Home - About - Disclaimer - Privacy