![](images/graphics/blank.gif)
Encryption methods
-
Random numbers are a crucial component of any encryption activity in modern cryptography. Quantum Random Number Generators (QRNGs) produce truly random output strings to replace pseudo-random ones. In this research, the author’s team centered on investigating and scrutinizing the design of a QRNG utilizing optical methods tailored to meet cryptographic standards.
15p
vithomson
02-07-2024
0
0
Download
-
The paper proposes a method for constructing block cipher schemes that enable verifying the source and integrity of the encrypted message. Additionally, the shared secret key between the sender/encryptor and the receiver/decryptor for each encrypted message is established based on the mechanism of public key cryptography.
12p
visergeyne
18-06-2024
1
0
Download
-
Ebook Decrypted secrets: Methods and maxims of cryptology presents the following content: Chapter 1 introductory synopsis; chapter 2 aims and methods of cryptography; chapter 3 encryption steps: simple substitution; chapter 4 encryption steps: polygraphic substitution and coding; chapter 5 encryption steps: linear substitution; chapter 6 encryption steps: transposition; chapter 7 polyalphabetic encryption: families of alphabets; chapter 8 polyalphabetic encryption: keys; chapter 9 composition of classes of methods; chapter 10 open encryption key systems; chapter 11 encryption security; chap...
555p
zizaybay1103
29-05-2024
2
2
Download
-
When devices connecting to the Internet, one of the most problem occurred is security. There are many researchers focusing on this problem so far. Diffie-Hellman type key exchange protocols have a certain role in information security applications. This article proposes to perform encryption using pseudo-random strings to prevent unwanted attacks.
7p
vijaychest
16-05-2024
3
1
Download
-
The emergence of quantum computing presents a profound challenge and opportunity for information technology (IT) audit methodologies and IT security. Quantum computing's potential to break classical encryption methods and its promise of exponential computational power necessitate a proactive response.
8p
visergey
02-04-2024
6
0
Download
-
In this article, the author discusses the introduction of encryption using knowledge from the Linear Algebra course to first-year students so that they can perceive the application of Linear Algebra.
7p
viberkshire
09-08-2023
3
2
Download
-
The paper proposes a deniable encryption probability pseudo-block ciphers method based on the improvement of the deniable encryption block ciphers method proposed in [11] [13], and presents the proof of the correctness, security and deniability of the proposed method.
7p
viannee
02-08-2023
6
5
Download
-
Lecture Network + Guide to Networks (6th Edition) - Chapter 11: Network Security, objectives of this chapter: Identify security threats and vulnerabilities in LANs and WANs and design security policies that minimize risks; Explain security measures for network hardware and design, including firewalls, intrusion detection systems, and scanning tools; Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit.
89p
chankora08
04-07-2023
9
4
Download
-
The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message.
8p
visirius
19-01-2023
7
2
Download
-
With the rise of the Internet of Things (IoT), the risk of information security is increasing. There have been many proposals for IoT security, however, so far, there is not truly effective and comprehensive solution. The study aims at lightweight encryption, with the basic goal of reducing the loops of encryption algorithms, reducing the computing requirements, and energy consumption of the system while ensuring safety, and integrating into new Protocols of IoT networks and weak resource devices.
8p
vimelindagates
18-07-2022
50
5
Download
-
Lecture Distributed Systems - Lecture 13: Authentication in Distributed Systems. In this chapter, students will be able to understand: System model, role of cryptography, a simple model of cryptographic system intruder, a classification of cryptographic system, conventional cryptography, modern cryptography, private key cryptography, data encryption standard (DES), public key cryptography, the rivest-shamir-adleman method,…
30p
runordie1
10-05-2022
11
4
Download
-
Test is always considered a fair method to evaluate learner’s ability, however, some academic dishonesty issues discovered these recent years have proved that there are still weaknesses in organizing tests. Therefore, this paper will demonstrate the development of an online examination system using embedded system, data encryption and website development technology that expects to solve the current drawbacks in conventional examination.
10p
huyetthienthan
23-11-2021
8
1
Download
-
The purpose of the dissertation is to research on the development of new and quality solutions using graph theory and automata, suggesting their applications in, and applying them to steganography and searchable encryption.
98p
capheviahe26
02-02-2021
18
2
Download
-
The paper considers the possibility of using the method of testing the properties of bit sequences as one of the possible approaches to solving the problem of classifying pseudo-random sequences and the sequences formed by encryption and compression algorithms.
6p
vivirginia2711
09-12-2020
15
5
Download
-
This trend has attracted increasing concerns from both academia and industry. This paper addresses how physical layer security can protect secret data compare with the traditional cryptographic encryption and which is the better cooperative relaying scheme with the state of the art approached methods in wireless relaying beamforming network.
9p
vivirginia2711
09-12-2020
14
2
Download
-
In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses the security of the method encrypting directly QAM symbols instead of input bit-stream.
8p
tamynhan6
14-09-2020
33
3
Download
-
This paper proposes a block crypto system that uses cyclic geometric progressions over polynomial rings as encryption function, and its encryption diagram is based on unbalanced Feistel network with four branches. All the sub keys in encryption steps are also elements in cyclic geometric progressions over polynomial ring with two cyclotomic cosets. By using this crypto system, we apply to a hash function with 512 bits output length. Some diffusion simulations of the proposed crypto system and hash function are also presented.
8p
minhxaminhyeu4
15-07-2019
21
0
Download
-
In this paper we propose a new method to manage secure group using binomial key tree approach. We show that number of encryptions performed and rekey messages constructed during membership change are less compared to the scheme proposed by Wong and others. In our scheme, it is not required to balance the tree after membership change.
10p
hongnhan878
12-04-2019
18
2
Download
-
There are various encryption methods to secure image from unauthorized parties. This paper is an implementation of a color image encryption algorithm based on a novel three dimensional chaotic system using a random permutation technique.
8p
blossom162
31-03-2019
13
1
Download
-
The proposed solutions focus on applying encryption methods to the transmitted keys and enabling two-way communication on UAP. From performance evaluation, we show that our proposed methods are able to address the security concerns of ASK-WAP and UAP, while at the same time achieving acceptable communication overheads.
7p
byphasse043256
23-03-2019
10
2
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)