• No results found

AES – Advanced Encryption Standard

AES (Advanced Encryption Standard) Based Cryptography for Data Security in Cloud Environment

AES (Advanced Encryption Standard) Based Cryptography for Data Security in Cloud Environment

... on AES (Advanced Encryption Standard) cryptography approach for secure data sharing among users of the ...using Encryption), which encrypt the file using secure key, uploaded by the ...

11

Secure Data in Wireless Sensor Network via AES (Advanced Encryption Standard)

Secure Data in Wireless Sensor Network via AES (Advanced Encryption Standard)

... The paragraphs below will describe the operations mentioned above. The nomenclature used below is taken from the AES specification although references to the Rijndael specification are made for completeness. The ...

5

Implementation of the Array-based Approach for the Evaluation of Randomness of the Advanced Encryption Standard (AES)

Implementation of the Array-based Approach for the Evaluation of Randomness of the Advanced Encryption Standard (AES)

... The AES (Advanced Encryption Standard) (NIST, 2001) is a symmetric block cipher designed by Joan Daemen and Vincent Rijmen, which was approved above 15 other candidates by the National ...

86

E passport security using advanced encryption standard (AES)

E passport security using advanced encryption standard (AES)

... The AES algorithm is written in VB’s programming language. This language is fairly simple and uses common English word and phrases for the most part [4] Figure 10 shows the page that contains the interface for ...

14

Enhanced Advanced Encryption Standard (E AES): using ESET

Enhanced Advanced Encryption Standard (E AES): using ESET

... key encryption. Though DES, Triple DES, AES and Blowfish are symmetric key cryptographic algorithm, and they have the ability to secure ...data. AES is a symmetric key cryptography which is used ...

6

An AES based Intellectual Property Identification in System on a Chip Design

An AES based Intellectual Property Identification in System on a Chip Design

... the Advanced Encryption Standard, a United States government standard algorithm for encrypting and decrypting ...The standard is described in Federal Information Processing ...

6

Globalized Medi Care and Organ Transplantation System

Globalized Medi Care and Organ Transplantation System

... new Advanced Encryption Standard (AES) which is approved by the US National Institute of Standards and Technology ...(Data Encryption Standard). NIST believes that the AES ...

7

Performance Analysis of Cryptography Algorithms

Performance Analysis of Cryptography Algorithms

... for encryption and private key is used for ...keys encryption or secret key encryption, only one key is used to encrypt and decrypt ...Data Encryption Standard (DES), Blowfish and ...

5

Using Attribute-Based Encryption with Advanced          Encryption Standard for Secure and Scalable
          Sharing of Personal Health Records in Cloud

Using Attribute-Based Encryption with Advanced Encryption Standard for Secure and Scalable Sharing of Personal Health Records in Cloud

... with advanced encryption standard (AES) and the symmetric data key is again encrypted asymmetrically with attribute based encryption (ABE), according to an access policy over a set of ...

5

A RISK MITIGATION DECISION FRAMEWORK FOR INFORMATION TECHNOLOGY ORGANIZATIONS

A RISK MITIGATION DECISION FRAMEWORK FOR INFORMATION TECHNOLOGY ORGANIZATIONS

... unbreakable encryption technology should be designed in order to provide security for the ...Data Encryption Standard (DES) and shift rows block in Advanced Encryption Standard ...

11

A High-Secure Vlsi Architecture For Advanced Encryption Standard (Aes) Algorithm

A High-Secure Vlsi Architecture For Advanced Encryption Standard (Aes) Algorithm

... Several techniques, such as cryptography, steganography, watermarking, and scrambling, have been developed to keep data secure, private, and copyright protected. Cryptography is an essential tool underlying virtually all ...

5

AES Algorithm Applied on Security Protocol of RFID

AES Algorithm Applied on Security Protocol of RFID

... new encryption security authentication protocol, which Based on the research of The Advanced Encryption Standard, AES algorithm is applied to RFID system to ensure the safety of data ...

5

Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

... Fig 2: The process of Symmetric Algorithm [2] Key properties such as these make the sender should always ensure that the path used in the distribution key is the safe or ensure that the person appointed to bring the key ...

8

Title: Secure and Authorised De-Duplication

Title: Secure and Authorised De-Duplication

... enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine- grained data access control to untrusted cloud servers ...

8

A DIFFERENTIAL EVOLUTION ALGORITHM PARALLEL IMPLEMENTATION IN A GPU

A DIFFERENTIAL EVOLUTION ALGORITHM PARALLEL IMPLEMENTATION IN A GPU

... the Advanced Encryption Standard (AES), originally referenced as Rijndael [1], [2], is a specification for the encryption of electronic data ...[3]. AES is based on the Rijndael ...

7

Enhancing Security Levels at ISP Server Using Multiple Security Techniques with Proposed Crypo Application

Enhancing Security Levels at ISP Server Using Multiple Security Techniques with Proposed Crypo Application

... The internet is widely used in computing. Security is an important aspect when the quality of service is evaluated and current security possesses high level encryption techniques. However, due to high data ...

12

Design and Development of School Management System with Database Encryption and Decryption

Design and Development of School Management System with Database Encryption and Decryption

... Processing Standard (FIPS) which should be most flexible, secure, fast and which can replace Data Encryption ...new standard is recognized by name Advanced Encryption Standard ...

13

STUDY AND IMPLEMENTATION OF AES AND BLOWFISH ALGORITHM

STUDY AND IMPLEMENTATION OF AES AND BLOWFISH ALGORITHM

... key encryption use only key to encrypt and decrypt ...in encryption and ...Data Encryption Standard (DES), Advanced Encryption Standard (AES) and ...key ...

9

A. Advanced Encryption Standard (AES)

A. Advanced Encryption Standard (AES)

... for encryption of a message and a different key for the decryption of same ...exchange. Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), is ...

9

Advanced Encryption Standard (AES) and It’s Working

Advanced Encryption Standard (AES) and It’s Working

... an AES cipher specifies the number of repetitions of transformation rounds that convert the input, called the plaintext, into the final output, called the cipher ...

5

Show all 10000 documents...

Related subjects