نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

2003
Parimal Patel Chirag Parikh

In today’s world where data communications, distributed data processing, financial transactions, and multilevel sharing of data resources has become an important aspect of computer system and an integral part of day-to-day function, cryptography is the only way of ensuring data security. Currently there are 2 types of cryptographic systems: Symmetric and Asymmetric. This paper gives a general o...

Journal: :IACR Cryptology ePrint Archive 2015
Yansong Gao

Securely sharing the same secret key among multiple parties is the main concern in symmetric cryptography that is the workhorse of modern cryptography due to its simplicity and fast speed. Typically asymmetric cryptography is used to set up a shared secret between parties, after which the switch to symmetric cryptography can be made. In this paper, we introduce a novel key exchange protocol bas...

Journal: :IACR Cryptology ePrint Archive 2009
Sunil Pandey Praveen Kaushik S. C. Shrivastava

In many of the cryptography applications like password or IP address encryption schemes, symmetric cryptography is useful. In these relatively simpler applications of cryptography, asymmetric cryptography is difficult to justify on account of the computational and implementation complexities associated with asymmetric cryptography. Symmetric schemes make use of a single shared key known only be...

2006
Anju Babita Ayushi Aggarwal

Cryptography is an art and science. It is a playing major role in information and security division. The main aim of the cryptography is protecting the data from unauthorized users or hackers. “Cryptography is subject contains two parts one is encryption and another one decryption. Encryption is a process converting the plain text to cipher text using some keys. Decryption is a process of conve...

Journal: :Wireless Communications and Mobile Computing 2012
David Galindo Rodrigo Roman Javier López

Wireless sensors are battery-powered devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is their main limitation, they require considerable energy to communicate data. Due to this, it turns out that the energy saving of computationally inexpensive primitives (like symmetric key cryptography) can be nullified by th...

2002
Stanley Chow Philip A. Eisen Harold Johnson Paul C. van Oorschot

For digital rights management (drm) software implementations incorporating cryptography, white-box cryptography (cryptographic implementation designed to withstand the white-box attack context) is more appropriate than traditional black-box cryptography. In the whitebox context, the attacker has total visibility into software implementation and execution. Our objective is to prevent extraction ...

Journal: :IACR Cryptology ePrint Archive 2017
Haoyu Li Renzhang Liu Yanbin Pan Tianyuan Xie

Very recently, a key exchange scheme called HK17 was submitted to NIST as a candidate of the standard of post-quantum cryptography. The HK17 scheme employs some hypercomplex numbers as the basic objects, such as quaternions and octonions. In this paper, we show that HK17 is insecure since a passive adversary can recover the shared key in polynomial time.

2013
Supriya Goel

Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a new integrating channel coding and cryptography design ...

2005
Avik Chaudhuri

We lift Cardelli, Ghelli and Gordon’s secrecy group creation operator [1] to a relative of the spicalculus that supports symmetric key cryptography, and show a natural extension of the associated type system. We then formulate a notion of secrecy preservation in the presence of cryptography, and prove that well-typed processes in the extended type system preserve secrecy of declared secrets, ev...

2013
Swati Gupta

This paper describes about cryptography and a short survey on steganography techniques. We also mention the strong and weak points of these techniques briefly. Steganography is a science dealing with the hiding of the secured information in a harmless signal. An image, audio or video files may be used to embed the information. For image steganography, binary, gray scale or color images may be u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید