Results 261 to 270 of about 41,294 (296)
Some of the next articles are maybe not open access.
Symmetric Key Cryptographic Algorithm Based on Logarithmic Function
2015 Fifth International Conference on Communication Systems and Network Technologies, 2015Current era is cyber era, mostly people are dependent on online task, to keep the message secure from the hackers and crackers there is need of strong cryptography. Hackers are becoming intelligent day by day to attack on data as per their experience gain. Cryptography is a private communication in the public world. A cryptosystem should be secure even
Preksha Nema, M.A. Rizvi
openaire +1 more source
Proposed symmetric key cryptography algorithm for data security
2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), 2016In the race towards the pinnacle of evolution and development, few things have come out on top and become the crucial weapon or path towards success. Information is one such thing. With the increased importance & plausible struggles over the accumulation of information to secure dominance & success, the concept of Information Security has emerged ...
Abhishek Anand +3 more
openaire +1 more source
Enhancing MD5 hash algorithm using symmetric key encryption
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019Message integrity and authenticity is crucial with ever increasing network communication. Cryptographic Hash Functions are main building block of message integrity. Many types of hash functions are being used and developed. In this paper, a new keyed hash function is being proposed and described. This proposed algorithm produces a hash code of 128 bits
Aman Shakya, Nitesh Karna
openaire +1 more source
Bit level symmetric key cryptography using genetic algorithm
2017 7th International Conference on Communication Systems and Network Technologies (CSNT), 2017Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted.
Abhishek Sen, Attri Ghosh, Asoke Nath
openaire +1 more source
Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
Wireless Personal Communications, 2019Cryptography is one of the most accepted and successful data security methods used at present by most of the organizations. Encrypting the message using natural languages reduces the encryption time and improves the performance. Tamil is a most ancient Dravidian language spoken in the southern part of India.
R. Geetha +3 more
openaire +1 more source
A New Symmetric Key Encryption Algorithm With Higher Performance
2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 2019In this era of information technology, information security is a major concern. To address the challenges of data security, cryptography is used for storage as well as for the communication of data. A cryptographic algorithm has two main performance characteristics: the ability to secure data against different attacks and the processing speed.
Abid Murtaza +2 more
openaire +1 more source
Symmetric Key Generation and Distribution Using Diffie-Hellman Algorithm
2020Transfer of data over a network is one of the most endangered things to look for. As the cases of data leaks and theft are increasing exponentially, there is a need of a secure gateway that can prevent the data from getting misused. In group-oriented application such as video conferencing and multi-player gaming, it is necessary that only the trusted ...
Kaustubh Purohit +3 more
openaire +1 more source
RASS — A concurrency based bitwise symmetric key cryptographic algorithm
2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level security with linear time complexity and robust security (two 16 bit keys), and uses optimal time compared ...
Abhriya Roy +9 more
openaire +1 more source
Symmetric key Cryptography using modified DJSSA symmetric key algorithm
International Journal of Scientific Research, 2012Rakholia Kalpesh R +2 more
openaire +1 more source
Fourier Masking Encryption Algorithm for Polyalphabetic Symmetric Key Cryptography
Cryptography is the art of keepingmessage secret by different methods. In this paper,a new algorithm has been proposed for symmetrickey polyalphabetic data encryption, namelyFourier Masking Encryption Algorithm (FMEA).The concept of Fourier series is exploitedefficiently to generate the random key sequencefrom a given password, as randomness is the ...Jahangir, Nadim, Chowdhury, Ahsan Raja
openaire +1 more source

