• No results found

[PDF] Top 20 An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

Has 10000 "An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security" found on our website. Below are the top 20 most common "An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security".

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

... proposed key blocks contains all possible words comprising of number (n) of characters each generated from all characters whose ASCII code is from 0 to 255 in a random ...the key blocks will depend on text ... See full document

5

Improved Security Levels of Wireless LAN through DBSPS

Improved Security Levels of Wireless LAN through DBSPS

... Keywords Bio-Cryptography, Quality-of-Security, Biometrics, Security Level, Double Bio-cryptic Security- Aware Packet Scheduling-Algorithm , Enhanced Bio-cryptic SecurityAware Packet Sch[r] ... See full document

6

Enhancing Cryptographic Security using Novel Approach based on Enhanced RSA and Elamal: Analysis and Comparison

Enhancing Cryptographic Security using Novel Approach based on Enhanced RSA and Elamal: Analysis and Comparison

... secure data transmission over networks. The algorithm chosen for cryptography should satisfy the conditions of authentication, confidentiality, integrity and ...an algorithm to merge both ... See full document

5

Index Terms - Encryption, Cryptography Concept, Information Security, Symmetric Key Algorithms, Asymmetric Key Algorithms

Index Terms - Encryption, Cryptography Concept, Information Security, Symmetric Key Algorithms, Asymmetric Key Algorithms

... a symmetric key and a stream ...uses key streams that are combined with plain text in order to output ciphertext during the process of ...An algorithm key can only be used ... See full document

14

Secure Cloud Environment Using RSA Algorithm

Secure Cloud Environment Using RSA Algorithm

... in security in cloud computing have proposed an analysis of technical component and some research in threats for cloud computing users and threats for cloud service providers then provide many security, ... See full document

6

Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography

Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography

... these data. In some cases, private data have to be sent through networks which might be insecure due to vulnerable network segments such as wireless access points or because of computer ...information ... See full document

6

ENHANCED DATA SECURITY ON CLOUD BASED USING ENCRYPTION ALGORITHM, ELLIPTIC CURVE CRYPTOGRAPHY & BLOWFISH ALGORITHM

ENHANCED DATA SECURITY ON CLOUD BASED USING ENCRYPTION ALGORITHM, ELLIPTIC CURVE CRYPTOGRAPHY & BLOWFISH ALGORITHM

... The algorithm involves multiplying two large prime numbers and through additional operations deriving a set of two numbers that constitutes the public key and another set that is the private ...private ... See full document

7

A Symmetric Cryptography Algorithm in Wireless Sensor Network Security

A Symmetric Cryptography Algorithm in Wireless Sensor Network Security

... ric cryptography in the security mechanism of wireless sensor networks, but there still exist some areas that need to be ...public key cryptography in wireless sensor networks, such as ... See full document

9

Frame Based Symmetric Key Cryptography

Frame Based Symmetric Key Cryptography

... exhaustive key search Analysis Results are shown for two binary ...56-bits key size is used with the DES (Data Encryption Standard) algorithm, 64-bit key size is used for our proposed ... See full document

8

Enhanced Public Key Algorithm for Improved Security

Enhanced Public Key Algorithm for Improved Security

... term security has become a latest and an utmost requirement for any organization whether it is personal or business ...where data sharing, data storage and data usage is carried out demands ... See full document

6

Cryptography Algorithms : A Review

Cryptography Algorithms : A Review

... information security is the challenging issue that touches many areas such as computers and ...communication. Cryptography is such a way that make sure of integrity, availability and identification, ... See full document

6

Improved Cryptography Algorithm to Enhanced Data Security

Improved Cryptography Algorithm to Enhanced Data Security

... time. Security of data and telecommunication can be done by a technique called ...new cryptography algorithm based on exclusive-OR operation to enhanced data ...security. ... See full document

8

Enhanced Content Based Double Encryption Algorithm Using Symmetric Key Cryptography

Enhanced Content Based Double Encryption Algorithm Using Symmetric Key Cryptography

... encryption algorithm using symmetric key ...secret key. This algorithm helps to achieve the secure transfer of data through the ...existing algorithm and provides a better ... See full document

7

Enhancing security by altering encryption keys for symmetric algorithm

Enhancing security by altering encryption keys for symmetric algorithm

... such security methods may affect the speed, throughput of the network (Mohd Izhar and Singh, ...Curve Cryptography) which makes fast and efficient algorithm even though the key length is small ... See full document

6

Data security in cloud storage using 
		Advanced Encryption Standard and Honey Cryptography

Data security in cloud storage using Advanced Encryption Standard and Honey Cryptography

... one key and cleartext space for decryption and encryption ...processing data is an effective solution. Earlier encrypting data storing in a remote cloud server is highly urged, merely while using ... See full document

9

Key Distribution for Symmetric Key Cryptography: A Review

Key Distribution for Symmetric Key Cryptography: A Review

... achieving security by encoding messages to make them non-readable [1]. Cryptography not only protects the information but also provides authentication to the ...unintelligible data known as cipher ... See full document

5

SPACE AND SECURITY EFFICIENT DYNAMIC KEY GENERATED HYBRID BLOCK CIPHERING METHOD FOR ENCRYPTIONKirti Singh Chouhan* and Jai Mungi

SPACE AND SECURITY EFFICIENT DYNAMIC KEY GENERATED HYBRID BLOCK CIPHERING METHOD FOR ENCRYPTIONKirti Singh Chouhan* and Jai Mungi

... the cryptography is used not only to provide confidentiality, but also to provide solutions for other problems like: data integrity, ...like: security, the features of algorithm, the time ... See full document

8

MoL 2018 04: 
  Quantum Plaintext Non Malleability

MoL 2018 04: Quantum Plaintext Non Malleability

... on symmetric- key encryption, where both the sender and receiver must share the same ...secret key and the sender holds a different key, which is publicly ...of security but might be ... See full document

48

A Novel Symmetric Key Cryptography using Multiple Random Secret Keys

A Novel Symmetric Key Cryptography using Multiple Random Secret Keys

... of data at a time using the same key on each ...[5]. Data Encryption Standard, is the most common secret-key cryptography scheme used today which is designed by IBM in the 1970s and ... See full document

6

Musical Cryptography Using Multiple Note Substitution Algorithm

Musical Cryptography Using Multiple Note Substitution Algorithm

... the key matrix. Thus it provides high level of security to the transmitted ...the key is usually like a one-time pad and guessing or producing the key is nearly ...proposed algorithm ... See full document

10

Show all 10000 documents...