925 results on '"Triple DES"'
Search Results
2. Lightweight Cryptography
- Author
-
Tehranipoor, Mark, Pundir, Nitin, Vashistha, Nidish, Farahmandi, Farimah, Tehranipoor, Mark, Pundir, Nitin, Vashistha, Nidish, and Farahmandi, Farimah
- Published
- 2023
- Full Text
- View/download PDF
3. A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data.
- Author
-
Amma N.G., Bhuvaneswari and Kapoor, Jitaksh
- Subjects
- *
DATA encryption , *ENCRYPTION protocols , *DATA security , *CRYPTOGRAPHY , *DIGITIZATION , *ORIGINALITY - Abstract
Our world is making its way toward complete digitization, with more and more data going to the Internet. Thus, the security of the data has become one of our utmost responsibilities. Strong and secure cryptography and steganography techniques have become the need of the hour to defend against modern adversaries. In this article, a novel scrambled data hiding approach is proposed to secure the sensitive information used in communications. The lacuna in the existing data hiding approaches is the loss of originality in the sensitive data to be attached, leading to poor information quality. This issue is addressed in the proposed approach by encrypting the data using the triple data encryption standard (DES) algorithm. The scrambled data are hidden in the audio file using the least significant bit (LSB) embedding. Experiments were conducted, and the proposed approach secured the sensitive information significantly without the loss of information quality. Furthermore, the secured information is retrieved by only the authenticated users with high quality. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Survey in Finding the Best Algorithm for Data Analysis of Privacy Preservation in Healthcare
- Author
-
Evangelin, D., Venkatesan, R., Ramalakshmi, K., Cornelia, S., Padmhavathi, J., Xhafa, Fatos, Series Editor, Hemanth, D. Jude, editor, Kumar, V. D. Ambeth, editor, Malathi, S., editor, Castillo, Oscar, editor, and Patrut, Bogdan, editor
- Published
- 2020
- Full Text
- View/download PDF
5. Propuestas de mejora DES y Triple DES a lo largo de su historia.
- Author
-
Ximena Ahumada-Urquijo, Laura, Valencia-Ortiz, James, Fernanda Velandia-Beltrán, Maria, and Brayan Mendoza-Calderón, John
- Subjects
- *
DATA encryption , *ENCRYPTION protocols , *SECURITY systems , *INFORMATION storage & retrieval systems , *ALGORITHMS - Abstract
This paper provides an in-depth analysis of the history of DES and its successor Triple DES in the security market and secure data encryption. The different variations and improvements that have been proposed in research related to the uses of Triple DES since before it was approved as a standard for data encryption worldwide are studied. It is also important to mention that the proposals collected and analyzed are from different parts of the world, which solidifies the level of research carried out, due to the variety of sources found. In this way, the history of this algorithm is traced in order to provide the reader with a broad perspective on how it works and the different uses that have been made of it. Finally, it's determined that DES and 3-DES have been algorithms widely used in security information systems, but currently they are vulnerable to different attacks such as brute force and differential cryptanalysis, because of this it is suggested the use of other algorithms, for instance AES, or to include improvements in the DES and 3-DES implementation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
6. Message Authentication and Source Privacy in Wi-Fi
- Author
-
Gnana Sambandam, K., Kamalanaban, Ethala, Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Advisory editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, Suresh, L. Padma, editor, and Panigrahi, Bijaya Ketan, editor
- Published
- 2016
- Full Text
- View/download PDF
7. A Symmetric Key Cryptographic Technique Based on Frame Rotation of an Even Ordered Square Matrix
- Author
-
Goswami (Ghosh), Joyita, Paul, Manas, Kacprzyk, Janusz, Series editor, Mandal, J. K., editor, Satapathy, Suresh Chandra, editor, Kumar Sanyal, Manas, editor, Sarkar, Partha Pratim, editor, and Mukhopadhyay, Anirban, editor
- Published
- 2015
- Full Text
- View/download PDF
8. An efficient method for fault tolerance in cloud environment using encryption and classification.
- Author
-
Gupta, Vipul, Kaur, Bikram Pal, and Jangra, Surender
- Subjects
- *
FAULT-tolerant computing , *CLOUDS & the environment , *SUPPORT vector machines , *DATA transmission systems , *CLOUD computing - Abstract
Cloud computing may be defined as management and provision of resources, software, application and information as services over the cloud which are dynamically scalable. Fault tolerance includes all the techniques necessary for robustness and dependability. The main advantages of using fault tolerance in cloud computing include failure recovery, lower costs and improved standards in performance. Even though the benefits are immeasurable, the element of risk on user applications due to failure remains a major drawback. So our suggested technique utilizes the effective fault tolerance method with the encryption algorithm. To improve the security of the recommended technique, triple-DES encryption algorithm is employed before the data transmission. For the transmission of encrypted data, the implemented method selects the minimum fault tolerance node. So the recommended technique utilizes the effective classification technique. Here, improved support vector machine (ISVM) classifier is used to classify the nodes based on its feature value and the content similarity each node. The proposed ISVM helps in predicting the faults if available, earlier before it occurs. The various parameters considered in our proposed system are accuracy, service reliability and availability. In the proposed method, the accuracy value of the fault tolerance is 79% which is better than in the existing method. The proposed method will be implemented in JAVA with CloudSim. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
9. Intelligent TRIPLE DES with N Round Based on Genetic Algorithm.
- Author
-
Haithem, Mazin and Rahman Lateef, Rana Abdul
- Subjects
- *
GENETIC algorithms , *PRIVACY , *CIPHER & telegraph codes , *CRYPTOGRAPHY , *INFORMATION technology security - Abstract
This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or broken to crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
10. Conceal Classified Data by using Xiao Steganography.
- Author
-
Shruti
- Subjects
DATA encryption software ,CRYPTOGRAPHY ,DATA analysis ,ALGORITHMS ,HASHING ,ENCODING - Abstract
Steganography is a science of hiding message in such a way that existing message should be invisible to anyone apart from sender and receiver. As we deal with several algorithm that accord with text encryption. There has been research carried out on encryption digital images video and audio files. In this paper, Xiao tool is used for implementing Steganography for hiding data from intruder. This tool is highly potent, because as with this secret data will be hidden in any cover image and then further it will be encrypted by using different algorithm such as SHA, DES and Triple DES . We can use hashing algorithm for encrypting secrete data. For encoding purposes password will be assigned for double security. So that genuine person will be able to access particular Data. Now at decoding end when user want to extract hidden data then this will be possible only by assigning password which is given by encoder while hiding. Other than this I m comparing different Steganography tools on the basis of some parameters which are discussed in coming section of this paper. So from all the tools S-tools is proved to be best. [ABSTRACT FROM AUTHOR]
- Published
- 2019
11. A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data
- Author
-
N. G. Bhuvaneswari Amma and Jitaksh Kapoor
- Subjects
Triple DES ,Steganography ,business.industry ,Computer science ,Cryptography ,Encryption ,Computer security ,computer.software_genre ,Computer Science Applications ,Theoretical Computer Science ,Information hiding ,The Internet ,Electrical and Electronic Engineering ,business ,computer ,Digitization - Abstract
Our world is making its way toward complete digitization, with more and more data going to the Internet. Thus, the security of the data has become one of our utmost responsibilities. Strong and sec...
- Published
- 2021
- Full Text
- View/download PDF
12. A cost-effective programmable SoC for network security using Xilinx Spartan 3AN FPGA
- Author
-
M. El-Medany, Wael
- Published
- 2014
- Full Text
- View/download PDF
13. Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
- Author
-
Choy, Jiali, Khoo, Khoongming, Loe, Chuan-Wen, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Chen, Liqun, editor, Ryan, Mark D., editor, and Wang, Guilin, editor
- Published
- 2008
- Full Text
- View/download PDF
14. Propuestas de mejora DES y Triple DES a lo largo de su historia
- Author
-
Ahumada Urquijo, Laura Ximen, Valencia Ortiz, James, Velandia Beltran, Maria Fernanda, Mendoza Calderón, John Brayan, Ahumada Urquijo, Laura Ximen, Valencia Ortiz, James, Velandia Beltran, Maria Fernanda, and Mendoza Calderón, John Brayan
- Abstract
This paper provides an in-depth analysis of the history of DES and its successor Triple DES in the security market and secure data encryption. The different variations and improvements that have been proposed in research related to the uses of Triple DES since before it was approved as a standard for data encryption worldwide are studied. It is also important to mention that the proposals collected and analyzed are from different parts of the world, which solidifies the level of research carried out, due to the variety of sources found. In this way, the history of this algorithm is traced in order to provide the reader with a broad perspective on how it works and the different uses that have been made of it. Finally, it’s determined that DES and 3-DES have been algorithms widely used in security information systems, but currently they are vulnerable to different attacks such as brute force and differential cryptanalysis, because of this it is suggested the use of other algorithms, for instance AES, or to include improvements in the DES and 3-DES implementation., En el presente artículo se realiza un análisis profundo respecto a la historia de DES y su sucesor Triple DES en el mercado de la seguridad y el cifrado de datos de manera segura. Se estudian las diferentes variaciones y mejoras que se han propuesto en materia investigativa en relación con los usos de Triple DES desde antes de ser aprobado como un estándar para el cifrado de datos a nivel mundial. De igual manera es importante mencionar que las propuestas recolectadas y analizadas son de diferentes partes del mundo lo que solidifica el nivel de investigación realizado, debido a la variedad de fuentes encontradas. De esta manera se realiza un recorrido por la historia de este algoritmo para ofrecer al lector una amplia perspectiva respecto al funcionamiento y diferentes usos que se le han dado. Finalmente, se logra determinar que DES y 3-DES han sido algoritmos ampliamente utilizados en el área de la seguridad informática, pero actualmente son vulnerables a diferentes ataques como fuerza bruta y criptoanálisis diferencial, debido a esto se propone el uso de otro algoritmo como AES o realizar mejoras en la implementación de DES y 3-DES.
- Published
- 2022
15. Known-IV Attacks on Triple Modes of Operation of Block Ciphers
- Author
-
Hong, Deukjo, Sung, Jaechul, Hong, Seokhie, Lee, Wonil, Lee, Sangjin, Lim, Jongin, Yi, Okyeon, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, and Boyd, Colin, editor
- Published
- 2001
- Full Text
- View/download PDF
16. Design and Implementation of High-Speed AES and Visual Cryptography with Modified Mix Column on FPGA – A Survey
- Author
-
M, Abibulla, Hafiz, Mohammed Shoaib, Khader, Isam Mansoor, and D, Chandra Babu
- Subjects
AES ,Visual Cryptography ,Triple DES ,Decryption ,Encryption ,DES - Abstract
Network security is one of prime importance with the advent of cyber-attacks, phishing and hacking occurring on a regular basis in the 21st Century. Though a lot of popular algorithms already exist for encrypting data such as AES, DES or Triple DES, there is a necessity for strengthening the existing algorithms to prevent a possible brute force attack on encrypted data. This paper explores a few papers aiming to achieve the same. It elaborates on the advantages and disadvantages of the existing algorithms and finally concludes with a proposal for a future implementation which can overcome the disadvantages.
- Published
- 2022
- Full Text
- View/download PDF
17. How to Make DES-Based Smartcards Fit for the 21-St Century : Cryptographic Techniques for Advanced Security Requirements
- Author
-
Lucks, Stefan, Weis, Rüdiger, Domingo-Ferrer, Josep, editor, Chan, David, editor, and Watson, Anthony, editor
- Published
- 2000
- Full Text
- View/download PDF
18. Robustness-Agile Encryptor for ATM Networks
- Author
-
Leitold, Herbert, Mayerwieser, Wolfgang, Payer, Udo, Posch, Karl Christian, Posch, Reinhard, Wolkerstorfer, Johannes, Qing, Sihan, editor, and Eloff, Jan H. P., editor
- Published
- 2000
- Full Text
- View/download PDF
19. A Hybrid Cryptographic Scheme for Improving Cloud Security Using ECC and TDES Algorithms
- Author
-
Simranjit Kaur and Lokesh Jain
- Subjects
Scheme (programming language) ,Triple DES ,Cloud computing security ,business.industry ,Computer science ,Distributed computing ,Data security ,Cloud computing ,Cryptography ,Psychiatry and Mental health ,Elliptic curve ,business ,computer ,computer.programming_language - Abstract
The evolving cloud technology is capable of accommodating volumes of business processes. This feature attracts many individuals and organizations to store their data over cloud. But there are many security issues that require a deep insight. In this research, articles and surveys on cloud security have been reviewed to identify the issues. Efforts have been made to increase cloud data security by devising a hybrid cryptographic algorithm namely Hybrid Elliptic Curve Cryptography -Triple Data Encryption Standard (ECC-TDES). The hybridized algorithms make data more secure and immune to malicious attacks. The proposed algorithm was applied to database of a cloud-based web application and tested with audio, video, image and text files ranging between 10-100 kb file sizes to record performance metrics such as: encryption time, decryption time and accuracy. The recorded parameter values were compared with individual ECC and TDES algorithms. The findings indicated that ECC-TDES takes more time to encrypt/decrypt files but gives highest accuracy with 0.01% error rate.
- Published
- 2020
- Full Text
- View/download PDF
20. NETWORK SECURITY BY BLOCK CIPHERS
- Author
-
Mohamed M. A. Hussein and Mohamed Ibrahim Abu Hassan
- Subjects
Triple DES ,Block cipher mode of operation ,Multiple encryption ,Vigenère cipher ,Computer science ,business.industry ,Substitution cipher ,Caesar cipher ,Cryptography ,Arithmetic ,business ,Block cipher - Abstract
This paper reviews some of the encryption models through the block cipher technique used for the data encryption process. As an introduction, we explained Classical Substitution Ciphers by two example models (Caesar Cipher and Vigenere Cipher). They are followed by a block cipher which is presented by multiple encryption triple DES and block cipher modes of operation. Multiple encryption DES algorithms are using two or three keys to make the encryption process more complex. But still using a 64-bit fixed blocks message and also wasted a lot of time during the encryption and decryption process. So we need some ways to encrypt and decrypt arbitrary quantities of data. This paper presents five block cipher modes of operation to cover a wide variety of applications and can be used with any block cipher. يستعرض هذا البحث بعض نماذج التشفير من خلال تقنية تشفير الکتل المستخدمة لعملية تشفير البيانات. کمقدمة، أوضحنا شفرات الاستبدال الکلاسيکي من خلال نموذجين من الأمثلة (سيزر، فيجنر). ينتقل البحث ليوضح تشفير کتلةمن البيانات عن طريق التشفير المتعدد الثلاثي وأنماط تشغيل تشفير الکتلة. تستخدم الخوارزميات متعددة التشفير ذات مفتاحين أو ثلاثة لجعل عملية التشفير أکثر تعقيدا. ولکن لا تزال هذه الخوارزمية تستخدم کتلة بيانات بحجم ثابت 64 بت ، کما أنه أهدر الکثير من الوقت أثناء عملية التشفير وفک التشفير. لذلک نحن بحاجة إلى بعض الطرق لتشفير وفک تشفير کميات البيانات العشوائية والمتغيرة الإحجام. يقدم هذا البحث خمسة أنماط تشفير کتلة لتغطية مجموعة واسعة من التطبيقات ويمکن استخدامها مع أي تشفير لکتلة البيانات. NETWORK SECURITY BY BLOCK CIPHERS
- Published
- 2020
- Full Text
- View/download PDF
21. Comparative Study of Different Cryptographic Algorithms
- Author
-
Baha Eldin Hamouda Hassan Hamouda
- Subjects
Triple DES ,Authentication ,business.industry ,Computer science ,05 social sciences ,Advanced Encryption Standard ,050301 education ,020206 networking & telecommunications ,Plaintext ,Cryptography ,02 engineering and technology ,Encryption ,Symmetric-key algorithm ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,business ,0503 education ,Algorithm - Abstract
With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of data user can be maintained as well as security and privacy of data provided to the user. Symmetric key cryptography is a part of the cryptographic technique which ensures high security and confidentiality of data transmitted through the communication channel using a common key for both encryption and decryption. In this paper I have analyzed comparative encryption algorithms in performance, three most useful algorithms: Data Encryption Standard (DES), Triple DES (3DES) also known as Triple Data Encryption Algorithm (TDEA), and Advanced Encryption Standard (AES). They have been analyzed on their ability to secure data, time taken to encrypt data and throughput the algorithm requires. The performance of different algorithms differs according to the inputs.
- Published
- 2020
- Full Text
- View/download PDF
22. An E-health System for Encrypting Biosignals Using Triple-DES and Hash Function
- Author
-
Mona M. Elamir, Walid Al-Atabany, and Mai S. Mabrouk
- Subjects
Triple DES ,Health professionals ,business.industry ,Computer science ,Hash function ,Cloud computing ,business ,Base (topology) ,Encryption ,Expression (mathematics) ,Computer network ,Hacker - Abstract
This Electronic Health (E-Health) is a broad expression that enables the communication between healthcare professionals in handling patient information through the cloud. Exchanging medical data over the public cloud requires securing transferring for the data that's direct many researchers in proposing different secure schemes to enable users to handle data safely without hacking or alternating. In this study, one of the most common encryption algorithms called Triple Data Encryption Standard (Triple-DES) has been implemented with the aid of the hash function and DNA cryptography base to encrypt different biosignals into DNA format to add a security layer for the proposed system.
- Published
- 2021
- Full Text
- View/download PDF
23. Performance Evaluation of MANET Network Parameters Using AODV Protocol for HEAACK Enhancement.
- Author
-
Patel, Parth, Bansode, Rajesh, and Nemade, Bhushan
- Subjects
AD hoc computer networks ,PARAMETER estimation ,NETWORK routing protocols ,MALWARE ,EXISTENCE theorems - Abstract
MANETs are Vulnerable to malicious attackers because of their open medium and wide distribution of malicious attackers. Intrusion Detection System detects and reports the malicious activity in ad hoc networks. IDSs usually act as the second layer in MANETs. A detection system called Enhanced Adaptive Acknowledgement (EAACK) specially designed for MANETs. By the accepting MRA scheme, EAACK is capable of finding malicious nodes contempt the existence of the false misbehavior report and against other popular mechanisms in different scenario through simulation. Malicious attackers to falsely report nodes as malicious can produce the false misbehavior report. EAACK is an acknowledgment-based encroachment detection system. When measured over 40% malicious nodes the routing overhead for EAACK (DSA) is 0.58% and Packet delivery ratio is 0.92% for the same. This attack can be deadly to the entire network when the attackers break down sufficient nodes and thus cause a network division. Hybrid Enhanced Adaptive Acknowledgement (HEAACK) which is proposed system adds cryptography mechanism such as RSA and Triple DES giving a secure network and thus the rate of data manipulation and network overhead decreases. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
24. Hybrid approach for Data Aggregation in cloud
- Author
-
Gowrimanohari K, Harikrishnan K, and Manishankar S
- Subjects
Data aggregator ,Triple DES ,Consistency (database systems) ,Computer science ,business.industry ,Distributed computing ,Key (cryptography) ,Cloud computing ,Information security ,Enhanced Data Rates for GSM Evolution ,Encryption ,business - Abstract
Security of the information is additionally significant challenge in cloud. Information encryption in cloud computing is the response to conquer the challenges. Efficient security of gigantic measure of IoT delivered information is a key for wide scale information scientific administrations. Information hub works at the edge side and upgrades information security, exactness, consistency and decreases the dormancy rate which is a significant factor for application like IOT sensor data. In this paper, we present an IoT personality insurance plot for symmetric IoT information encryption. We give fundamental security definitions for this issue setting present another development and give security verifications of safety level accomplished with the development. Execution figures for a proof of idea execution are likewise given. The new plan gives a reasonable compromise between personality security and complexity. The information distinguished will be put away in the information hub. The information gathered from it is being scrambled utilizing Advance Encryption Standard (AES) and Triple DES calculation and it is transferred to the cloud. Hence, the security of the sensor information is improved utilizing cloud computing. In this paper, an efficient hybrid data aggregation scheme changing in accordance with the architecture of IoT is proposed. The proposed hybrid approach is set in the cluster and tree-based data aggregation plans on keeping an eye on the limitations.
- Published
- 2021
- Full Text
- View/download PDF
25. Subject Review: Comparison Between 3DES, AES and HiSea Algorithms
- Author
-
Zainab Khyioon Abdalrdha, Waleed Rasheed Humood, Shaimaa Khudhair Salah, and Ahmed Othman Khalaf
- Subjects
Triple DES ,Symmetric-key algorithm ,Computer science ,business.industry ,020209 energy ,0202 electrical engineering, electronic engineering, information engineering ,Subject (documents) ,02 engineering and technology ,business ,Algorithm - Abstract
Security is one of the main sources of information protection, especially sensitive information that is transmitted over the Internet. Encryption is one of the most important elements used, which is an effective and necessary element to provide high-level security communication between different entities by transmitting unclear and encrypted information that does not allow unauthorized person to access, the method of choosing the appropriate and correct encryption algorithm is important to provide a secure connection that provides a more efficient and accurate encryption system. In this paper, we will review the algorithms (Triple DES, AES & HiSea) for secret key encryption that are most commonly used for this type of encryption.
- Published
- 2019
- Full Text
- View/download PDF
26. Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
- Author
-
Rana Abdul Rahman Lateef and Mazin Haithem
- Subjects
Triple DES ,General Computer Science ,Computer science ,Genetic algorithm ,Data_CODINGANDINFORMATIONTHEORY ,General Chemistry ,Algorithm ,General Biochemistry, Genetics and Molecular Biology - Abstract
This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or broken to crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.
- Published
- 2019
- Full Text
- View/download PDF
27. An efficient method for fault tolerance in cloud environment using encryption and classification
- Author
-
Vipul Gupta, Bikram Pal Kaur, and Surender Jangra
- Subjects
Triple DES ,0209 industrial biotechnology ,business.industry ,Computer science ,Fault tolerance ,Cloud computing ,02 engineering and technology ,Encryption ,computer.software_genre ,Theoretical Computer Science ,020901 industrial engineering & automation ,Software ,Robustness (computer science) ,Scalability ,CloudSim ,0202 electrical engineering, electronic engineering, information engineering ,Dependability ,020201 artificial intelligence & image processing ,Geometry and Topology ,Data mining ,business ,computer - Abstract
Cloud computing may be defined as management and provision of resources, software, application and information as services over the cloud which are dynamically scalable. Fault tolerance includes all the techniques necessary for robustness and dependability. The main advantages of using fault tolerance in cloud computing include failure recovery, lower costs and improved standards in performance. Even though the benefits are immeasurable, the element of risk on user applications due to failure remains a major drawback. So our suggested technique utilizes the effective fault tolerance method with the encryption algorithm. To improve the security of the recommended technique, triple-DES encryption algorithm is employed before the data transmission. For the transmission of encrypted data, the implemented method selects the minimum fault tolerance node. So the recommended technique utilizes the effective classification technique. Here, improved support vector machine (ISVM) classifier is used to classify the nodes based on its feature value and the content similarity each node. The proposed ISVM helps in predicting the faults if available, earlier before it occurs. The various parameters considered in our proposed system are accuracy, service reliability and availability. In the proposed method, the accuracy value of the fault tolerance is 79% which is better than in the existing method. The proposed method will be implemented in JAVA with CloudSim.
- Published
- 2019
- Full Text
- View/download PDF
28. Secure Transmission of DICOM Images by comparing different cryptographic algorithms
- Author
-
Rohit Agrawal, Akhil Bharadwaj, Umang Agarwal, and T.M. Navamani
- Subjects
010302 applied physics ,Triple DES ,Blowfish ,business.industry ,Computer science ,Advanced Encryption Standard ,Hash function ,Cryptography ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Encryption ,01 natural sciences ,DICOM ,0103 physical sciences ,0210 nano-technology ,business ,Secure transmission ,Algorithm - Abstract
This paper aims to implement the concept of preserving the Confidentiality and Integrity of DICOM Images Using Cryptographic Algorithms. This work uses two types of cryptographic algorithms namely AES (Advanced Encryption Standard) and Blake Hash Function. Using these algorithms, we implement and check the confidentiality and integrity of DICOM images. Our proposed system also ensures that the images are transferred from one hospital database to another in a secure manner and the system will be able to tackle any changes while the image is being transferred. The initial concern of the system lies in providing confidentiality in the communication of the images which can be done using AES algorithm. The integrity can be provided using Blake Hash Function. The comparative analysis of AES with other algorithms such as Triple DES, IDEA, Blowfish and SEED with respect to their execution time is also done. In this work, DICOM files are taken as input and then kept in the encrypted format for storage purpose and also they can be sent over the network in the encrypted format.
- Published
- 2019
- Full Text
- View/download PDF
29. An Efficient Cryptographic Scheme for Text Message Protection Against Brute Force and Cryptanalytic Attacks.
- Author
-
Joshi, Abhishek, Wazid, Mohammad, and Goudar, R.H.
- Subjects
CRYPTOGRAPHY ,TEXT messages ,CYBERTERRORISM ,COUNTERTERRORISM ,KNOWLEDGE transfer ,INTERNET access ,SECURITY systems - Abstract
Security is the biggest concern for any information transferred in the world of Internet. Sometimes sensitive information is communicated via insecure medium so various attacks like Brute force, Crypt analytic are possible for recovering message and key. In recent years, encryption technology has been developed very quickly to secure the transmitted information. Existing techniques have separate mechanism for key distribution and for encryption and decryption at source and destination. As per our best knowledge there is no algorithm that is implemented till now that generates the key and then encrypts the message with that key then transfers the message and the key securely so that the same key can be used for decrypting the message. Still the cipher text remains that of original message length. In this paper we have proposed an efficient cryptographic scheme for text message protection against Brute force and Cryptanalytic attacks. This technique can also be used for most crucial applications where it requires a significant security of transmitted message and also there is no overhead on the transfer of message and the key when it is used with our proposed technique. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
30. Power system real time data encryption system based on DES algorithm
- Author
-
Ajun Cui, Bo Zhao, Zhiru Li, Hong Zhao, and Xu Zhang
- Subjects
Triple DES ,Electric power system ,Digital signature ,Computer science ,business.industry ,Data integrity ,Hybrid cryptosystem ,Real-time data ,Encryption system ,Encryption ,business ,Algorithm - Abstract
To ensure the safe operation of power system, this paper studies two technologies of data encryption and digital signature, and designs a real-time data encryption system based on DES algorithm, which improves the security of data network communication. The real-time data encryption system of power system is optimized by the hybrid encryption system based on DES algorithm. The real-time data encryption of power system adopts triple DES algorithm, and double DES encryption algorithm of RSA algorithm to ensure the security of triple DES encryption key, which solves the problem of real-time data encryption management of power system. Java security packages are used to implement digital signatures that guarantee data integrity and non-repudiation. Experimental results show that the data encryption system is safe and effective.
- Published
- 2021
- Full Text
- View/download PDF
31. Triple DES
- Author
-
De Cannière, Christophe, van Tilborg, Henk C. A., editor, and Jajodia, Sushil, editor
- Published
- 2011
- Full Text
- View/download PDF
32. Advanced biometric ATM machine with AES 256 and steganography implementation.
- Author
-
Murugesh, Rishigesh
- Abstract
The main objective of this system is to make ATM transactions as secure as possible. This system replaces the conventional ATM card with Fingerprint. Therefore, users don't have to carry a plastic card to withdraw money. The Fingerprint and the phone number of all users are stored in the system database during Registration. Fingerprints are used to identify a Person's genuinity. A Fingerprint scanner is used to get the fingerprint of the user, after which the system requests for the PIN (Personal Identification Number). Once the user enters the PIN, the user is prompted to enter the OTP (One Time Password) which is a 4-digit random password sent by the server to the user's registered mobile number. On cross verification with the data stored in the system database, the user is allowed to make a transaction. The underlying mechanism involves combining the concepts of Cryptography and Steganography. The PIN and OTP are encrypted using AES 256. Then the encrypted data is steganographed with the fingerprint image which acts as the BASE image. The Steganographed image is sent to the server, where it is de-steganographed and verified with the data available in the system database. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
33. Transmission of Encrypted data in WSN: An Implementation of Hybridized RSA-TDES Algorithm
- Author
-
Bandita Sahu and Chinmayee Mishra
- Subjects
Triple DES ,Transmission (telecommunications) ,business.industry ,Computer science ,Data integrity ,Data security ,Wireless ,business ,Cluster analysis ,Encryption ,Wireless sensor network ,Algorithm - Abstract
Data security and transmission are always be the concern with its importance in wireless sensor network. Today, most of the research works are going on the improvement of security and transmission as well. Transmission of secured data is very essential to maintain data integrity between the sender and the receiver. As data flows in a wireless traffic, it is to be protected from the unauthenticated users by some means. We have proposed a new algorithm for transmitting the encrypted data. Hybridization of existing RSA and Triple DES is executed to obtain the encrypted version of the data to be sent. For decryption too we have used both the algorithms. We have achieved data integrity, confidentiality, and security by means of encryption. NS3 simulator is used to execute the proposed approach. The results obtained is compared with other standard algorithms. Our approach outperforms over existing algorithms.
- Published
- 2020
- Full Text
- View/download PDF
34. Introduction Advanced Encryption Standard (AES)
- Author
-
Joel Mathew Koshy
- Subjects
Triple DES ,Computer engineering ,Brute-force attack ,Symmetric-key algorithm ,business.industry ,Computer science ,Advanced Encryption Standard ,Algorithm design ,business ,Encryption ,Key size - Abstract
An introduction to AES algorithm, the algorithm design and features of AES. AES stands forAdvanced Encryption Standard.The more popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES). It is found at least six time faster than triple DES. A replacement for DES was needed as its key size was too small. With increasing computing power, it was considered vulnerable against exhaustive key search attack.
- Published
- 2020
- Full Text
- View/download PDF
35. A cost-effective programmable SoC for network security using Xilinx Spartan 3AN FPGA.
- Author
-
El-Medany, Wael M.
- Abstract
Purpose – With the rapid development in wired and wireless networks, the demand for network security system is rising rapidly due to more and more new applications introduced. The main factors that rate the encryption algorithms are its ability to secure and protect data against attacks, its speed and efficiency. In this paper, a reconfigurable network security design using multi-mode data encryption standard (DES) algorithm has been implemented with low complexity and low cost, which will also reduce the speed. The paper aims to discuss these issues. Design/methodology/approach – The design can be easily reconfigured to 3DES (triple DES) which is more secure and more powerful in encryption and decryption, as one of the trick in designing 3DES is to reuse three instances of DES. The design can be used for wired and wireless network applications, and it has been described using VHDL and implemented in a reconfigurable Programmable System-on-Chip (PSoC). The hardware implementation has targeted Xilinx Spartan XC3S700-AN FPGA device. Findings – The main idea of reducing the complexity for the hardware implementation is by optimizing the number of logic gates and LUTs of the design. The number of logic gates can be decreased by changing the way of writing the VHDL code and by optimizing the size of the chip. Originality/value – The design has been tested in simulation and hardware levels, and the simulation results and performance are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
36. A Comparative Analysis of Cryptographic Algorithms in the Internet of Things
- Author
-
S. M. Ahsan Kazmi, Ilya Makarenko, Sergey Semushin, Alma Oracevic, Rasheed Hussain, and Sabah Suhai
- Subjects
Triple DES ,Secure communication ,Twofish ,business.industry ,Computer science ,CLEFIA ,Key (cryptography) ,XTEA ,Cryptography ,business ,Encryption ,Algorithm - Abstract
Wireless Sensor Network (WSN) technology is an integral part of Internet of Things (IoT) and the security of IoT will play a pivotal role in its deployment and commercialization. To secure communication in WSN, selecting appropriate encryption algorithm is essentially important because IoT devices are inherently low-powered and have limited resources. In this regard, in this paper, we compare diverse symmetric block-based cryptographic algorithms to comment on their capabilities that will aid in selecting the right algorithm for a specific application. We select widely used algorithms such as AES, CLEFIA, DES, Triple DES, IDEA, PRESENT, SEA, SPECK, TEA, XTEA and TWOFISH with different block and key lengths. The algorithms are compared from the perspective of energy, power and memory consumption, and throughput. The comparison is performed in Cooja simulator using z1 motes and the source code is published in the GitHub repository.
- Published
- 2020
- Full Text
- View/download PDF
37. Performance Level Evaluation of Cryptographic Algorithms
- Author
-
Ashwini P. Parkar, Shanthi Therese, Nazneen Ansari, and Madhuri N. Gedam
- Subjects
Triple DES ,MD5 ,Blowfish ,Power consumption ,Computer science ,business.industry ,DECIPHER ,Data security ,Cryptography ,Latency (engineering) ,business ,Algorithm - Abstract
Cryptographic Algorithms persuade a significant contribution in data security. But they require notable portion of resources like processor time, system memory, power consumption, latency time etc. So, it is needed to find out best cryptographic algorithm by evaluating performance of each of them. This paper evaluates the performance of cryptographic algorithms namely AES, triple DES, Blowfish, RSA, MD5 as well as SHA based on parameters like time required to encipher, time required to decipher and memory used by them. The literature surveys of these algorithms are made and then the system for the measurement of performance is proposed and implemented.
- Published
- 2020
- Full Text
- View/download PDF
38. Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar: Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar
- Author
-
Wahyuni, Juli, Gunawan, Indra, Kirana, Ika Okta, Dewi, Rafiqa, and Solikhun, Solikhun
- Subjects
Triple DES ,Employee ,Data_CODINGANDINFORMATIONTHEORY ,Cryptograph ,DES - Abstract
In this era, technology is increasingly advanced and rapid, where data confidentiality is one of the things that is very important for a company. Employee data is data that is very important for the company. So it needs a system that can secure a database of employees from various types of hecker attacks or eavesdroppers who can steal and damage data. Cryptography is a science based on mathematical techniques that deal with information security such as data confidentiality. Triple DES algorithm is a development of DES algorithm, the algorithm used is the same, only in Triple DES algorithm, the encryption and decryption process is done 3 times. Triple DES also has three different keys. The three keys used can be mutually independent (K1 ? K2 ? K3) or only two keys are mutually independent and one other key is the same as the first key (K1 ? K2 and K3 = K1). This algorithm can generate encryption that cannot be read or understood by humans and results in the exact decryption of the initial plaintext input.
- Published
- 2020
39. A Survey on Performance Analysis of Block Cipher Algorithms
- Author
-
N Prajwal Hegde, Vaishnavi S Shetty, R Anusha, and M J Dileep Kumar
- Subjects
Triple DES ,Blowfish ,Symmetric-key algorithm ,business.industry ,Computer science ,Data security ,The Internet ,Encryption ,business ,Algorithm ,Key size ,Block cipher - Abstract
In today’s scenario, Security is the most vital form of features in the network and internet applications. Network and Internet applications are increasing quickly, so the importance of the data swapped over the internet are also growing. Hence to provide the required protection against the data attacks is one of the significant solutions in the security related applications. Block cipher symmetric key cryptography plays a significant part in data security systems. This paper offers a comparison among the commonly used symmetric key cryptography algorithms: DES (Data Encryption standard), Blowfish, TDES (Triple Data Encryption Standard), PRESENT, KLEIN. The comparison of algorithm is performed based on Attacks, key size and block size and providing state-of-the-art results in their field.
- Published
- 2020
- Full Text
- View/download PDF
40. A Dynamic Round Triple Data Encryption Standard Cryptographic Technique for Data Security
- Author
-
Oluwaseun Roseline Ogundokun, Aderonke Anthonia Kayode, Oluwatobi Noah Akande, Oladele Taye Aro, and Oluwakemi Christiana Abikoye
- Subjects
Triple DES ,business.industry ,Computer science ,Advanced Encryption Standard ,Data security ,020206 networking & telecommunications ,Plaintext ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Encryption ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,business ,Avalanche effect ,Computer network - Abstract
Cryptographic techniques have been widely employed to protect sensitive data from unauthorized access and manipulation. Among these cryptographic techniques, Data Encryption Standard (DES) has been widely employed, however, it suffers from key and differential attacks. To overcome these attacks, several DES modifications have been proposed in literatures. Most modifications have focused on enhancing DES encryption key; however, the strength of a cryptographic technique is determined by the encryption key used and the number of encryption rounds. It is a known fact that Advanced Encryption Standard (AES) cryptographic technique with 14 encryption rounds is stronger than AES with 12 rounds while AES with 12 rounds is stronger than AES with 10 rounds. Therefore, this study proposed a DES cryptographic technique whose number of rounds is dynamic. Users are expected to specify the number of encryption and decryption rounds to be employed at run time. Moreover, a predefined number of shifting operations which is left circular shift 2 was chosen for each encryption round. As, a trade-off in complexity, the number of Substitution box (S-box) was also reduced to 4, so that the input to the S-boxes would be arranged in four 12-bit blocks for the X-OR operation and not six 8-bit blocks as in the traditional DES. Finally, three keys were used to encrypt, decrypt and encrypt the plaintext ciphertext as in triple DES. The modified DES yielded a better avalanche effect for rounds greater than 16 though its encryption and decryption time were greater than that of the traditional DES.
- Published
- 2020
- Full Text
- View/download PDF
41. Triple DES: Privacy Preserving in Big Data Healthcare
- Author
-
V. Vijaya Chamundeeswari and R. Ramya Devi
- Subjects
010302 applied physics ,Triple DES ,Information privacy ,Data anonymization ,Computer science ,business.industry ,Big data ,Unstructured data ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,020202 computer hardware & architecture ,Theoretical Computer Science ,0103 physical sciences ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,Software ,Information Systems ,Key size ,Block cipher - Abstract
Big data stand as a technique to retrieve, collect, manage and also analyze a vast quantity of structured and also unstructured data which are tough to process utilizing the traditional database that involves new technologies to examine them. With the expanding success of the big data usage, loads of challenges emerged. Timeless, scalability and privacy are the chief problems that researchers endeavor to work out. Privacy-preserving is at present a highly active domain of research. To guarantee a safe and trustworthy big data atmosphere, it is imperative to pinpoint the drawbacks of the existing solutions furthermore conceive directions for future study. In the given paper, the security and also the privacy-preserving on big data is proposed concerning the healthcare industry and to beat security issues in existing approach. Mainly anonymizations along with Triple DES techniques aimed at security purpose are incorporated. Triple DES offers a fairly simple technique of increasing the key size of DES to shield against such attacks, devoid of necessitates to design an entirely new block cipher algorithm. Data anonymization work as an information sanitizer whose target is to defend the data privacy. It encrypts or takes away the personally recognizable data as of the data sets in order that the persons about whom the data designate remain anonymous. In this work, a combination of anonymization and Triple DES are utilized that are shortly called as the A3DES algorithm. Experimental outcome reveals that the approach performed well when contrasted with all other related approaches.
- Published
- 2018
- Full Text
- View/download PDF
42. A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense
- Author
-
Qifu Tyler Sun, Keping Long, Hanqi Tang, and Xiaolong Yang
- Subjects
Triple DES ,linear network coding ,General Computer Science ,Computer science ,Distributed computing ,0211 other engineering and technologies ,02 engineering and technology ,Encryption ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Vulnerability (computing) ,021110 strategic, defence & security studies ,business.industry ,cyber security ,Key space ,Advanced Encryption Standard ,General Engineering ,020206 networking & telecommunications ,DES ,Moving target defense ,Linear network coding ,Key (cryptography) ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,dynamic defense theory ,business ,lcsh:TK1-9971 ,Encoder - Abstract
Unlike prior efforts in cybersecurity research, a dynamic defense theory, called moving target defense, increases the complexity and costs for attacks by effectively restricting the vulnerability exposure and the attack opportunities through various continually-changing evaluation, development mechanisms and strategy. Data encryption standard (DES) was the classical scheme of the traditional symmetric-key encryption schemes. Now it has been gradually replaced by the triple DES or advanced encryption standard (AES) so that the encoder has a larger key space. However, both the triple DES and AES cannot meet the dynamic security requirements of dynamic defense due to their static extension to the key space. In this paper, we propose a dynamic three-layer encryption scheme based on DES and network coding, with a low-complexity partial key update mechanism. Based on the theoretical analysis, the new scheme is shown to have the benefit to achieve a dynamic transition between efficiency and security, which increases its adaptability to various cyber conditions. The simulation results also show that the running ratio of the new scheme is relatively lower than or comparable to the triple DES.
- Published
- 2018
- Full Text
- View/download PDF
43. Triple DES Algorithm for Hiding Amorphous Secret Data into Predictive Coding Based on Reversible Image Steganography.
- Author
-
Ananthi. S. and Dhanalakshmi. P.
- Subjects
DATA encryption ,ALGORITHMS ,CODING theory ,DATA structures ,CRYPTOGRAPHY - Abstract
Cryptography is the art of converting one form of message into another form which hides the content of the original data. In this method the content alone kept secret but it fails to hide the existence of secret data. While using this crypt method the malicious people can easily identify the existence of secret image. So we are in need of transferring the secret data which should not be hacked by the third party. For avoiding this kind of problem we propose Predictive coding technique based on Steganography Scheme. Steganography is the process of hiding the existence of secret message. Secret message is embedded into the host image and the cover image is transfer to the beneficiary. In our work we propose Triple DES Algorithm for converting the structured data into unstructured data. Triple DES is widely used technique for converting huge amount of document. By using this Triple DES the abuser can convert large document into unreadable form. This unreadable document is hided into the original cover image or host image using Predictive Coding Method. The proposed work embeds the secret data into a particular block which is chosen by abuser so it is difficult to identify where the secret data is located. While this predictive coding is combined with Cryptography using Triple DES it gives stronger security for the hidden information. [ABSTRACT FROM AUTHOR]
- Published
- 2013
44. Delaying Function Construction Based on Triple DES.
- Author
-
Yingze, Ye and Ying, Zhang
- Abstract
Abstract: Delaying function refers to a type of function where the output of the function requires some time, with computational complexity different from cipher. This paper gives a method of realizing delaying function based on hash collision and the delaying function realized by this method is characterized by safety, high-efficiency and controllable delay. This approach can be applied to the generation of winning numbers of e-lottery ticket, which is beneficial for the design of e-lottery scheme. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
45. RFID Tag Data Encryption Using Triple DES and RSA Algorithms
- Author
-
Gian Carlo L. Lim, Elmer R. Magsino, Gerald P. Arada, and Alexander C. Abad
- Subjects
Triple DES ,History ,2019-20 coronavirus outbreak ,biology ,Coronavirus disease 2019 (COVID-19) ,Computer science ,business.industry ,Encryption ,Computer Science Applications ,Education ,Public access ,Transmission (telecommunications) ,Toll ,biology.protein ,Radio-frequency identification ,business ,Algorithm - Abstract
With the future full shift to cashless and contactless toll fee collection in the Philippines, installation of radio frequency identification (RFID) readers at toll plazas and tags on all vehicles is the most practicable solution. The Department of Transportation recently implemented this initiative to help minimize the transmission of COVID-19. RFID tags in the forms of stickers contains the motorist’s account number which if hacked can be used to access other important details about the owner. With the weak security of these tags, possible instances that information from RFID tags could be accessed. Information derived from these can be easily retrieved if the attacker has access to the tags' data. The worst thing is that public access to the database that contains essential information concerning the holder's account. In this paper, the authors aim to provide more information about tag ID’s encryption that is limited to RFID usage in the Philippine expressways. An algorithm devised by the authors well secures the information contained in the RFID tags.
- Published
- 2021
- Full Text
- View/download PDF
46. Stream-Based Cipher Feedback Mode in Wireless Error Channel.
- Author
-
Yang Xiao, Hsiao-Hwa Chen, Xiaojiang Du, and Guizani, Mohsen
- Published
- 2009
- Full Text
- View/download PDF
47. Securing the PRESENT Block Cipher Against Combined Side-Channel Analysis and Fault Attacks
- Author
-
Thomas De Cnudde and Svetla Nikova
- Subjects
Triple DES ,Block cipher mode of operation ,CBC-MAC ,Computer science ,business.industry ,020208 electrical & electronic engineering ,Cryptography ,02 engineering and technology ,Ciphertext stealing ,Computer security ,computer.software_genre ,Hardware and Architecture ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Substitution-permutation network ,Side channel attack ,Electrical and Electronic Engineering ,business ,computer ,Software ,Block cipher - Abstract
In this paper, we present and evaluate a hardware implementation of the PRESENT block cipher secured against both side-channel analysis and fault attacks (FAs). The side-channel security is provided by the first-order threshold implementation masking scheme of the serialized PRESENT proposed by Poschmann et al. For the FA resistance, we employ the Private Circuits II countermeasure presented by Ishai et al. at Eurocrypt 2006, which we tailor to resist arbitrary 1-bit faults. We perform a side-channel evaluation using the state-of-the-art leakage detection tests, quantify the resource overhead of the Private Circuits II countermeasure, subdue the implementation to established differential FAs against the PRESENT block cipher, and contemplate on the structural resistance of the countermeasure. This paper provides the detailed instructions on how to successfully achieve a secure Private Circuits II implementation for the data path as well as the control logic.
- Published
- 2017
- Full Text
- View/download PDF
48. Image Encryption using Multiple Advanced Block Cipher Techniques
- Author
-
Shivanku Mahna and Pooja Prashar
- Subjects
Block cipher mode of operation ,Triple DES ,CBC-MAC ,business.industry ,Computer science ,Two-square cipher ,Ciphertext stealing ,Key whitening ,business ,Stream cipher ,Computer hardware ,Block cipher - Published
- 2017
- Full Text
- View/download PDF
49. A stream cipher method for RGB image encryption using PSO base key generation
- Author
-
Mohammad-Reza Feizi-Derakhshi, Mohammad Ali Balafar, and Sepideh Bahri-Laleh
- Subjects
Block cipher mode of operation ,Triple DES ,Key generation ,General Computer Science ,Computer science ,business.industry ,Base (topology) ,business ,Encryption ,Stream cipher ,Rgb image ,Computer hardware - Published
- 2017
- Full Text
- View/download PDF
50. A Dynamic Modular Cipher Cryptography Technique
- Author
-
Syed Haroon Hasan and Zuber Farooqui
- Subjects
Triple DES ,Block cipher mode of operation ,CBC-MAC ,Cipher ,Computer science ,Two-square cipher ,Ciphertext stealing ,Arithmetic ,Key whitening ,Transposition cipher - Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.