Increasing Complexity of Cryptographic Using Combination of Hill Cipher and Cipher Block Chaining

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CIPHER BLOCK CHAINING Page 1 MODIFIED FORMS OF CIPHER BLOCK CHAINING

A long-standing proposal for modifying cipher block chaining to prevent data expansion is shown to be insecure in some circumstances. Different modifications are then presented which appear secure.

متن کامل

Comparative study between stream cipher and block cipher using RC4 and Hill Cipher

Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper is to find the two keys using cryptanalysis method, that is used for encrypting the information transferred during communication by using the Meet...

متن کامل

The Security of Cipher Block Chaining

The Cipher Block Chaining { Message Authentication Code (CBC MAC) speciies that a message x = x 1 x m be authenticated among parties who share a secret key a by tagging x with a preex of f (m) a (x) def = f a (f a (f a (f a (x 1)x 2) x m?1)x m) ; where f is some underlying block cipher (eg. f = DES). This method is a pervasively used international and U.S. standard. We provide its rst formal ju...

متن کامل

Passwords Management System using Blowfish Cryptographic Algorithm with Cipher Block Chaining Mode

Everyone has the security problem of private information and increase in demand of Internet use, creates security problems which results in loss of internet users passwords. There are too many users on the Internet; you might have found one user having more usernames and passwords, which contains user’s private information. It is difficult to remember all usernames and passwords and unsafe to w...

متن کامل

Triple Des Cipher Block Chaining with Output Feedback Masking Triple Des Cipher Block Chaining with Output Feedback Masking

LIMITED DISTRIBUTION NOTICE This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and spe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Development Research

سال: 2020

ISSN: 2579-9347,2579-9290

DOI: 10.28926/jdr.v4i2.124