• No results found

Cryptography algorithm

DESIGN AND IMPLEMENTATION OF SHELTERED TRANSPORTATION CRYPTOGRAPHY ALGORITHM

DESIGN AND IMPLEMENTATION OF SHELTERED TRANSPORTATION CRYPTOGRAPHY ALGORITHM

... Encryption is a process in which plain text takes as input and cliper text as output. It is based on some techniques and methods which are adopt for encryption. Thus after encryption information is not in the normal form ...

6

Study on different Cryptography Algorithm: A Critical Review

Study on different Cryptography Algorithm: A Critical Review

... Cryptography algorithm is the science in secret code In this paper We studied the various cryptographic algorithms and majorly deals the encryption and decryption process for protecting the text file based ...

6

Improved Cryptography Algorithm to Enhanced Data Security

Improved Cryptography Algorithm to Enhanced Data Security

... called cryptography. In this paper we have developed a new cryptography algorithm based on exclusive-OR operation to enhanced data ...proposed algorithm. Experimental results show that ...

8

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

... key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm” ...own algorithm to obtain randomization number and encryption number from the initial text ...cipher ...

5

A Symmetric Cryptography Algorithm in Wireless Sensor Network Security

A Symmetric Cryptography Algorithm in Wireless Sensor Network Security

... symmetric cryptography algorithm, which plays an essential role in ensuring the information security, AES (Advanced Encryption Standard) basic theory is discussed, and AES protocol processor for a small ...

9

RSA Public Key Cryptography Algorithm  A Review

RSA Public Key Cryptography Algorithm A Review

... RSA algorithm as the most widely used PKC algorithm, section 3 looks at current usage of RSA, section 4 highlights the strengths and weakness of RSA, while section 5 briefly discusses the recommendations to ...

5

RC4 STREAM CIPHER CRYPTOGRAPHY ALGORITHM

RC4 STREAM CIPHER CRYPTOGRAPHY ALGORITHM

... The implementation in [9] needs the same time (768 + 3*n clock cycles) with the proposed one but works only with fixed key 40-bit in length. Finally, the software implementation in [101 encrypts/decrypts one byte at ...

10

A Proposal of Loose Asymmetric Cryptography Algorithm

A Proposal of Loose Asymmetric Cryptography Algorithm

... There may exist many schemes of LA algorithm and thus I propose two schemes in this section. Suppose data pool S stores s’ encrypted by key E. Each user is granted an access key 𝑋 ∈ 𝑿. All users are also delivered ...

9

Comparision and Implementation of Cryptography Algorithm By Using VHDL

Comparision and Implementation of Cryptography Algorithm By Using VHDL

... This section must contain specific details about the materials studied, instruments used, specialized tools, source and research experimental details, algorithms, and application which allows other research work to ...

5

A Novel Approach For Enhance Security On Database Using Proposed Algorithms

A Novel Approach For Enhance Security On Database Using Proposed Algorithms

... All the results are approximately calculated. Here the comparison between execution time, CUP Utilization, Throughput of encrypting/decrypting database on existing cryptographic algorithm with proposed ...

6

Secure Cloud Environment Using RSA Algorithm

Secure Cloud Environment Using RSA Algorithm

... RSA algorithm to encrypt the data to provide security so that only the concerned user can access it ...RSA algorithm. the security of rsa algorithm is lies on integer factorization ...on ...

6

Framework for Providing Security and Energy
          saving Using Elliptic Curve Cryptography in
          Wireless Sensor Networks

Framework for Providing Security and Energy saving Using Elliptic Curve Cryptography in Wireless Sensor Networks

... Curve Cryptography algorithm with little modification on Sensor ...ECC algorithm depends for the effectiveness on the difficulty of the computing discrete logarithms, which increases the ...key ...

5

Data security in cloud storage using 
		Advanced Encryption Standard and Honey Cryptography

Data security in cloud storage using Advanced Encryption Standard and Honey Cryptography

... cloud. Cryptography serves an important role in the information security system against different attacks and cloud storage ...of cryptography techniques can overcome the security ...cryptographic ...

9

Artificial Immune Based Cryptography Optimization Algorithm

Artificial Immune Based Cryptography Optimization Algorithm

... of cryptography schemes, and put forward an improved signcryption scheme with artificial immune ...other cryptography scheme and reinforces its stability, adaptability and ...

8

Implementation of cryptography technique using AES algorithm

Implementation of cryptography technique using AES algorithm

... cipher algorithm was developed by researchers at IBM and was fine-tuned by government agencies, the National Security Agency (NSA) and the National Institute of Standards and Technology ...

5

Application of Genetic Algorithm in Communication Network Security

Application of Genetic Algorithm in Communication Network Security

... era. Cryptography is one of the techniques to communicate through insecure network ...Genetic Algorithm (GA) is one of the newly emerging problem solving techniques which is gaining popularity due to its ...

7

Title: AN EFFICIENT CLUSTER MAINTENANCE AND SECURED IN MOBILE AD-HOC NETWORK

Title: AN EFFICIENT CLUSTER MAINTENANCE AND SECURED IN MOBILE AD-HOC NETWORK

... The Elliptical Curve Cryptography (ECC) algorithm is used to increase the security in the Mobile Ad- hoc Network. The security of the data is monitored and maintained by the Elliptical Curve ...

11

Mining Cryptography using Enhanced Apriori Algorithm

Mining Cryptography using Enhanced Apriori Algorithm

... Developers use cryptographic primitives like block ciphers and message authenticate codes (MACs) to secure data and communications. Cryptographers know there is a right way and a wrong way to use these primitives, where ...

6

Traditional Reversible Data Hiding Based Secret Communication

Traditional Reversible Data Hiding Based Secret Communication

... Reversible data embedding technique embeds secret message/data into a digital cover image in a reversible fashion. With its interesting feature ‘reversibility’ quality of recovered image after data extraction can ...

5

Analyzing the speed of combined cryptographic algorithms with secret and public key

Analyzing the speed of combined cryptographic algorithms with secret and public key

... An overview of public key cryptography is not complete without mentioning symmetric or secret key cryptography. The reason for this is that public key cryptographic systems lack the positive performance ...

7

Show all 10000 documents...

Related subjects