A Study on the Stream Cipher Embedded Magic Square of Random Access Files

ثبت نشده
چکیده

Magic square and stream cipher issue are very interest well-tried topic. In this paper, we are proposed a new scheme which stream cipher application for random access file that based on magic square method. By the way, there are two thresholds to secure ours data, if decrypts only by the stream cipher. It isn’t to recovery original source. In other hand, we improve the model of cipher stream to strong the defense efficiently, it also own high speed calculate to most parts of key stream generator.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Stream Cipher Based on Chaotic Permutations

In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

FELICS – Fair Evaluation of Lightweight Cryptographic Systems

In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair and consistent evaluation of software implementations of lightweight cryptographic primitives for embedded devices. The framework is very flexible thanks to its modular structure, which allows for an easy integration of new metrics, target devices and evaluation scenarios. It consists of two modul...

متن کامل

Optimizing The Use of Stream Buffers in Embedded Systems

In here we consider an overall approach to design the memory sub system of embedded systems. We focus on the use of stream buffers versus the use of caches. Stream buffers are useful to handle stream like memory access patterns (mainly array elements in loops) while caches are better suited to handle irregular accesses (e.g. traversing binary trees). Stream buffers are more efficient in terms o...

متن کامل

Lifted Wavelet-Based Image Dataset Compression with Column Random Access for Image-Based Virtual Environment Navigation

A lifted wavelet-based compression scheme with effective image-column random access for coding image datasets is proposed. This image dataset compression scheme is based on the approach of a lifted wavelet transform combined with embedded block entropy coding. This approach is adapted to compressing the image datasets used for image-based virtual environment navigation and facilitating a column...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009