Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A true Random-Number Encryption Method employing block cipher and PRNG

In January 1999, distributed.net collaborated with the Electronic Frontier Foundation to break a DES (i.e., Data Encryption Standard) key, spending 22 hours and 15 minutes, and implying that the DES is no longer a secure encryption method. In this paper, we propose a more secure one, called the True Random Number Encryption Method (TRNEM for short), which employs current time, true random numbe...

متن کامل

Joint Encryption and Watermarking Technique Using Block Cipher and Wavelet

This paper proposes a joint encryption and watermarking technique based on random block permutation and DWT with the motivation to enhance the security of the multimedia content. The original image is sectioned into the blocks and shuffle the blocks using random permutation, In this technique copyright information is concealed into an encrypted image. Based on the results, permutation of blocks...

متن کامل

Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique

Information security is a fast growing research field which includes numerous problems in it. Partial image encryption is one of the important problems in the field of image information security. This paper describes the partial image encryption in two ways using hill cipher technique. First encryption technique uses two slightly different keys to construct two self-invertible matrices, which a...

متن کامل

Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique

Information security is a fast growing research field which includes numerous problems in it. Partial image encryption is one of the important problems in the field of image information security. This paper describes the partial image encryption in two ways using hill cipher technique. First encryption technique uses two slightly different keys to construct two self-invertible matrices, which a...

متن کامل

Random Number Generation 1

Universit e de Montr eal 2 4.1 INTRODUCTION Random numbers are the nuts and bolts of simulation. Typically, all the randomness required by the model is simulated by a random number generator whose output is assumed to be a sequence of independent and identically distributed (IID) U(0; 1) random variables (i.e., continuous random variables distributed uniformly over the interval (0; 1)). These r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Cryptography and Information Security

سال: 2012

ISSN: 1839-8626

DOI: 10.5121/ijcis.2012.2405