Results 21 to 30 of about 41,294 (296)

A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre

open access: yesCybernetics and Information Technologies, 2023
In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key.
Cherukuri Aswani Kumar   +9 more
doaj   +1 more source

Secure key-sharing algorithm based on smart grid

open access: yes网络与信息安全学报, 2021
Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue. Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the ...
GU Wei, REN Yongjun, SHEN Jian
doaj   +3 more sources

A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module

open access: yesSensors, 2021
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we ...
Kyeeun Kim   +7 more
doaj   +1 more source

Design of Secure Chatting Application with End to End Encryption for Android Platform

open access: yesIraqi Journal for Computers and Informatics, 2017
In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques.
Ammar Ali, Ali Sagheer
doaj   +3 more sources

FCNN Model for Diagnosis and Analysis of Symmetric Key Cryptosystem

open access: yesIraqi Journal for Computer Science and Mathematics, 2022
An important part of a cryptosystem is a cryptographic algorithm, which protects unauthorized attackers from obtaining private and sensitive data. This study is a research project on identifying cryptographic algorithms using deep learning techniques ...
Ali H. Alwan, Ali. H. Kashmar
doaj   +1 more source

An improved NFC device authentication protocol.

open access: yesPLoS ONE, 2021
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the ...
He-Jun Lu, Dui Liu
doaj   +1 more source

Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2019
In cryptography, we know the symmetric key algorithms and asymmetric key algorithms. We know that the asymmetric key algorithm is more secure than the symmetric key algorithm. Affine Cipher uses a symmetric key algorithm.
Maxrizal Maxrizal   +1 more
doaj   +1 more source

Enhanced RC5 Algorithm using Parallel Computing for Communication Networks

open access: yesIngeniería y Ciencia, 2019
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length.
David Fabián Cevallos Salas
doaj   +1 more source

Using Simon's algorithm to attack symmetric-key cryptographic primitives [PDF]

open access: yesQuantum Information and Computation, 2017
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon’s algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery ...
Santoli, T., Schaffner, C.
openaire   +3 more sources

Secure File Storage On Cloud Using Hybrid Cryptography

open access: yesJournal of Informatics and Web Engineering, 2022
As technology today is moving forward exponentially, data exchange over the Internet has become a daily routine. Furthermore, businesses are growing internationally and offices are being established in a variety of different places throughout the world ...
Jian-Foo Lai, Swee-Huay Heng
doaj   +1 more source

Home - About - Disclaimer - Privacy