Filters








747 Hits in 3.2 sec

Ciphers that securely encipher their own keys

Mihir Bellare, David Cash, Sriram Keelveedhi
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
In response to needs of disk encryption standardization bodies, we provide the first tweakable ciphers that are proven to securely encipher their own keys.  ...  Our proofs assume only standard PRP-CCA security of the underlying tweakable ciphers.  ...  They should be not only proven PRP-CCA secure but also proven to securely encipher data that contains their own keys.  ... 
doi:10.1145/2046707.2046757 dblp:conf/ccs/BellareCK11 fatcat:5vphpfusobe4tgnsqzwlz4swde

Ciphers with Arbitrary Finite Domains [chapter]

John Black, Phillip Rogaway
2002 Lecture Notes in Computer Science  
We see ciphers with arbitrary domains as a worthwhile primitive in its own right, and as a potentially useful one for making higher-level protocols.  ...  We explore the problem of enciphering members of a finite set M where k = |M| is arbitrary (in particular, it need not be a power of two).  ...  Thanks also to Mihir Bellare, David McGrew, and Silvio Micali for their helpful comments.  ... 
doi:10.1007/3-540-45760-7_9 fatcat:zmhomwbaorhvboa5kxa7nxetiy

Enhancing Security of Vigenere Cipher by Stream Cipher

Fairouz MushtaqSherAli, Falah Hassan Sarhan
2014 International Journal of Computer Applications  
When applying the proposed algorithm, we see that the mentioned above combination cipher has a high degree of security, where cipher based on just Vigenere method is not secure.  ...  modern cipher method like Stream cipher, Stream cipher relatively regards as unbreakable method, and it uses binary form (instead of characters) where the Plaintext, Ciphertext and the Key are strings  ...  The sender uses the public key of the receiver to encrypt the message. The receiver uses his own private key to decrypt the message [3] .  ... 
doi:10.5120/17486-7998 fatcat:rorbroweane4dphyilp6iubfqe

Hybrid Broadcast Encryption and Group Key Agreement Protocol with Precise Cipher Texts

Chinnala Balakrishna, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
In this innovative primeval all the cluster of participants agree and produces a widespread encipher key but though each individual having their own decipher key, So that the sender by looking the encryption  ...  Broadcast encipher algorithm sends a secure transmit note to the entire members with the distributed key to decrypt the message with trusted third party.  ...  However in this technique each member in the group including the sender having their own decryption keys for decrypting the message which is encipher by the sender after agree on every single one the cluster  ... 
doi:10.17762/turcomat.v12i5.1742 fatcat:s544zvkx2beq5oidpxwsm6j64q

The application of cryptography for data base security

Ehud Gudes, Harvey S. Koch, Fred A. Stahl
1976 Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76  
own substitution key This system is very secure.  ...  Definition 4 A statistic cipher is uniquely decipherable Iff V i,j such that (e^, m^, K ) eCg and (ëj, m j , k ) eCg Definition 5 A statistic cipher is uniquely encipherable (UE) iff V i,j such that (ej  ... 
doi:10.1145/1499799.1499814 dblp:conf/afips/GudesKS76 fatcat:7er62mgjbfcb7cwfnoa6klhjoa

A parallel block-based encryption schema for digital images using reversible cellular automata

Faraoun Kamel Mohamed
2014 Engineering Science and Technology, an International Journal  
Results of various experiments and analysis show that high security and execution performances can be achieved using the approach, and furthermore, it provides the ability to perform a selective area decryption  ...  since any part of the ciphered-image can be deciphered independently from others, which is very useful for real time applications.  ...  The security of the proposed approach is induced by the dynamical and chaotic behavior of RCA, and their high sensitivity to small initial conditions and evolution key variations.  ... 
doi:10.1016/j.jestch.2014.04.001 fatcat:u3pm7k5aavbl5fjkqisi2k6uii

Optical Bit-Plane-based 3D-JST Cryptography Algorithm with Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication

Walid El-Shafai, Iman Almomani, Aala Alkhayer
2021 IEEE Access  
The evaluation results show a secure and efficient proposed cryptography algorithm that outperforms the conventional and related cryptography algorithms in terms of all examined evaluation metrics.  ...  This paper introduces an optical HEVC cipher algorithm based on bit-plane 3D-JST (Three-Dimensional Jigsaw Transform) and multistage 2D-FrFT (Two-Dimensional Fractional Fourier Transform) encryption.  ...  So, in the case of one stage of the 2D-FrFT that is owning two distinct fractional orders alongside the m-axis and n-axis, correspondingly, then there are 2ndimensional additional secret keys.  ... 
doi:10.1109/access.2021.3062403 fatcat:xwae7aej65dafh5ejpplxof6le

IMPLEMENTATION OF PIPELINED DES USING VERILOG

P. SANTHAMMA, B. RAGHAVAIAH, N. SURESH BABU
2015 International journal of computer and communication technology  
The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form.  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers for their comments which were very helpful in improving the quality and presentation of this paper.  ...  Security of the data depends on the security provided for the key used to encipher and decipher the data. Data can be recovered from cipher only by using exactly the same key used to encipher it.  ... 
doi:10.47893/ijcct.2015.1286 fatcat:rjtuxh7j3bbazc3zh3u6j4ukbq

Page 333 of Scientific American Monthly Vol. 4, Issue 4 [page]

1921 Scientific American Monthly  
Now since we know that all letters enciphered by means of the same alphabet or key-letter always take the cipher equivalent it must follow that if we can ascertain the num- ber of alphi word) we as many  ...  own example for the purpose of demonstra tion.  ... 

Cryptology: From Caesar Ciphers to Public-Key Cryptosystems

Dennis Luciano, Gordon Prichett
1987 The College Mathematics Journal  
A decimation cipher offers no more security than a Caesar Cipher since there are only twelve distinct keys.  ...  A message enciphered by a Caesar Cipher is extremely insecure since exhaustive cryptanalysis using the 25 nontrivial keys is easily performed. Decimation and Linear Ciphers.  ... 
doi:10.2307/2686311 fatcat:wgfuylucpjaavgrrewnzxipj7q

The IPS cryptographic programs

A. G. Konheim, M. H. Mack, R. K. McNeill, B. Tuckerman, G. Waldbaum
1980 IBM Systems Journal  
For file protection, users of the Facility can elect to supply their own private DES keys (IPS- like long-character-string keys are not accepted); they can request that the Facility generate keys as needed  ...  But that technique makes it possible for users to exchange data between IEBCODE and their own cryp- tographic application programs with minimal difficulty.  ... 
doi:10.1147/sj.192.0253 fatcat:3uj5ctvjyjditpvq75xgrmn2ny

Cryptology: From Caesar Ciphers to Public-key Cryptosystems

Dennis Luciano, Gordon Prichett
1987 The College Mathematics Journal  
A decimation cipher offers no more security than a Caesar Cipher since there are only twelve distinct keys.  ...  A message enciphered by a Caesar Cipher is extremely insecure since exhaustive cryptanalysis using the 25 nontrivial keys is easily performed. Decimation and Linear Ciphers.  ... 
doi:10.1080/07468342.1987.11973000 fatcat:jq2reew24zh7hcmeam4xxvwguu

Lewis Carroll's ciphers: The literary connections

Francine F. Abeles
2005 Advances in Applied Mathematics  
In this paper I describe the ciphers closely and argue that their creation was intertwined with his word game inventions.  ...  Dodgson, who lectured on mathematics at Christ Church in Oxford University, constructed ciphers that were state of the art in his time.  ...  Other then stating that the keyword (or key sentence) had to be kept secret, Dodgson made no claims about the security of the cipher, nor did he add embellishments that would obscure normal word divisions  ... 
doi:10.1016/j.aam.2004.06.006 fatcat:4wh5xrzxdnaq7mkgveg2bumgwm

Upgrade-Data Security in Cloud by Machine Learning and Cryptography Techniques

2019 International Journal of Engineering and Advanced Technology  
Cloud computing provides a way to share distributed sources and services that are owned by different organizations or sites.  ...  In this paper, our aim is to upgrade the security of data in the cloud and also to annihilate the difficulties related to the data security with encipher algorithm.  ...  original key, m is the message that needs to be authenticated.  ... 
doi:10.35940/ijeat.f8395.088619 fatcat:oe27cynhi5fxtdbx7lgoqjh7uy

Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and Retrieval in Cloud Computing

T. John Singh
2013 IOSR Journal of Computer Engineering  
In our proposed algorithms we have (training algorithm) adopted high data security authorized person can retrieve the data, including key generation, encryption and decryption that are provided in cloud  ...  To avoid this problem in this research we propose enhanced security architecture for cloud computing using encryption and decryption system with double key cryptography based on Artificial Neural Network  ...  service provide the users no need to install physical storage service in their own data center.  ... 
doi:10.9790/0661-1221520 fatcat:4puly3p5jvecbnzwrqfxzcwmcy
« Previous Showing results 1 — 15 out of 747 results