نتایج جستجو برای: advanced encryption standard

تعداد نتایج: 772288  

2003
Song J. Park

Following paper examines hardware implementation methods regarding Advanced Encryption Standard (AES). Compared to software implementation, migrating to hardware provides higher level of security and faster encryption speed. An overview of existing AES hardware implementation techniques are summarized. Then the direction of reconfigurable coprocessor as a cryptography hardware is proposed. Keyw...

Journal: :RFC 2011
David A. McGrew

This memo describes the use of the Advanced Encryption Standard (AES) with 192and 256-bit keys within the Secure RTP (SRTP) protocol. It details counter mode encryption for SRTP and Secure Realtime Transport Control Protocol (SRTCP) and a new SRTP Key Derivation Function (KDF) for AES-192 and AES-256.

Journal: :IACR Cryptology ePrint Archive 2016
Daniel Apon Xiong Fan Feng-Hao Liu

Deniable encryption (Canetti et al. CRYPTO ’97) is an intriguing primitive that provides a security guarantee against not only eavesdropping attacks as required by semantic security, but also stronger coercion attacks performed after the fact. The concept of deniability has later demonstrated useful and powerful in many other contexts, such as leakage resilience, adaptive security of protocols,...

2006
Nadia Nedjah Luiza de Macedo Mourelle

The Advanced Encryption System – AES is now used in almost all network-based applications to ensure security. In this paper, we propose a very efficient pipelined hardware implementation of AES128. The design is versatile as it allows both encryption and decryption. The core computation of AES, which is performed on data blocks of 128 bits, is iterated for several rounds, depending on the key s...

2011
MOHAMED ALI SALEH ABOMHARA

—Multimedia information availability has increased dramatically with the advent of mobile devices. But with this availability comes problems of maintaining the security of information that is displayed in public. Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified with more specific as encryption information...

2012
Somdip Dey

The security of digital information in modern times is one of the most important factors to keep in mind. For this reason, in this paper, the author has proposed a new standard method of image encryption. The proposed method consists of 4 different stages: 1) First, a number is generated from the password and each pixel of the image is converted to its equivalent eight binary number, and in tha...

2003
Shihong Wang Weiping Ye Huaping Lu Jinyu Kuang Jinghua Li Gang Hu

Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography. The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cryptographic properties of high security; fast encryption (decryption) speed; and robustness against noise disturbances in communication channel. The overall features of this spatio...

2015
Vijay Nagaraj

At present year, most of the hospitals and diagnostic centre have exchanging the biomedical information through wireless media. reliability of the information can be verified by adding ownership data as the watermarking and encryption in the original information. In our proposed work, a joint encryption/watermarking system for the purpose of protecting medical image. This system based on approa...

Journal: :Comput. Sci. Inf. Syst. 2014
Yi-Li Huang Fang-Yie Leu Jian-Hong Chen William C. Chu

In January 1999, distributed.net collaborated with the Electronic Frontier Foundation to break a DES (i.e., Data Encryption Standard) key, spending 22 hours and 15 minutes, and implying that the DES is no longer a secure encryption method. In this paper, we propose a more secure one, called the True Random Number Encryption Method (TRNEM for short), which employs current time, true random numbe...

2013
HakJu Kim Kwangjo Kim

Cryptographic primitives are required to protect an IT (Information Technology) system. They are used to provide CIA (Confidentiality, Integrity, and Availability) and other security attributes to the system. So far, NIST (National Institute of Standard and Technology) has successfully standardized AES (Advanced Encryption Standard) for confidentiality and SHA (Secure Hash Algorithm) for integr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید