Results 11 to 20 of about 39,218 (293)
TORDES-THE NEW SYMMETRIC KEY ALGORITHM [PDF]
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems.
Pawitar Dulari, Ajay Bhushan
doaj +4 more sources
A New Symmetric Key Cryptographic Algorithm using Paley Graphs and ASCII Values [PDF]
The main objective of the study conducted in this article is to introduce a new algorithm of encryption and decryption of a sensitive message after transforming it into a binary message.
Oumazouz Zhour, Karim Driss
doaj +2 more sources
Round key formation algorithm for symmetric block encryption algorithms [PDF]
In this work, an algorithm for generating round keys of any length for symmetric block encryption algorithms was developed. The degree of randomness of the sequences generated using the key and initialization vector was evaluated.
Umarovich Jurayev Gayrat +2 more
doaj +2 more sources
Symmetric Key Cryptography Algorithm for Data Security [PDF]
Ambiguous Multi Symmetric Cryptography AMSC that hide multiple plain texts in a cipher text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed. The proposed method AMSC is a cryptographic primitive that preserves plausible deniability after a cryptographic ...
Tushar Anil Patil +1 more
openalex +2 more sources
The Unified Operation Structure for Symmetric-Key Algorithm [PDF]
In Cloud Computing, information exchange frequently via the Internet and on-demand. Modern Internet protocols support several modes of operation to keep up with varied environments and provide the variant choice, such as SSL and IPSec support multi-mode. The different mode has the different characters.
Kuo-Tsang Huang
openalex +2 more sources
Content Based Double Encryption Algorithm Using Symmetric Key Cryptography
AbstractWith the crucial growth of technology, data security over the network and internet has achieved immense of prominence today and achieving good security is always a talk of a good security method being in place. Therefore, there is need of better security method with better efficiency in order to increase the security and authenticity and to ...
Sourabh Chandra +3 more
openalex +3 more sources
Content Based Symmetric Key Algorithm
AbstractWith the growth in technology, there is always a need of good encryption method which may provide better security and authenticity with lesser computational complexities. Although there are a lot of symmetric key algorithms which are already been proposed, yet we are going to propose a content based symmetric key algorithm.
Manish Shrivastava +2 more
openalex +3 more sources
Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm
Embedding maximum information in a stego-image with minimum change in its appearance has been a major concern in image-based steganography techniques. In this paper, utilizing Genetic algorithm (GA) we have built up a competent optimal robust steganography technique.
Samir Kumar Bandyopadhyay +1 more
openalex +4 more sources
A Secret Key Classification Framework of Symmetric Encryption Algorithm Based on Deep Transfer Learning [PDF]
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities.
Xiaotong Cui +6 more
doaj +2 more sources
Classical and physical security of symmetric key cryptographic algorithms [PDF]
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Attack.
Anubhab Baksi
+5 more sources

