The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Block ciphers are very important in communication systems as they provide confidentiality through encryption. Today's block ciphers need not only high cryptographic security but also high performance encryption and decryption, as well as the ability to adapt in special environments. This paper focuses on improving the security and performance of AES-256 algorithm, based on improving diffusion layer...
Developing technology threaten to the information security and privacy. Today, for data transfer in a private and secure environment, the use of encryption methods or cryptographic systems are inevitable. In this study WHT (Walsh-Hadamard Transform) that is used, one of the transforms that used image processing techniques such as attribute extraction on image files, text analysis, filtering, compression...
AES represents the algorithm for advanced encryption standard consistof different operations required in the steps of encryption and decryption. The proposed architecture is based on optimizing area in terms of reducing no of slices required for design of AES algorithm in VHDL. This paper presents AES-128 bit algorithm design consist of 128 bit symmetric key. The AES implementation, merging technique...
This paper has been proposed for secure communication of data over wired and wireless channel with development of simple algorithm and easiness in its implementation. These features have been enabled using key rotation, inverse substitution and seed values propagation. The algorithm used in this paper can utilize both types of key that is symmetrical and asymmetrical key depending on small modification...
Cloud computing is one of the major point of discussion in IT industries. The Cloud provides service to the user on demand basis. The trend of using cloud environments is growing for storage and data processing needs. Data security is one of the major issues in cloud environment. The data owner has not control over the data after it is uploaded on cloud. For data security we have to trust on security...
Currently, the eHealthcare information management is the most critical and hot research topic. Especially with the involvement of new and promising telecommunication technologies like Machine to Machine (M2M) Communication. In M2M communication the devices interact and exchange information with each other in an autonomous manner to accomplish the required tasks. Mostly machine communicate to another...
The work presents the manner in which the Logarithmic Formula Generated Seed Based Cryptographic Technique [LFGSCT] (de)ciphers the fragmented plain text, maintaining certain modus operandi. The model formulation of the proposed technique has been conceptualized and devised to generate arbitrary sequence of characters, in order to engender the seed using the generated logarithmic formula. The impetus...
The work presents how a dual formula generated seed based cryptographic technique (de)ciphers with stochastic initialization of the parameters constituting the seed. In the model formulation of the technique, two distinct formulas are used for creating two arrays of number, followed by XOR and XNOR operations performed on those two arrays in order to produce the crypt arithmetic seed. In the process...
This paper presents a half-run RC5 cipher architecture with low power dissipation for transmission security of biomedical systems. The proposed architecture uses a resource-sharing approach utilizing only one adder/subtractor, one bi-directional barrel shifter, and one XOR with 32-bit bus width. Therefore, two data paths are switched through four multiplexers in the encryption/decryption procedure...
This paper presents a FPGA (Field Programmable Gate Array) based secured speech signal communication system. The system consists of compression, encryption and water- marking. Watermark provides authentication and ownership verification. Encryption is used for security of watermark and voice signal. As random numbers are used as a key for the encryption process, the signal is secured for both wired...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
Summary form only given. Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
the volume of data storage capacity has changed a lot as compared with earlier times. As most computers were standalone and only the users had access to data, security was not a big concern. All this changed when computers became linked in networks, in form of small dedicated networks to large LANs, WANs and the World Wide Web. With the growth of networking the security of data became a big issue...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.