Filters








129,546 Hits in 3.6 sec

On the security of multiple encryption

Ralph C. Merkle, Martin E. Hellman
1981 Communications of the ACM  
This paper shows that although either technique significantly improves security over single encryption, the new technique does not significantly increase security over simple double encryption.  ...  Cryptanalysis of the ll2-bit key requires about 256 operations and words of memory, using a chosen plaintext attack. While DES is used as an example, the technique is applicable to any similar cipher.  ...  la) serves as both M2 from (8) and as Po from (7) ). (1) Fori= ltonDo (a) /Q2 = S~-1(0) (b) Conclusion A second method of multiple encryption has been shown to be less secure than it first appeared  ... 
doi:10.1145/358699.358718 fatcat:poje3aqfpbep7o7ptvzpock2ce

On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? [chapter]

Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2004 Lecture Notes in Computer Science  
We also study the relation of various security notions for multiple encryption. We then apply these results to key-insulated cryptosystem.  ...  Intuitively, a multiple encryption should remain "secure", whenever there is one component cipher unbreakable in it.  ...  Acknowledgement The authors would like to thank Masayuki Abe, Yevgeniy Dodis, Yumiko Hanaoka, Jonathan Katz and Kazukuni Kobara for invaluable comments and discussions.  ... 
doi:10.1007/978-3-540-24632-9_26 fatcat:mdlloxy2dvbnbphg6om4kcj5ri

Influence of Multiple Encryptions on the Security and Accuracy of Sent and Received Data

2019 University of Thi-Qar journal  
Most work on this topic has intensive on the security of multiple encryptions against plaintextciphertext attacks, and has displayed creations secure by merging RC5 and CFB algorithm.  ...  Encryption of data using multiple encryptions has been suggested in a range of contexts and can be used to protect the text versus cryptanalysis.  ...  A block cipher by itself is only suitable for the secure cryptographic transformation (encryption or decryption) of one fixed-length group of bits called a block.  ... 
doi:10.32792/utq/utj/vol10/2/5 fatcat:fyyvkrmp25fihgukzwbvaywyi4

On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT)

Jiantao Zhou, Zhiqin Liang, Yan Chen, Oscar Au
2006 2006 IEEE International Conference on Multimedia and Expo  
This paper addresses the security issues of the multimedia encryption schemes based on multiple Huffman table (MHT).  ...  A detailed analysis of known-plaintext attack is presented to show that the Huffman tables used for encryption should be carefully selected to avoid the weak keys problem.  ...  CONCLUDING REMARKS The security of the multimedia encryption schemes based on multiple Huffman table has been addressed.  ... 
doi:10.1109/icme.2006.262689 dblp:conf/icmcs/ZhouLCA06 fatcat:v6t3zhw5y5bjhl3afuyy2rlf4u

Homomorphic encryption security - a review

J. Phani Prasad, B. Seetha Ramulu, E. Amarnatha Reddy
2018 International Journal of Engineering & Technology  
In this work we are giving the essence and importance of an encryption scheme called homomorphic encryption and its related issues.  ...  As the Data and Technology is increasing exponentially the security and privacy issues are becoming a major concern in the present scenario, lot of security mechanisms are in to real time and practice,  ...  Rivest et.al.(1978) introduced for the first time the concept of Homomorphic encryption. Taher (1985) introduced an algorithm based on multiplicative property.  ... 
doi:10.14419/ijet.v7i4.6.20439 fatcat:4jxoo574jnhm5omxmaegqnomfi

Multiple Encryption using ECC and its Time Complexity Analysis

Vishal Kumar, Ratnesh Kumar, Mashud A. Barbhuiya, Monjul Saikia
2016 International Journal of Computer Engineering in Research Trends  
In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm.  ...  The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration.  ...  ACKNOWLEDGMENT The authors wish to thank faculty members of Computer Science and Engineering department of NERIST for valuable suggestions and comments in preparing this paper.  ... 
doi:10.22362/ijcert/2016/v3/i11/48907 fatcat:dwgumezwazcpricxndrsf5uknq

Multiphase Encryption: A New Concept in Modern Cryptography

Himanshu Gupta, Vinod Kumar Sharma
2013 Journal of clean energy technologies  
Therefore, it is necessary to apply effective encryption/ decryption methods to enhance data security. The multiple encryption techniques of present time cannot provide sufficient security.  ...  This encryption technique enhances the complexity in encryption algorithm at large extent. Index Terms-Multiphase encryption, data security, multiple encryption.  ...  Multiple encryptions is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.  ... 
doi:10.7763/ijcte.2013.v5.765 fatcat:iuswvzcqnvfklpnq3jtjjqb7wm

Chosen-Ciphertext Security of Multiple Encryption [chapter]

Yevgeniy Dodis, Jonathan Katz
2005 Lecture Notes in Computer Science  
Most prior work on this subject has focused on the security of multiple encryption against chosen-plaintext attacks, and has shown constructions secure in this sense based on the chosen-plaintext security  ...  Here, in addition to formalizing the problem of chosen-ciphertext security for multiple encryption, we give simple, efficient, and generic constructions of multiple encryption schemes secure against chosen-ciphertext  ...  Multiple encryption, of which sequential encryption is but one example, offers at least two potential security advantages: First, the resulting scheme may be secure as long as any one of the component  ... 
doi:10.1007/978-3-540-30576-7_11 fatcat:y23gb2h6ybhibjdz55xnjdfefa

Homomorphic Encryption Using Enhanced BGV Encryption Scheme For Cloud Security

S.V.Suriya Prasad, K. Kumanan
2018 International Journal Of Engineering And Computer Science  
Fully Homomorphic Encryption is used to enhance the security incase of un-trusted systems or applications that deals with sensitive data.  ...  Homomorphic encryption enables computation on encrypted data without decryption. Homomorphic encryption prevents sharing of data within the cloud service where data is stored in a public cloud .  ...  They commenced various optimizations on top of HE implementation, and used the resulting scheme to construct a homomorphic Bayesian spam filter, secure multiple keyword search, and a homomorphic evaluator  ... 
doi:10.18535/ijecs/v7i3.22 fatcat:zxa3zq6usfhhvnqg4x3w7z5t3m

Role of Multiple Encryption in Secure Electronic Transaction

Himanshu Gupta, Vinod Kumar Sharma
2011 International journal of network security and its applications  
In this research paper, the needs of multiple encryption technique in Secure Electronic Transaction are proposed to enhance the security of confidential data.  ...  The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security.  ...  Multiple encryption is a technique to enhance the data security by performing the encryption process multiple times using same or different types of encryption key (algorithm).  ... 
doi:10.5121/ijnsa.2011.3606 fatcat:qy4xczhilneoteutt6xa4hgq4u

Using Fully Homomorphic Encryption to Secure Cloud Computing

Ihsan Jabbar
2016 Internet of Things and Cloud Computing  
The using of traditional encryption schemes to encrypt the remoted data before sending to the cloud provider has been most widely used technique to bridge this security gab.  ...  This paper deals with the use of homomorphic encryption to encrypt the client's data in cloud server and also it enables to execute required computations on this encrypted data.  ...  ) on the encrypted data of client.  ... 
doi:10.11648/j.iotcc.20160402.12 fatcat:kdg2rpcpdre3joui3qkrh4cp5a

Homomorphic Encryption for Solving Security Issues in Cloud Computing

Rachna Jain, Meenu Gupta, Akash Gupta
2020 International Journal of Innovative Research in Applied Sciences and Engineering  
The main aim of this paper is to give an outline of the current security threats in the field of cloud computing and also throw light on the findings of homomorphic encryption, which include functional  ...  computations with operations such as addition, multiplication and then study them for the security of the cloud.  ...  Firstly, the support of multiple users is a problem in fully homomorphic encryption.  ... 
doi:10.29027/ijirase.v4.i3.2020.638-643 fatcat:emtkwznidvb7rpfqwn7sca5r5u

Hybrid Homomorphic Encryption Method for Protecting the Privacy of Banking Data in the Cloud

Maha Tebaa, Karim Zkik, Said El Hajji
2015 International Journal of Security and Its Applications  
However, it is important to consider the security and protection of data when it comes to the widespread adoption of cloud.  ...  One of its limitation is the time required to encrypt and decrypt the sensitive data, as the traditional encryption systems showed a level of resistance and considerable maturity that can be rehabilitated  ...  This means that you apply the same rules of security on your applications in the cloud infrastructure.  ... 
doi:10.14257/ijsia.2015.9.6.07 fatcat:kqtmxsxlgfdyrjizhuq6ejeqsi

Survey of Various Homomorphic Encryption algorithms and Schemes

Payal V.Parmar, Shraddha B. Padhar, Shafika N. Patel, Niyatee I. Bhatt, Rutvij H. Jhaveri
2014 International Journal of Computer Applications  
When the data is transferred to the public area, there are many encryption algorithms to secure the operations and the storage of the data.  ...  In this paper, the main focus is on public key cryptographic algorithms based on homomorphic encryption scheme for preserving security.  ...  Few years later, in 2005, Dan Boneh, Eu-Jin Goh and Kobi Nissim [9] invented a system of provable security encryption, with which unlimited number of additions but only one multiplication can be performed  ... 
doi:10.5120/15902-5081 fatcat:x5y7cns7k5bbbjacyg3skl6xlu

Evaluating Performance of Asymmetric Homomorphic Encryption Algorithms for Privacy Preservation in Location Based Services

2019 International journal of recent technology and engineering  
Users have to submit their personalized information to the LBS provider. Location privacy is the one of the most critical issue.  ...  Homomorphic encryption technique ensures the secure data aggregation by encrypting the user's location using Homomorphic encryption algorithm.  ...  Semantic security is the one of the most important requirement for any encryption schema.  ... 
doi:10.35940/ijrte.c4586.098319 fatcat:brc364avfvhbhnu2t6leczmc4i
« Previous Showing results 1 — 15 out of 129,546 results