intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Algorithm cryptographic

Xem 1-20 trên 76 kết quả Algorithm cryptographic
  • The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

    pdf11p visergeyne 18-06-2024 3 0   Download

  • Ebook BigNum math: Implementing cryptographic multiple precision arithmetic presents the following content: Chapter 1 introduction, chapter 2 getting started, chapter 3 basic operations, chapter 4 basic arithmetic, chapter 5 multiplication and squaring, chapter 6 modular reduction, chapter 7 exponentiation, chapter 8 higher level algorithms, chapter 9 number theoretic algorithms.

    pdf315p zizaybay1103 29-05-2024 3 2   Download

  • The information age has seen the development of electronic pathways that carry vast amounts of valuable commercial, scientific, and educational information between financial institutions, companies, individuals, and government organisations. Unfortunately the unprecedented levels of access provided by systems like the Internet also expose this data to breaches of confidentiality, disruption of service, and outright theft. The cryptlib security toolkit provides the answer to this problem. A complete description of the capabilities provided by cryptlib is given below.

    pdf342p zizaybay1103 29-05-2024 3 2   Download

  • The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.

    pdf372p zizaybay1103 29-05-2024 5 2   Download

  • Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.

    pdf221p longtimenosee08 31-03-2024 5 1   Download

  • Part 2 book "Internet security - Cryptographic principles algorithms protocols" includes content: Public-key infrastructure; network layer security; transport layer security - SSLv3 and TLSv1; electronic mail security - PGP, S/MIME; internet firewalls for trusted systems, SET for E-commerce transactions.

    pdf205p longtimenosee08 31-03-2024 5 1   Download

  • In this paper, we will propose a method of finding secure MDS matrices that are efficient for execution. By the proposed method, we will produce such MDS matrices of sizes 4, 8, and 16 that can be used to improve the diffusion layer of the AES block cipher or used for other SPN block ciphers later.

    pdf9p vispacex 16-11-2023 4 3   Download

  • Ebook CISSP: Certified information systems security professional study guide (4th edition) - Part 2 includes contents: Chapter 9: cryptography and private key algorithms, chapter 10: PKI and cryptographic applications, chapter 11: principles of computer design, chapter 12: principles of security models, chapter 13: administrative management, chapter 14: auditing and monitoring, chapter 15: business continuity planning, chapter 16: disaster recovery planning, chapter 17: law and investigations, chapter 18: incidents and ethics, chapter 19: physical security requirements.

    pdf515p haojiubujain06 05-09-2023 8 4   Download

  • The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This scheme can perform security functions and authenticate the origin and integrity of the encrypted message simultaneously. Moreover, the proposed scheme is also used as the basis for developing an algorithm to establish a shared secret key for symmetric key cryptosystems.

    pdf10p viengels 25-08-2023 6 4   Download

  • "CompTIA® Security+: Security+ Guide to Network Security Fundamentals (Sixth edition)" is designed to equip learners with the knowledge and skills needed to be information security professionals. Part 1 of book provide students with knowledge about: introduction to security; malware and social engineering attacks; basic cryptography; advanced cryptography and pki; networking and server attacks; network security devices, design, and technology; administering a secure network; wireless network security;...

    pdf398p britaikridanik 05-07-2022 37 10   Download

  • The paper proposes encryption - authentication algorithms developed from the Elgamal cryptosystem. There are algorithms included: System parameters, keys, encryption, and authenticated decryption.

    pdf10p vikissinger 03-03-2022 5 1   Download

  • The paper proposes a solution to construct symmetric–key cryptographic algorithms based on OTP cipher developed based on the cipher One – Time Pad (OTP). Advantages of the algorithms built according to the proposed new solution is to have secure and efficient implementation as OTP cipher, but the establishment, management - distribution and usage of keys are exactly the same as the Symmetric key cryptosystems in practice (DES, AES,...).

    pdf10p luuhongdung 09-09-2021 65 41   Download

  • —In this paper, we present the dynamic cryptographic algorithms for long states named ACDEL-2D and ACDEL-3D. The first one was inspired by Rijndael and the second one was inspired by 3D, a three-dimensional block cipher. In both proposals, MDS matrices are used alternately on rows and columns of the state and all transformations used in the encryption process are randomly selected depending on pseudorandom sequences.

    pdf13p chauchaungayxua12 11-05-2021 26 4   Download

  • In this article, a technical solution to capture the data packet of the PCI-Express protocol using FPGA technology will be presented. Using the standard library of PCI-Express on the computer to connect to the FPGA board, on which organizing the data according to the standard of PCI-Express protocol, at the same time to cryptographic intervening on the line. Thus, plaintext will be transmitted from the computer to the FPGA board via PCI-Express interface, then it will be organized, cryptographic intervened and transmitted back to the computer.

    pdf10p chauchaungayxua12 11-05-2021 30 4   Download

  • Cryptographic theory has provided a potentially invaluable notion for cryptographic practice: the idea of provable security. Unfortunately, theoretical work often gains provable security only at the cost of effciency. Schemes like standard RSA are efficient but not provably secured. There are schemes who are provably secured but are not efficient. However, there are encryption schemes, for eg. El Gamal encryption, which are efficient and secured at the same time.

    pdf7p lahaidanh2021 10-05-2021 523 469   Download

  • "Ebook Internet security: Cryptographic principles, algorithms and protocols" prsent knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system.

    pdf426p haphuonglan2021 25-04-2021 46 23   Download

  • "Ebook Information security and cryptography texts and monographs" present symmetric-key encryption, public-key cryptography, cryptographic protocols, probabilistic algorithms, one-way functions and the basic assumptions, bit security of one-way functions, one-way functions and pseudorandomness, provably secure encryption...

    pdf372p haphuonglan2021 25-04-2021 36 16   Download

  • In this paper, we propose an efficient profiled attack for unprotected and masking-protected cryptographic devices based on two CNN architectures, called CNNn, CNNd respectively. Both of CNN architecture parameters proposed in this paper are based on the property of points of interest on the power trace and further determined by the Grey Wolf Optimization (GWO) algorithm. To verify the proposed attacks, experiments were performed on a trace set collected from an Atmega8515 smart card when it performs AES-128 encryption, a DPA contest v4 dataset and the ASCAD public dataset.

    pdf22p nguaconbaynhay11 07-04-2021 27 5   Download

  • The cryptographic algorithm AES (Advanced Encryption Standard) works with the transformations SubBytes, ShiftRows, MixColumns and AddRoundKey, all of them fixed and selected a priori. In this paper, we will show dynamic variants of AES, where the new transformations are RandomSubBytes, RandomShiftRows, RandomMixColumns and RandomAffineTransfKey.

    pdf12p vivirginia2711 09-12-2020 24 3   Download

  • The cryptographic algorithms Kuznyechik and Magma since 2015 are block cipher standardized in the Russian Federation, formally called GOST R 34.12-2015. Both use fixed functions as a priori selected and differ on the structure, the block length and the bit-level of the processed blocks. In the present paper, we provide a dynamic variant of Kuznyechik and Magma where some of their functions are randomly generated and dependent on pseudorandom sequences.

    pdf8p vivirginia2711 09-12-2020 15 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
4=>1