Results 11 to 20 of about 41,294 (296)

A New Encryption Algorithm Using Symmetric Key Cryptography

open access: diamondInternational Journal of Engineering & Technology, 2018
Cryptographic techniques are primarily divided into two categories and they are: Symmetric key type and Asymmetric key type. In Symmetric key cryptography, during the process of encryption and decryption, the same key will be used. This is a conventional method of Cryptography.
Gowtham Tumati   +3 more
openalex   +3 more sources

Symmetric Key Cryptography Algorithm for Data Security [PDF]

open access: diamondInternational Journal of Trend in Scientific Research and Development, 2018
Tushar Anil Patil   +1 more
openalex   +2 more sources

Content Based Double Encryption Algorithm Using Symmetric Key Cryptography

open access: diamondProcedia Computer Science, 2015
AbstractWith the crucial growth of technology, data security over the network and internet has achieved immense of prominence today and achieving good security is always a talk of a good security method being in place. Therefore, there is need of better security method with better efficiency in order to increase the security and authenticity and to ...
Sourabh Chandra   +3 more
openalex   +2 more sources

Improving the MapReduce Performance using Symmetric Key Algorithm [PDF]

open access: diamondInternational Journal of Science and Research (IJSR), 2021
G. Brindha, M. Gobi
openalex   +2 more sources

A Symmetrical key Cryptography Analysis using Blowfish Algorithm

open access: bronzeInternational Journal of Engineering Research and, 2016
Priya Thakur, Anurag Rana
openalex   +2 more sources

A New Symmetric Key Cryptographic Algorithm using Paley Graphs and ASCII Values [PDF]

open access: yesE3S Web of Conferences, 2021
The main objective of the study conducted in this article is to introduce a new algorithm of encryption and decryption of a sensitive message after transforming it into a binary message.
Oumazouz Zhour, Karim Driss
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Anti-attacks encryption algorithm based on DNA computing and data encryption standard

open access: yesAlexandria Engineering Journal, 2022
Data Encryption Standard (DES) is the first 56-bits secret-key standard that is widely used as a symmetric-key 64-bits block encryption/decryption algorithm. Unfortunately, the rapid increase in computing power makes it possible to find the required bits
Tarek Hagras   +2 more
doaj   +1 more source

QKD Based on Symmetric Entangled Bernstein-Vazirani

open access: yesEntropy, 2021
This paper introduces a novel entanglement-based QKD protocol, that makes use of a modified symmetric version of the Bernstein-Vazirani algorithm, in order to achieve secure and efficient key distribution.
Michael Ampatzis, Theodore Andronikos
doaj   +1 more source

3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based

open access: yesIEEE Access, 2020
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy