نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

2013
A. V. Ramakrishna T. V. N. Prasanna V. N. Prasanna

An important aspect of cryptography with matrices is that given N ×N matrix P over a field F find a class of matrices G over F such that the associated doubly circulant matrix Gc is singular in order that the equation AGB = P in circulant matrices A,B has infinitely many solutions. The aim of this note is to present such a class of matrices G. We also present a direct method of finding the inve...

2014
Jitender Singh Shyam Sunder Yadav

Today as every information is in form of electronic data. The security of data is increased due frequent attacks by outsiders. So, there is a need to secure this information by using cryptography. Cryptography is a technique to make information unreadable for unauthorized users. Various algorithms are used for cryptography to convert original information. In this paper we are going to implement...

Journal: :IJICS 2014
Prakash Kuppuswamy Saeed Q. Y. Al-Khalidi

This research study proposes Hybrid Encryption System using new public key algorithm and private key algorithm. A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetrickey cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user’s privacy, authentication and accuracy....

Journal: :Des. Codes Cryptography 2007
Chris J. Mitchell Fred Piper Peter R. Wild

A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption schemes. We use a general technique which is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a symmetric block cipher which we present. We ...

Journal: :Applied sciences 2021

Grover search algorithm is the most representative quantum attack method that threatens security of symmetric key cryptography. If applied to cryptography, level target cryptography can be lowered from n-bit n2-bit. When applying Grover’s block cipher potential attacks, must implemented as circuits. Starting with AES cipher, a number works have been conducted optimize and implement ciphers into...

2014
Anand Sharma

Online banking systems allows consumers to access their banking accounts, review most recent transactions, request a current statement, transfer funds, view current bank rates and product information and reorder checks. These services that are offered by online banking systems are changing and being improved because of the intense competition between the banks. The major concern in online-banki...

2010
Mohamed Elboukhari Mostafa Azizi Abdelmalek Azizi

Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. The security of most modern cryptographic systems of key distribution mechanism is based on computational complexity and the extraordinary time needed to break the code. Qua...

2012
Eric Neidhardt

This paper is meant to give the reader a general overview about the application of asymmetric cryptography in communication, particular in mobile devices. The basics principles of a cryptosystem are addressed, as well as the idea of symmetric and asymmetric cryptography. The functional principles of RSA encryption and the DiffieHellman key exchange scheme, as well as the general idea of digital...

2012
Norranut Saguansakdiyotin Pipat Hiranvanichakorn

Broadcast encryption is the scheme that a sender encrypts messages for a designated group of receivers, and sends the ciphertexts by broadcast over the networks. Many research papers have done it using elliptic curve cryptography. In this paper, we propose the broadcast encryption scheme based on braid groups cryptography which is an alternative method in the public key cryptography and can red...

2002
Ranjan Bose Amitabha Banerjee

Chaos functions have mainly used to develop mathematical models of non linear systems. They have attracted the attention of many mathematicians owing to their extremely sensitive nature to initial conditions and their immense applicability to problems of daily life. In this paper we investigate the utility of such functions in symmetric key cryptography for secure communications. An algorithm u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید