Results 251 to 260 of about 41,294 (296)
Some of the next articles are maybe not open access.

A New Symmetric Key Cryptography Algorithm Using Extended MSA Method: DJSA Symmetric Key Algorithm

2011 International Conference on Communication Systems and Network Technologies, 2011
In the present work the authors introduced a new symmetric key cryptographic method for encryption as well as decryption of any file such as binary file, text file or any other file. Nath et. al. (1) developed an algorithm called MSA for encryption and decryption of any file using a random key square matrix containing 256 elements.
Dripto Chatterjee   +3 more
openaire   +1 more source

Double Chaining Algorithm: A secure symmetric-key encryption algorithm

2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), 2016
Technology is a key of innovation in any aspect of this modern era. In every technology, data becomes the most important asset to be protected. Many encryption algorithms are widely available and used in information security. Encryption can provide secure information across platform.
Daniar Heri Kurniawan, Rinaldi Munir
openaire   +1 more source

Multi-cipher Encrypter Using Symmetric Key Algorithms

2021
Data confidentiality is one of the primary concerns for all organizations as well as individuals all around the world. With the advent of technology and easier access of attacking tools and algorithms on the internet, the last decade saw an exponential rise in the number of attackers, working independently as well as in structured organizations.
Vaibhav Tripathi   +3 more
openaire   +1 more source

New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm

2011 International Conference on Communication Systems and Network Technologies, 2011
In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods[1,2,3,4] where they have used some randomized key matrix for encryption and decryption
Neeraj Khanna   +5 more
openaire   +1 more source

Performance Analysis of Symmetric Key Cryptographic Algorithms

2018 International Conference on Communication and Signal Processing (ICCSP), 2018
Data's security being important aspect of the today's internet is gaining more importance day by day. With the increase in online data exchange, transactions and payments; secure payment and secure data transfers have become an area of concern.
Shashidhara Vyakaranal, Shivaraj Kengond
openaire   +1 more source

Symmetric Key Algorithm in Computer security: A Review

2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2020
The primary objective of any computer security algorithm is that the untrusted third party should not be able to read or gain knowledge about the data being communicated or stored in different internet applications or storage platforms. One of the most prevalent fiestel network block cipher is Blowfish, which is capable to safeguard the protected data ...
R Anusha   +3 more
openaire   +1 more source

A New Symmetric Key Quantum Cryptographic Algorithm

2007 National Radio Science Conference, 2007
Based on the principles of both classical and quantum computation primitives, a new symmetric key quantum cryptographic algorithm is proposed. This algorithm can be used to encrypt classical binary messages as well as quantum information. Encryption and decryption are implemented by the aid of classical and quantum computation which can be realized by ...
Hassan M. Elkamchochi   +2 more
openaire   +1 more source

Symmetric key algorithm using vernam cipher: VSA

2016 International Conference on Inventive Computation Technologies (ICICT), 2016
Now a days people are dependent on the internet so security of data becomes a major issue including integrity. Data security is a very important aspect in this digital world. Cryptography came into the picture to provide data security. In cryptography, cryptosystem means a suite of cryptographic algorithms expected to execute a specific security most ...
S. S. Hatkar, Bhagyashri K. Pawar
openaire   +1 more source

Cognitive Symmetric Key Cryptographic Algorithm

2012
Today, Cryptographic schemes play a major role in storage, retrieval and transfer of data and code in a secured manner. The major factors which determine the efficiency of a cryptographic system are computational speed, level of security provided, cost effectiveness and key size of the algorithm. Choosing the optimal bit size for keys in encryption and
Y. R. A. Kannan   +2 more
openaire   +1 more source

An integrated symmetric key cryptography algorithm using Generalised Modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm

2011 World Congress on Information and Communication Technologies, 2011
In the present work the authors have introduced an integrated symmetric key cryptographic method DJMNA which combine two independent methods (i) Modified Generalized Vernam Cipher (MGVC) method and (ii) DJSA method which is an extension of MSA method. The Generalized Vernam Cipher algorithm extends text encryption to any type of data encryption.
Debanjan Das   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy