نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

2013
Ravindra Kumar Gupta Parvinder Singh

In this paper, a new hybrid concept is proposed by analyzing the principle of the hybrid cryptography based on the combination of symmetric and message digesting. Moreover, the security and performance of the proposed concept will also estimate. In proposed concept we designed a new symmetric encryption algorithm and combine with SHA1 message digesting function to provide hybrid nature. Now the...

2011
Hannes Tschofenig Bernard Aboba

There are two basic credential types, namely symmetric as well as asymmetric credentials. However, these credentials can be further categorized into the amount of entropy a symmetric key provides (e.g. a password that can be remembered by a human vs. a randomly created shared secret with 128 bits), into the type of asymmetric credential, and also whether there is a need to integrate the credent...

2017
Ramu Kuchipudi Ahmed Abdul Moiz Qyser Ahmed Abdul Moiz

Key management is very crucial need in WSN to protect data and secure communications. One of the Key distribution solutions in WSN is symmetric key cryptography which is relatively faster and energy efficient. However, it cannot bestow high level of security due to difficulty in secure key management. Nevertheless, Asymmetric key cryptography can enhance network security but it also causes ener...

2014
Sunil Kumar Sahu Ajay Kushwaha

Nowadays applications on internet are growing rapidly, everyone shares their thoughts, feelings, personal data and many more information online, that’s why security is one of the most considerable and important factor in wireless network. Symmetric key Cryptography algorithm is widely used to provide security. In this paper we are implementing symmetric key encryption algorithms in ns2 to compa...

2000
Jaap-Henk Hoepman

Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secure storage of any secret information. The protocols use a symmetric cipher in an asymmetric fashion: the verifier uses a verification key which is derived from a symmetric master key. Software only verification means that the ...

Journal: :IACR Cryptology ePrint Archive 2017
Alex Biryukov Léo Perrin

Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a “lightweight” algorithm is usually designed to satisfy. We also present an extensive survey of all lightweig...

2013
P. L. Sharma M. Rehan

Hill cipher in cryptography is a symmetric key substitution algorithm, which is vulnerable to known plaintext attack. The present paper provides two fold securities to the existing Hill cipher by using the elements of finite fields and logical operator.

2014
N. R. Wankhade

confidentiality and security to the data is actually provided by an authentication . Authentication involves the confident identification of one party by another party or a process of confirming an identity .But now a days there are various methods for authentication such as Message Authentication Code, Signcryption, Key Aggregate System are emerged very rapidly for better security precaution. ...

2012
Nigam Sangwan S. R. Kodituwakku U. S. Amarasinghe Mohamed F. Mansour Charles P. Pfleeger Shari Lawrence Pfleeger Pushpa R. Suri

Communication between a sender and receiver needs security. It can be done in any form, like plain text or binary data. Changing the information to some unidentifiable form, can save it from assailants. For example, plain text can be coded using schemes so that a stranger cannot apprehend it. Cryptography is a subject or field which deals with the secret transmission of messages/ data between t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید