Results 251 to 260 of about 39,218 (293)
Some of the next articles are maybe not open access.

Multi-cipher Encrypter Using Symmetric Key Algorithms

2021
Data confidentiality is one of the primary concerns for all organizations as well as individuals all around the world. With the advent of technology and easier access of attacking tools and algorithms on the internet, the last decade saw an exponential rise in the number of attackers, working independently as well as in structured organizations.
Akriti Yadav   +3 more
openaire   +2 more sources

Double Chaining Algorithm: A secure symmetric-key encryption algorithm

2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), 2016
Technology is a key of innovation in any aspect of this modern era. In every technology, data becomes the most important asset to be protected. Many encryption algorithms are widely available and used in information security. Encryption can provide secure information across platform.
Daniar Heri Kurniawan, Rinaldi Munir
openaire   +2 more sources

A non-Symmetric Key Dependent for Reverse Encryption Algorithm (REA) [PDF]

open access: possible2020 16th International Computer Engineering Conference (ICENCO), 2020
Cryptography is used essentially for protecting information by using the encryption algorithms. It is assumed that the encryption algorithm must have minimal requirements for securing any such information. Therefore, A poor structure of any encryption algorithm can cause insecure product cipher and then puts the highly sensitive information or ...
Samia Sorour   +2 more
openaire   +1 more source

A New Symmetric Key Encryption Algorithm With Higher Performance

2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 2019
In this era of information technology, information security is a major concern. To address the challenges of data security, cryptography is used for storage as well as for the communication of data. A cryptographic algorithm has two main performance characteristics: the ability to secure data against different attacks and the processing speed.
Syed Jahanzeb Hussain Pirzada   +2 more
openaire   +2 more sources

Cognitive Symmetric Key Cryptographic Algorithm

2012
Today, Cryptographic schemes play a major role in storage, retrieval and transfer of data and code in a secured manner. The major factors which determine the efficiency of a cryptographic system are computational speed, level of security provided, cost effectiveness and key size of the algorithm. Choosing the optimal bit size for keys in encryption and
Y. R. A. Kannan   +2 more
openaire   +2 more sources

Symmetric Key Cryptographic Algorithm Based on Logarithmic Function

2015 Fifth International Conference on Communication Systems and Network Technologies, 2015
Current era is cyber era, mostly people are dependent on online task, to keep the message secure from the hackers and crackers there is need of strong cryptography. Hackers are becoming intelligent day by day to attack on data as per their experience gain. Cryptography is a private communication in the public world. A cryptosystem should be secure even
Preksha Nema, Murtaza Abbas Rizvi
openaire   +2 more sources

Evaluation of computing resources consumption of selected symmetric-key algorithms

Journal of Computer Science and Its Application, 2020
Data security is becoming more important as data driven activities rose to cloud computing and big data. This concept been addressed using various computing devices and methods including encryption algorithms. Despite the benefit of various encryption methods, limited computing resources and time have hindered the deployment of data security through ...
A.O. Adesina   +3 more
openaire   +2 more sources

Symmetric key algorithm using vernam cipher: VSA

2016 International Conference on Inventive Computation Technologies (ICICT), 2016
Now a days people are dependent on the internet so security of data becomes a major issue including integrity. Data security is a very important aspect in this digital world. Cryptography came into the picture to provide data security. In cryptography, cryptosystem means a suite of cryptographic algorithms expected to execute a specific security most ...
S. S. Hatkar, Bhagyashri K. Pawar
openaire   +2 more sources

Proposed symmetric key cryptography algorithm for data security

2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), 2016
In the race towards the pinnacle of evolution and development, few things have come out on top and become the crucial weapon or path towards success. Information is one such thing. With the increased importance & plausible struggles over the accumulation of information to secure dominance & success, the concept of Information Security has emerged ...
Abhishek Raj   +3 more
openaire   +2 more sources

An integrated symmetric key cryptography algorithm using Generalised Modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm

2011 World Congress on Information and Communication Technologies, 2011
In the present work the authors have introduced an integrated symmetric key cryptographic method DJMNA which combine two independent methods (i) Modified Generalized Vernam Cipher (MGVC) method and (ii) DJSA method which is an extension of MSA method. The Generalized Vernam Cipher algorithm extends text encryption to any type of data encryption.
Asoke Nath   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy