Results 261 to 270 of about 39,218 (293)
Some of the next articles are maybe not open access.
Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
Wireless Personal Communications, 2019Cryptography is one of the most accepted and successful data security methods used at present by most of the organizations. Encrypting the message using natural languages reduces the encryption time and improves the performance. Tamil is a most ancient Dravidian language spoken in the southern part of India.
T. Padmavathy +3 more
openaire +2 more sources
Symmetric Key Generation and Distribution Using Diffie-Hellman Algorithm
2020Transfer of data over a network is one of the most endangered things to look for. As the cases of data leaks and theft are increasing exponentially, there is a need of a secure gateway that can prevent the data from getting misused. In group-oriented application such as video conferencing and multi-player gaming, it is necessary that only the trusted ...
Avanish Kumar +3 more
openaire +2 more sources
RASS — A concurrency based bitwise symmetric key cryptographic algorithm
2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level security with linear time complexity and robust security (two 16 bit keys), and uses optimal time compared ...
Souvik Chatterjee +9 more
openaire +2 more sources
An efficient and effective lossless symmetric key cryptography algorithm for an image
2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014), 2014Modern era is fully dependent on internet communication. Through internet we can transfer data anywhere in the world. The Internet was born of academic efforts to share information; it never strove for the high security process. It plays a vital role in becoming people online, it is easy and effective but dangerous too in terms of data hacking and ...
Niraj Kumar, Sanjay Agrawal
openaire +2 more sources
Design and analysis of an ARQ based symmetric key generation algorithm
2011 - MILCOM 2011 Military Communications Conference, 2011The main idea in this paper is to design and analyze a symmetric key generation algorithm whereby we can strengthen wireless network security. Our main goal is generating a sequence of highly secure secret keys based on an ARQ based transmission mechanism that relies on the statistical independence of channel errors between the attacker and legitimate ...
Shuangqing Wei, Yahya S. Khiabani
openaire +2 more sources
Comprehensive study of symmetric key and asymmetric key encryption algorithms
2017 International Conference on Engineering and Technology (ICET), 2017Cloud computing emerged in the last years to handle systems with large-scale services sharing between vast numbers of users. It provides enormous storage for data and computing power to users over the Internet. There are many issues with the high growth of data. Data security is one of the most important issues in cloud computing.
Shadi Aljawarneh +4 more
openaire +2 more sources
Enhancing MD5 hash algorithm using symmetric key encryption
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019Message integrity and authenticity is crucial with ever increasing network communication. Cryptographic Hash Functions are main building block of message integrity. Many types of hash functions are being used and developed. In this paper, a new keyed hash function is being proposed and described. This proposed algorithm produces a hash code of 128 bits
Aman Shakya, Nitesh Karna
openaire +2 more sources
Bit level symmetric key cryptography using genetic algorithm
2017 7th International Conference on Communication Systems and Network Technologies (CSNT), 2017Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted.
Abhishek Sen, Asoke Nath, Attri Ghosh
openaire +2 more sources
An Improved Symmetric Key Encryption Algorithm for Digital Signature
2010Based on the analysis of the shortage of existing digital signature solution, an improved digital signature solution was proposed according to the advantage of symmetrical key algorithm, asymmetrical key algorithm and unidirectional hashing function. It successfully solved the problem of symmetrical digital signature caused by the difficulty to store ...
openaire +2 more sources
Symmetric key Cryptography using modified DJSSA symmetric key algorithm
International Journal of Scientific Research, 2012Radadiya Jitendra P +2 more
openaire +2 more sources

