Results 21 to 30 of about 39,218 (293)
QKD Based on Symmetric Entangled Bernstein-Vazirani
This paper introduces a novel entanglement-based QKD protocol, that makes use of a modified symmetric version of the Bernstein-Vazirani algorithm, in order to achieve secure and efficient key distribution.
Michael Ampatzis, Theodore Andronikos
doaj +1 more source
3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj +1 more source
A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre
In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key.
Cherukuri Aswani Kumar +9 more
doaj +1 more source
Secure key-sharing algorithm based on smart grid
Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue. Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the ...
GU Wei, REN Yongjun, SHEN Jian
doaj +3 more sources
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we ...
Kyeeun Kim +7 more
doaj +1 more source
Design of Secure Chatting Application with End to End Encryption for Android Platform
In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques.
Ammar Ali, Ali Sagheer
doaj +3 more sources
FCNN Model for Diagnosis and Analysis of Symmetric Key Cryptosystem
An important part of a cryptosystem is a cryptographic algorithm, which protects unauthorized attackers from obtaining private and sensitive data. This study is a research project on identifying cryptographic algorithms using deep learning techniques ...
Ali H. Alwan, Ali. H. Kashmar
doaj +1 more source
An improved NFC device authentication protocol.
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj +1 more source
Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys
In cryptography, we know the symmetric key algorithms and asymmetric key algorithms. We know that the asymmetric key algorithm is more secure than the symmetric key algorithm. Affine Cipher uses a symmetric key algorithm.
Maxrizal Maxrizal +1 more
doaj +1 more source
Enhanced RC5 Algorithm using Parallel Computing for Communication Networks
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length.
David Fabián Cevallos Salas
doaj +1 more source

