RK algorithm: stochastic parallel methodology for symmetric key cryptography

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Symmetric Key Algorithm for Cryptography using Music

Music and its attributes have been used in cryptography from early days. Today music is vastly used in information hiding with the use of Steganography techniques. This paper proposes an alternative to steganography by designing an algorithm for the encryption of text message into music and its attributes. The proposed algorithm converts the plain text message into a musical piece by replacing ...

متن کامل

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for p...

متن کامل

Secrecy Group Creation with Symmetric-Key Cryptography

We lift Cardelli, Ghelli and Gordon’s secrecy group creation operator [1] to a relative of the spicalculus that supports symmetric key cryptography, and show a natural extension of the associated type system. We then formulate a notion of secrecy preservation in the presence of cryptography, and prove that well-typed processes in the extended type system preserve secrecy of declared secrets, ev...

متن کامل

Symmetric Key Cryptography on Modern Graphics Hardware

GPUs offer a tremendous amount of computational bandwidth that was until now largely unusable for cryptographic computations due to a lack of integer arithmetic and user-friendly programming APIs that provided direct access to the GPU’s computing resources. The latest generation of GPUs, which introduces integer/binary arithmetic, has been leveraged to create several implementations of the AES ...

متن کامل

Cellular Programming and Symmetric Key Cryptography Systems

The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process of encryption highly depends on a quality of used random numbers. One dimensional, nonuniform CAs is considered as a generator of pseudorandom number sequences (PNSs). The quality of PNSs highly depends on a set of applied CA r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: APTIKOM Journal on Computer Science and Information Technologies

سال: 2020

ISSN: 2528-2425,2528-2417

DOI: 10.34306/csit.v2i3.73