• No results found

History of cryptology: The Data Encryption Standard and the Advanced Encryption Standard

Title: Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA

Title: Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA

... digital data exchange is increasing day by day in every ...the data. When we transmit a multimedia data such as audio, video, images ...Advance Encryption Standard Using FPGA”. ...

6

Using Attribute-Based Encryption with Advanced          Encryption Standard for Secure and Scalable
          Sharing of Personal Health Records in Cloud

Using Attribute-Based Encryption with Advanced Encryption Standard for Secure and Scalable Sharing of Personal Health Records in Cloud

... Addressing this problem Chase and Chow put forth the concept of a multiple-authority ABE (CC MA-ABE) wherein user keys are generated by multiple TAs and one part of each key is obtained from each TA. This effectively ...

5

Design and Implementation of Image encryption and decryption using Advanced Encryption Standard Algorithm

Design and Implementation of Image encryption and decryption using Advanced Encryption Standard Algorithm

... It is designed to produce round keys on each positive edge of the clock, when it is enabled. However in the proposed work, the key generation architecture does not require any hardware for shift operation and the port ...

7

Data Security using 128-bit Advanced Encryption Standard Algorithm

Data Security using 128-bit Advanced Encryption Standard Algorithm

... added. Data integrity aims to prevent information from being changed by parties who are not entitled to the ...this data the user must have the ability to detect data manipulation by unauthorized ...

8

Area Optimization in Masked Advanced Encryption Standard

Area Optimization in Masked Advanced Encryption Standard

... Shift rows operation is used to shift the rows of the state. The bytes of data are cyclically shifted with a certain offset. The first row is left unchanged and the second, third and fourth row is shifted to one, ...

5

Review on Advanced Encryption Standard Algorithm in Cloud Computing

Review on Advanced Encryption Standard Algorithm in Cloud Computing

... that Advanced Encryption Standard (AES), generally called Rijindael is used for securing ...key encryption” estimation uses 128-bits key length ...his data on cloud ...of data to ...

9

Design an Advanced Encryption Standard (Aes) Algorithm

Design an Advanced Encryption Standard (Aes) Algorithm

... The internet plays a key role in day-to-day life. The people can transfer important data through the internet such as Email, banking transaction and online purchase. In order to acquire secured transaction, ...

5

Advanced Encryption Standard (AES) and It’s Working

Advanced Encryption Standard (AES) and It’s Working

... AES comprises three block ciphers, AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-, 192- and 256-bits, respectively. Symmetric or secret- ...

5

FPGA IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD ALGORITHM

FPGA IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD ALGORITHM

... 1672 | P a g e The first three functions of an AES round are designed to thwart cryptanalysis via the methods of ―confusion‖ and ―diffusion.‖ The fourth function actually encrypts the data. Claude Shannon ...

6

Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

... Fig 2: The process of Symmetric Algorithm [2] Key properties such as these make the sender should always ensure that the path used in the distribution key is the safe or ensure that the person appointed to bring the key ...

8

A RISK MITIGATION DECISION FRAMEWORK FOR INFORMATION TECHNOLOGY ORGANIZATIONS

A RISK MITIGATION DECISION FRAMEWORK FOR INFORMATION TECHNOLOGY ORGANIZATIONS

... for data communication between sender and ...exchanges data among ...era data protection has become significant, such that an unbreakable encryption technology should be designed in order to ...

11

A REVIEW: FROM KEYWORD BASED IMAGE 
		RETRIEVAL TO ONTOLOGY BASED IMAGE RETRIEVAL

A REVIEW: FROM KEYWORD BASED IMAGE RETRIEVAL TO ONTOLOGY BASED IMAGE RETRIEVAL

... the Advanced Encryption Standard ...necessary data-protection mechanism for federal agencies in the US and other ...for Advanced Encryption Standard ...

12

Efficient Cloud Storage with Data Partitioning and Replication Using Advanced Encryption Standard

Efficient Cloud Storage with Data Partitioning and Replication Using Advanced Encryption Standard

... Data replication method keeping a number of replicas at the same server or on assorted servers. In replication information is copied and distributed from one database to some other. So, it reduces the workload ...

5

Public Auditing of Dynamic Data Sharing in Cloud Storage Using Aggregate Cryptosystem

Public Auditing of Dynamic Data Sharing in Cloud Storage Using Aggregate Cryptosystem

... the data can be outsourced on cloud can accessed ...that data through different virtual machines but present on single physical ...share data securely among ...share data as much they want to ...

9

Efficient VLSI Implementation of DES and Triple DES Algorithm with Cipher Block Chaining concept using Verilog and FPGA

Efficient VLSI Implementation of DES and Triple DES Algorithm with Cipher Block Chaining concept using Verilog and FPGA

... world cryptology plays an important and significant role in protecting and securing communication channels, databases, and software from unwanted ...grant encryption of quantities of information, and/or a ...

10

Secure Data in Wireless Sensor Network via AES (Advanced Encryption Standard)

Secure Data in Wireless Sensor Network via AES (Advanced Encryption Standard)

... Rijndael (pronounced as in "rain doll" or "rhine dahl") is a block cipher designed by Joan Daemen and Vincent Rijmen, both cryptographers in Belgium. Rijndael can operate over a variable-length block ...

5

Data security in cloud storage using 
		Advanced Encryption Standard and Honey Cryptography

Data security in cloud storage using Advanced Encryption Standard and Honey Cryptography

... This advanced method is used on two computing tasks, dot product and Euclide squared ...with encryption uses the symmetric key is a projection random ...compressed encryption, multi-key is introduced ...

9

AES (Advanced Encryption Standard) Based Cryptography for Data Security in Cloud Environment

AES (Advanced Encryption Standard) Based Cryptography for Data Security in Cloud Environment

... dynamic data support to ensure the correctness of users’ data in the ...erasure-coded data, our scheme achieves the storage correctness insurance as well as data error localization: whenever ...

11

EAES: Extended Advanced Encryption Standard with Extended Security

EAES: Extended Advanced Encryption Standard with Extended Security

... respectively. Data block length is 128 bits, same as ...of encryption and decryption of this proposed algorithm consists of five stages except the last one which consists of four ...of data as AES ...

6

Implementation of Advanced Encryption Standard (AES) Algorithm on FPGA

Implementation of Advanced Encryption Standard (AES) Algorithm on FPGA

... the data in portable hard disk drive system that apply to effectively in the terms of speed, scale size and power consumption to comply with minimum speed of 5 Gbps ...bits data path of two different AES ...

6

Show all 10000 documents...

Related subjects