The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The value of data stored on digital platforms are growing very rapidly. Also, most of the information systems are networked based having lots of resources like data, software applications and business logics which are always susceptible to attacks. To provide security to such information systems, many cryptographic algorithms are available. This paper focuses of three such widely popular cryptographic...
With the fast progression of digital data exchange information security has become an important issue in data communication. Encryption algorithms play an important role in information security system. These algorithms use techniques to enhance the data confidentiality and privacy by making the information indecipherable which can be only be decoded or decrypted by party those possesses the associated...
This paper presents the results of a comprehensive interpretation to research some of the most commonly used encryption algorithms in the domain of cryptography firstly to identify as many of their weaknesses and vulnerabilities as possible, and secondly to identify the aspects of these weaknesses that can be avoided by correct implementation. Day by day the vulnerabilities are rapidly increasing...
Various sectors such as such as the retail, hospitality, banking and financial introduced information technology years back. Ongoing enhancements have always offered a wider scope of growth to these sectors. Zooming in the Banking & Financial sector most banks are now offering the Online banking services. The objectives of introducing the e-banking services were profits, fast service, improved...
The Cryptography is very good area for research now a days. As we know that security is very primary requirement for the any business. And for that we need very strong and unbreakable algorithm which provides high security. For that we need encryption and decryption algorithm which is having very high security with very good throughput. If we look at the real world, there are lots of organizations...
Information Security has become an important issue in data communication. Encryption algorithms have come up as a solution and play an important role in information security system. On other side, those algorithms consume a significant amount of computing resources such as CPU time, memory and battery power. Therefore it is essential to measure the performance of encryption algorithms. In this work,...
Following the increase requirement of data security, distribute information after encrypting, this is an effective method to keep its security during transporting period. This article introduces an encryption and distribution system design process. This system takes a FPGA chip as a control center. Apply VHDL implements PCI protocol and DES encryption and decryption algorithm. The function of this...
Communications usually do not have enough security. One of the ways for making the data secure is using methods for coding the information in a special manner. In this article one of the algorithms of coding and decoding information has been reviewed and explained. Coding is converting information to the form of coded text and decoding is the operation of converting coded information to the original...
Because the standard symmetric cryptographic algorithm DES cannot implement the operations of encryption and decryption for any length over 8 bytes, this paper defines DES-based data cryptographic functions, which can keep the byte length of input and output messages identical. These cryptographic functions have been successfully applied in secure transmission for the APDU of the smart card. An Implementation...
Data encryption standard (DES) encryption has been commercially available and implemented for many years, and offers some insights into the use of FPGA and custom hardware instructions to decipher coded DES messages. This paper presents an approach using FPGA based processing instructions to decipher messages using parallel processing on the chip
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.