Results 11 to 20 of about 383,874 (285)
Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives [PDF]
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives ...
Santoli, Thomas, Schaffner, Christian
core +5 more sources
Classical and physical security of symmetric key cryptographic algorithms [PDF]
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Attack.
openaire +2 more sources
A Comparative Study of Symmetric Key Algorithms
Security is the prime issue while transferring information across a network. Therefore, the concept of encryption and decryption of information was introduced. Cryptography is a technique of converting plain information into encrypted text. This is done so that only legitimate users can access the data being sent.
Dipu Jo George, Tony Thomas
openaire +1 more source
PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices [PDF]
With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data. Strong but efficient cryptography solutions must be employed to deal with this problem, along with methods to standardize secure communications between these devices.
Saraiva, Daniel +5 more
openaire +5 more sources
FCNN Model for Diagnosis and Analysis of Symmetric Key Cryptosystem
An important part of a cryptosystem is a cryptographic algorithm, which protects unauthorized attackers from obtaining private and sensitive data. This study is a research project on identifying cryptographic algorithms using deep learning techniques ...
Ali H. Alwan, Ali. H. Kashmar
doaj +1 more source
Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys
In cryptography, we know the symmetric key algorithms and asymmetric key algorithms. We know that the asymmetric key algorithm is more secure than the symmetric key algorithm. Affine Cipher uses a symmetric key algorithm.
Maxrizal Maxrizal +1 more
doaj +1 more source
An improved NFC device authentication protocol.
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj +1 more source
Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length.
David Fabián Cevallos Salas
doaj +1 more source
Symmetric Key Cryptography Algorithm for Data Security [PDF]
Ambiguous Multi Symmetric Cryptography AMSC that hide multiple plain texts in a cipher text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed. The proposed method AMSC is a cryptographic primitive that preserves plausible deniability after a cryptographic ...
Tushar Anil Patil +1 more
openaire +1 more source
Simpler and Better Algorithms for Minimum-Norm Load Balancing [PDF]
Recently, Chakrabarty and Swamy (STOC 2019) introduced the minimum-norm load-balancing problem on unrelated machines, wherein we are given a set J of jobs that need to be scheduled on a set of m unrelated machines, and a monotone, symmetric norm; We seek
Chakrabarty, Deeparnab, Swamy, Chaitanya
core +2 more sources

