• No results found

symmetric encryption algorithms

Enrichment of Data Security by Amalgamation of Symmetric Encryption Algorithms

Enrichment of Data Security by Amalgamation of Symmetric Encryption Algorithms

... 5.2 BLOWFISH [9] it was developed by Bruce Schneier in 1993. The aim of designing this algorithm to make the key strong so no one can crack the cipher key. This symmetric cipher splits messages in to blocks of 64 ...

9

Performance Analysis of Symmetric Encryption Algorithms for Mobile ad hoc Network

Performance Analysis of Symmetric Encryption Algorithms for Mobile ad hoc Network

... i.e. symmetric key and asymmetric key algorithm. In Symmetric key Cryptography algorithm, there is only one private key that is common between sender and receiver to encrypt/decrypt ...data. ...

6

Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms

Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms

... DSA algorithms, which to reduce resources such as the time it takes the processor, memory and battery ...various symmetric encryption algorithms and asymmetric that can support dramatically ...

10

A COMPARATIVE STUDY OF SYMMETRIC KEY ENCRYPTION ALGORITHMS

A COMPARATIVE STUDY OF SYMMETRIC KEY ENCRYPTION ALGORITHMS

... selected symmetric encryption algorithms - AES, DES, 3DES, RC6 and ...for encryption or ...common encryption algorithms ...

11

Comparative Analysis of Algorithms Using Different Parameters for Securing Data in Cloud Computing

Comparative Analysis of Algorithms Using Different Parameters for Securing Data in Cloud Computing

... key-based encryption algorithms are asymmetric and symmetric encryption ...in symmetric algorithm, whereas a different key is used for encryption and decryption in asymmetric ...

5

A New and Novel Study of Comparison on Cryptographic Algorithms using  AES, DES and RSA for Network Security

A New and Novel Study of Comparison on Cryptographic Algorithms using AES, DES and RSA for Network Security

... the encryption and decryption of a message. Encryption and decryption keys are keeping secret and only known by authorized sender and recipient who want to ...the symmetric key encryption is ...

11

Overhead Assessment in WSN

Overhead Assessment in WSN

... Abstract: There has been a extensive growth in the area of wireless sensor networks mainly because of the marvelous possibility of using it in a wide spectrum of applications such as home automation, wildlife monitoring, ...

7

A Comparative Analysis on Symmetric Key Encryption Algorithms

A Comparative Analysis on Symmetric Key Encryption Algorithms

... The symmetric key encryption is a cryptography technique that uses a shared secret key to encrypt and decrypt the ...data. Symmetric encryption algorithms are very efficient at ...

5

Index Terms - Encryption, Cryptography Concept, Information Security, Symmetric Key Algorithms, Asymmetric Key Algorithms

Index Terms - Encryption, Cryptography Concept, Information Security, Symmetric Key Algorithms, Asymmetric Key Algorithms

... manipulation. Encryption algorithms often use private keys that are used to revert the encrypted data to its original meaningful ...In symmetric key algorithms, a single key is used to encrypt ...

14

Enhancing security by altering encryption keys for symmetric algorithm

Enhancing security by altering encryption keys for symmetric algorithm

... The objective of this study is to enhance the security of the existing algorithm. The researcher have chosen the symmetric algorithm AES. Encryption is done two times with two different keys so that the ...

6

pdf

pdf

... In cryptography, RC5 is a symmetric-key block cipher notable for its simplicity. Designed by Ronald Rivest in 1994 , RC stands for "Rivest Cipher", or alternatively, "Ron's Code" (compare RC2 and ...

6

Hybrid Cryptography to Maintain Integrity of Data in Multimedia Cloud Environment

Hybrid Cryptography to Maintain Integrity of Data in Multimedia Cloud Environment

... cryptography algorithms and methods has been proposed by several researchers for the multimedia data ...common encryption algorithms like DES, 3DES, AES and Blowfish for different sizes of data ...

7

SEARCHABLE SYMMETRIC ENCRYPTION

SEARCHABLE SYMMETRIC ENCRYPTION

... Searchable encryption is an important cryptographic primitive that is well motivated by the popularity of cloud storage services like Drop box, Microsoft SkyDrive and Apple iCloud and public cloud storage ...

6

Performance Analysis of AES and Blowfish Encryption Algorithm

Performance Analysis of AES and Blowfish Encryption Algorithm

... of encryption back into the encryption of the next ...The encryption of each block depends on all the previous ...before encryption can take ...

8

MoL 2018 04: 
  Quantum Plaintext Non Malleability

MoL 2018 04: Quantum Plaintext Non Malleability

... First, we will modify the quantum notion of non-malleability given in [AM17], weaken- ing it to only require security on the plaintext level, meaning that any structural change to the encryption of a message ...

48

Order-Preserving  Symmetric  Encryption

Order-Preserving Symmetric Encryption

... Eliminating the state. As a first step towards eliminating the state, we show that by assigning ciphertexts to plaintexts in a more organized fashion, the state can actually consist of a static but exponentially long ...

28

The  Locality  of  Searchable  Symmetric  Encryption

The Locality of Searchable Symmetric Encryption

... This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N ...

23

Substring-Searchable  Symmetric  Encryption

Substring-Searchable Symmetric Encryption

... Predicate encryption and fully homomorphic encryption Predicate encryption (a special case of functional encryption [7]) allows the secret key owner to generate tokens for various predi- ...an ...

28

Dynamic  Searchable  Symmetric  Encryption

Dynamic Searchable Symmetric Encryption

... Figure 8 shows the execution time for adding a file. The cost of the operation is divided into several components: “Enc” refers to the time needed to encrypt the new file, “SSE.AddToken” refers to client generation of ...

24

DES  Data Encryption Standard

DES Data Encryption Standard

... Therefore when 64 bit input data and 64 bit key data is given 16 rounds of operations are performed with the standard algorithm we get a 64 bit output that is a cipher text. This is called encryption. In the same ...

6

Show all 10000 documents...

Related subjects