TORDES-THE NEW SYMMETRIC KEY ALGORITHM [PDF]
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems.
Pawitar Dulari, Ajay Bhushan
doaj +1 more source
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang +5 more
doaj +1 more source
A New Symmetric Key Cryptographic Algorithm using Paley Graphs and ASCII Values [PDF]
The main objective of the study conducted in this article is to introduce a new algorithm of encryption and decryption of a sensitive message after transforming it into a binary message.
Oumazouz Zhour, Karim Driss
doaj +1 more source
Anti-attacks encryption algorithm based on DNA computing and data encryption standard
Data Encryption Standard (DES) is the first 56-bits secret-key standard that is widely used as a symmetric-key 64-bits block encryption/decryption algorithm. Unfortunately, the rapid increase in computing power makes it possible to find the required bits
Tarek Hagras +2 more
doaj +1 more source
QKD Based on Symmetric Entangled Bernstein-Vazirani
This paper introduces a novel entanglement-based QKD protocol, that makes use of a modified symmetric version of the Bernstein-Vazirani algorithm, in order to achieve secure and efficient key distribution.
Michael Ampatzis, Theodore Andronikos
doaj +1 more source
3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj +1 more source
A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre
In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key.
Cherukuri Aswani Kumar +9 more
doaj +1 more source
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we ...
Kyeeun Kim +7 more
doaj +1 more source
Design of Secure Chatting Application with End to End Encryption for Android Platform
In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques.
Ammar Hammad Ali1, Ali Makki Sagheer
doaj +3 more sources
Secure key-sharing algorithm based on smart grid
Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue. Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the ...
GU Wei, REN Yongjun, SHEN Jian
doaj +3 more sources

