• No results found

Decryption time

Combined Cryptographic Standards for Minimizing the Decryption Time of Encrypted Data using E-AES and D-AES

Combined Cryptographic Standards for Minimizing the Decryption Time of Encrypted Data using E-AES and D-AES

... ABSTRACT: Due to the excessive use of cloud storage by users, security becomes the major factor, another major aspect is the time to access the stored data. It has been observed that the data can be stored in ...

6

Reducing Decryption Time of NTLM Hash Using Rainbow Tables

Reducing Decryption Time of NTLM Hash Using Rainbow Tables

... Or, one could do a little bit of work ahead of time and pre-compute every word in the English language and sort the results, then store them in a database. That way, the hash that we acquire we could simply look ...

6

Comparative Study and Performance Analysis
of Encryption in RSA, ECC and Goldwasser-
Micali Cryptosystems

Comparative Study and Performance Analysis of Encryption in RSA, ECC and Goldwasser- Micali Cryptosystems

... This research work presents the comparison of RSA, ECC and GM cryptosystems in terms of encryption time, decryption time, throughput and ciphertext size with varying plaintext sizes. Different ...

8

Performance Analysis of Application for Security Enhancements using Cryptanalysis

Performance Analysis of Application for Security Enhancements using Cryptanalysis

... Security is key aspect of communication, encryption of information makes it inaccessible to unauthorized recipients. One of the most secure encryption algorithm is AES encryption. Due to increasing use of technology and ...

6

INCORPORATING DEOXYRIBONUCLEIC ACID IN AES SCHEME FOR ENHANCING SECURITY AND 
PRIVACY PROTECTION

INCORPORATING DEOXYRIBONUCLEIC ACID IN AES SCHEME FOR ENHANCING SECURITY AND PRIVACY PROTECTION

... in time decreases due to the communication between the lateral substations because of the utilization of the computed fault ...restoration time improving the distribution network reliability through ...

12

Performance Analysis of Hybrid Cryptographic Algorithm- A3D Algorithm -a New Age Cryptographic Algorithm

Performance Analysis of Hybrid Cryptographic Algorithm- A3D Algorithm -a New Age Cryptographic Algorithm

... A probabilistic model of data encryption and the first implementation of this model is presented along with the required proof [10]. The security of this implementation is proved with the calculation of quadratic residue ...

8

Comparative Implementation of Cryptographic Algorithms on ARM Platform

Comparative Implementation of Cryptographic Algorithms on ARM Platform

... In paper [5] “Superiority of Blowfish Algorithm” in this paper comparison takes place on java. Comparison between four most common and used symmetric key algorithms: DES, 3DES, AES and Blowfish. A comparison has been ...

6

A Two Round Block Cipher Symmetric Key Cryptography based on Key Stream

A Two Round Block Cipher Symmetric Key Cryptography based on Key Stream

... encryption time and decryption ...the decryption time is comparatively much more than that of encryption ...more time in brute force attack because the decryption time is ...

5

Enhancement over the Variant of Public Key Cryptography (PKC) Algorithm

Enhancement over the Variant of Public Key Cryptography (PKC) Algorithm

... faster decryption/signature generation performance as compared to Multi Prime ...Generation Time, Encryption Time and Decryption Time of the two ...

6

Experimental Study of Cracking Behaviour for SFRC Beams without Stirrups with Varying A/D Ratio

Experimental Study of Cracking Behaviour for SFRC Beams without Stirrups with Varying A/D Ratio

... and decryption time to be significantly reduced without affecting the compression performance of the underlying compression ...and decryption time is achieved when the relative size of ...

6

DNA Secret Writing with Laplace Transform

DNA Secret Writing with Laplace Transform

... and Decryption time with respect to different file sizes have been presented in table 8 and table 9 accompanied by corresponding graph as presented in Fig 5(a) and Fig ...and decryption time ...

7

Data Encryption And Decryption Using Java

Data Encryption And Decryption Using Java

... LITERATURE REVIEW 2.1 Encryption 2.1.1 Decryption 2.1.2 Advantages of Data Encryption and Data Decryption 2.1.3 Disadvantages of Data Encryption and Data Decryption 2.2 BlowfishCipher 2.[r] ...

24

A Hybrid Security Model for Distributed Cloud Management

A Hybrid Security Model for Distributed Cloud Management

... The presented work is here defined to provide the information security and secure data or file management on cloud server. The real time files are uploaded on cloud server and same information is downloaded. But ...

7

Cloud Data Security using Homomorphic Encryption

Cloud Data Security using Homomorphic Encryption

... The security is primary need of any data storage system. In this work the cloud data storage and their security is the key area of investigation. The cloud data is always mobile by nature because the cloud infrastructure ...

6

Encryption And Decryption Techniques: A Review

Encryption And Decryption Techniques: A Review

... This encryption and decryption technique is used when secret messages are transmitted from one end to another end. Usually, very sensitive information has been stored in computer and transmitted over the internet. ...

6

Time Based Encryption & Decryption for Enhancing Security in File Sync & Share System over Business Cloud

Time Based Encryption & Decryption for Enhancing Security in File Sync & Share System over Business Cloud

... Preeti Sirohi_and Amit Agarwal [2015] et. al presented that, Cloud Computing is next generation computing technology with the dynamic capabilities of adding new resources and services as per user demand and requirement. ...

7

ENCRYPTION AND DECRYPTION IN COMPLEX PARALLELISM

ENCRYPTION AND DECRYPTION IN COMPLEX PARALLELISM

... Abstract— To design a substitutin box (S-BOX) using both encryption and decryption. From that, the proposed system can achieve a higher throughput and higher energy efficiency. The S-BOX is designed by using ...

6

LIGHTWEIGHT ENCRYPTION- DECRYPTION TECHNIQUE

LIGHTWEIGHT ENCRYPTION- DECRYPTION TECHNIQUE

... six. Decryption follows reverse operations performed during the process of ...requires decryption key, and encrypted text. The decryption key should be complement to the encryption key so that ...

10

High Throughput AES Algorithm with s-box sharing for Threshold Implementation

High Throughput AES Algorithm with s-box sharing for Threshold Implementation

... Here also we have same type of transformation of operations and rounds of operations are changed. For the improving block ciphers we are taken this AES-256 algorithm. Block ciphers are nothing but increasing key length, ...

7

A Novel Teiler Public Key Cryptosystem for          Securing Data in Transmit and Storage

A Novel Teiler Public Key Cryptosystem for Securing Data in Transmit and Storage

... Cryptographic mechanisms provide data confidentiality by applying encryption technique to protect files against unauthorized access. Since encryption is an expensive operation, there is a trade-off between performance ...

5

Show all 10000 documents...

Related subjects