Results 11 to 20 of about 39,218 (293)

TORDES-THE NEW SYMMETRIC KEY ALGORITHM [PDF]

open access: diamondمجلة جامعة الانبار للعلوم الصرفة, 2012
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems.
Pawitar Dulari, Ajay Bhushan
doaj   +4 more sources

A New Symmetric Key Cryptographic Algorithm using Paley Graphs and ASCII Values [PDF]

open access: diamondE3S Web of Conferences, 2021
The main objective of the study conducted in this article is to introduce a new algorithm of encryption and decryption of a sensitive message after transforming it into a binary message.
Oumazouz Zhour, Karim Driss
doaj   +2 more sources

Round key formation algorithm for symmetric block encryption algorithms [PDF]

open access: diamondE3S Web of Conferences
In this work, an algorithm for generating round keys of any length for symmetric block encryption algorithms was developed. The degree of randomness of the sequences generated using the key and initialization vector was evaluated.
Umarovich Jurayev Gayrat   +2 more
doaj   +2 more sources

Symmetric Key Cryptography Algorithm for Data Security [PDF]

open access: goldInternational Journal of Trend in Scientific Research and Development, 2018
Ambiguous Multi Symmetric Cryptography AMSC that hide multiple plain texts in a cipher text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed. The proposed method AMSC is a cryptographic primitive that preserves plausible deniability after a cryptographic ...
Tushar Anil Patil   +1 more
openalex   +2 more sources

The Unified Operation Structure for Symmetric-Key Algorithm [PDF]

open access: bronzeComputer Science & Information Technology ( CS & IT ), 2012
In Cloud Computing, information exchange frequently via the Internet and on-demand. Modern Internet protocols support several modes of operation to keep up with varied environments and provide the variant choice, such as SSL and IPSec support multi-mode. The different mode has the different characters.
Kuo-Tsang Huang
openalex   +2 more sources

Content Based Double Encryption Algorithm Using Symmetric Key Cryptography

open access: goldProcedia Computer Science, 2015
AbstractWith the crucial growth of technology, data security over the network and internet has achieved immense of prominence today and achieving good security is always a talk of a good security method being in place. Therefore, there is need of better security method with better efficiency in order to increase the security and authenticity and to ...
Sourabh Chandra   +3 more
openalex   +3 more sources

Content Based Symmetric Key Algorithm

open access: goldProcedia Computer Science, 2016
AbstractWith the growth in technology, there is always a need of good encryption method which may provide better security and authenticity with lesser computational complexities. Although there are a lot of symmetric key algorithms which are already been proposed, yet we are going to propose a content based symmetric key algorithm.
Manish Shrivastava   +2 more
openalex   +3 more sources

Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm

open access: hybridINTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 2013
Embedding maximum information in a stego-image with minimum change in its appearance has been a major concern in image-based steganography techniques. In this paper, utilizing Genetic algorithm (GA) we have built up a competent optimal robust steganography technique.
Samir Kumar Bandyopadhyay   +1 more
openalex   +4 more sources

A Secret Key Classification Framework of Symmetric Encryption Algorithm Based on Deep Transfer Learning [PDF]

open access: goldApplied Sciences, 2023
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities.
Xiaotong Cui   +6 more
doaj   +2 more sources

Classical and physical security of symmetric key cryptographic algorithms [PDF]

open access: hybrid2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Attack.
Anubhab Baksi
  +5 more sources

Home - About - Disclaimer - Privacy