Results 241 to 250 of about 383,874 (285)
Some of the next articles are maybe not open access.

A New Symmetric Key Quantum Cryptographic Algorithm

2007 National Radio Science Conference, 2007
Based on the principles of both classical and quantum computation primitives, a new symmetric key quantum cryptographic algorithm is proposed. This algorithm can be used to encrypt classical binary messages as well as quantum information. Encryption and decryption are implemented by the aid of classical and quantum computation which can be realized by ...
Hassan M. Elkamchochi   +2 more
openaire   +1 more source

New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm

2011 International Conference on Communication Systems and Network Technologies, 2011
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods[1,2,3,4] where they have used some randomized key matrix for encryption and decryption
Neeraj Khanna   +5 more
openaire   +1 more source

Performance Analysis of Symmetric Key Cryptographic Algorithms

2018 International Conference on Communication and Signal Processing (ICCSP), 2018
Data's security being important aspect of the today's internet is gaining more importance day by day. With the increase in online data exchange, transactions and payments; secure payment and secure data transfers have become an area of concern.
Shashidhara Vyakaranal, Shivaraj Kengond
openaire   +1 more source

Double Chaining Algorithm: A secure symmetric-key encryption algorithm

2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), 2016
Technology is a key of innovation in any aspect of this modern era. In every technology, data becomes the most important asset to be protected. Many encryption algorithms are widely available and used in information security. Encryption can provide secure information across platform.
Daniar Heri Kurniawan, Rinaldi Munir
openaire   +1 more source

Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm

Wireless Personal Communications, 2019
Cryptography is one of the most accepted and successful data security methods used at present by most of the organizations. Encrypting the message using natural languages reduces the encryption time and improves the performance. Tamil is a most ancient Dravidian language spoken in the southern part of India.
R. Geetha   +3 more
openaire   +1 more source

RASS — A concurrency based bitwise symmetric key cryptographic algorithm

2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016
The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level security with linear time complexity and robust security (two 16 bit keys), and uses optimal time compared ...
Abhriya Roy   +9 more
openaire   +1 more source

Cognitive Symmetric Key Cryptographic Algorithm

2012
Today, Cryptographic schemes play a major role in storage, retrieval and transfer of data and code in a secured manner. The major factors which determine the efficiency of a cryptographic system are computational speed, level of security provided, cost effectiveness and key size of the algorithm. Choosing the optimal bit size for keys in encryption and
Y. R. A. Kannan   +2 more
openaire   +1 more source

Design and analysis of an ARQ based symmetric key generation algorithm

2011 - MILCOM 2011 Military Communications Conference, 2011
The main idea in this paper is to design and analyze a symmetric key generation algorithm whereby we can strengthen wireless network security. Our main goal is generating a sequence of highly secure secret keys based on an ARQ based transmission mechanism that relies on the statistical independence of channel errors between the attacker and legitimate ...
Yahya S. Khiabani, Shuangqing Wei
openaire   +1 more source

Enhancing MD5 hash algorithm using symmetric key encryption

Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Message integrity and authenticity is crucial with ever increasing network communication. Cryptographic Hash Functions are main building block of message integrity. Many types of hash functions are being used and developed. In this paper, a new keyed hash function is being proposed and described. This proposed algorithm produces a hash code of 128 bits
Aman Shakya, Nitesh Karna
openaire   +1 more source

Symmetric Key Cryptographic Algorithm Based on Logarithmic Function

2015 Fifth International Conference on Communication Systems and Network Technologies, 2015
Current era is cyber era, mostly people are dependent on online task, to keep the message secure from the hackers and crackers there is need of strong cryptography. Hackers are becoming intelligent day by day to attack on data as per their experience gain. Cryptography is a private communication in the public world. A cryptosystem should be secure even
Preksha Nema, M.A. Rizvi
openaire   +1 more source

Home - About - Disclaimer - Privacy