The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the results of a comprehensive interpretation to research some of the most commonly used encryption algorithms in the domain of cryptography firstly to identify as many of their weaknesses and vulnerabilities as possible, and secondly to identify the aspects of these weaknesses that can be avoided by correct implementation. Day by day the vulnerabilities are rapidly increasing...
In the current technology world, data transmission of various multimedia like sensitive images, video, text is very important and security is major concern in the fields of medical, commercial and military fields. Security is very important, as illegal users may hack the sensitive data. Currently, many techniques are available for secure transmission of data through internet. Some examples of such...
Nowadays, the trend of cryptography has focused on designing algorithms with specific features for the growing demand for privacy and security in portable communication systems with limited memory and power resources, these types of algorithms "light weight" are characterized by high performance, low cost and low power consumption which allows them to be implemented in ultralight applications...
The proposed cryptographic system represents a compact data encryption algorithm (DEA). The implementation provides a short path of encryption and consists of single round. It used only 303 slice and achieved throughput of 278.282 Mbps. The results are shown in the form of chip area performance and performance/slice. The results are compared graphically with similar encryption implementations and...
Nath et al had developed multi-level feedback encryption standard ver-1, 2 and 3 where the authors have used feedbacks from forward and backward direction. In all the MWFES versions, the authors used byte level encryption and it was found that the results were quite satisfactory. In the present method (BLMWFES-1), the encryption-decryption process was done in bit-level. The entire plaintext was broken...
This article and its outputs reveal the need of search for the most suitable encryption algorithm used in PLC devices, the procedure for simulating performance of encryption algorithm and practical measurement of throughput in the PLC networks.
The science of Cryptology dates back to Caesar's time. A wide variety of techniques have been employed for encryption and decryption but cryptanalysis has simultaneously cracked these encryption techniques from time to time. The use of a multilingual approach in cryptography is not prevalent. In this paper we propose an algorithm that focuses on encryption of plain text over a range of languages supported...
Feistel and SPN are the two main structures in designing a block cipher algorithm. Unlike Feistel, an SPN has an asymmetric structure in encryption and decryption. In this paper we propose an SPN algorithm which has a symmetric structure in encryption and decryption. The whole operations in our SPN algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2, applies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.