To see the other types of publications on this topic, follow the link: CBC mode.

Journal articles on the topic 'CBC mode'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'CBC mode.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chang, Kai-Chun, You-Tun Teng, and Wen-Long Chin. "High-Throughput CBC Mode Crypto Circuit." Electrical Science & Engineering 5, no. 1 (2023): 20–30. http://dx.doi.org/10.30564/ese.v5i1.5636.

Full text
Abstract:
The objective of this study is to investigate a high-throughput cipher-block chaining (CBC) mode crypto circuit, which can be embedded in commercial home gateways or switches/routers. Concurrently, the area efficiency of block ciphers can be improved as well. However, the CBC mode encounters the problem of data dependency. To solve this issue, a data scheduling mechanism of network packets is proposed to eliminate the data dependency of input data for CBC mode pipelined crypto engines. The proposed CBC mode architecture can be applied to advanced encryption standards (AES), triple data encrypt
APA, Harvard, Vancouver, ISO, and other styles
2

Tan, Cheng, Xiaoyan Deng, and Lijun Zhang. "Identification of Block Ciphers under CBC Mode." Procedia Computer Science 131 (2018): 65–71. http://dx.doi.org/10.1016/j.procs.2018.04.186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alslman, Yasmeen Shaher, Ashraf Ahmad, and Yousef AbuHour. "Enhanced and authenticated cipher block chaining mode." Bulletin of Electrical Engineering and Informatics 12, no. 4 (2023): 2357–62. http://dx.doi.org/10.11591/beei.v12i4.5113.

Full text
Abstract:
Due to the increased attacks on different applications, data security has become crucial. Many modes can be used to operate the advanced encryption standard (AES), some of which provide integrity, and some outperform other modes in security and simplicity. In this paper, the chain block cipher (CBC) mode has been modified to provide more security to the encrypted data by making it robust against the bit-flipping attack and adding an integrity approach using the keyedhash function. In addition, using the keyd-hash function increases the number of keys needed in CBC-AES to two keys, and this can
APA, Harvard, Vancouver, ISO, and other styles
4

Alslman, Yasmeen Shaher, Ashraf Ahmad, and Yousef AbuHour. "Enhanced and authenticated cipher block chaining mode." Bulletin of Electrical Engineering and Informatics 12, no. 4 (2023): 2357–62. http://dx.doi.org/10.11591/eei.v12i4.5113.

Full text
Abstract:
Due to the increased attacks on different applications, data security has become crucial. Many modes can be used to operate the advanced encryption standard (AES), some of which provide integrity, and some outperform other modes in security and simplicity. In this paper, the chain block cipher (CBC) mode has been modified to provide more security to the encrypted data by making it robust against the bit-flipping attack and adding an integrity approach using the keyedhash function. In addition, using the keyd-hash function increases the number of keys needed in CBC-AES to two keys, and this can
APA, Harvard, Vancouver, ISO, and other styles
5

Abidi, Abdessalem, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, and Christophe Guyeux. "Proving Chaotic Behavior of CBC Mode of Operation." International Journal of Bifurcation and Chaos 26, no. 07 (2016): 1650113. http://dx.doi.org/10.1142/s0218127416501133.

Full text
Abstract:
The cipher block chaining (CBC) mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting that is used in various applications. In this paper, we have mathematically proven that, under some conditions, the CBC mode of operation can admit a chaotic behavior according to Devaney. Some cases will be properly studied in order to provide evidence for this idea.
APA, Harvard, Vancouver, ISO, and other styles
6

Rizky, Putri Alifia, Sopian Soim, and Sholihin Sholihin. "Implementasi Algoritma Kriptografi AES CBC Untuk Keamanan Komunikasi Data Pada Hardware." Jurnal RESISTOR (Rekayasa Sistem Komputer) 7, no. 2 (2024): 71–78. https://doi.org/10.31598/jurnalresistor.v7i2.1650.

Full text
Abstract:
Perkembangan teknologi informasi semakin berkembang dengan pesat, keamanan komunikasi data menjadi sangat penting. Penelitian ini mengembangkan algoritma kriptografi Advanced Encryption Standard (AES) dengan mode operasi Cipher Block Chaining (CBC) untuk meningkatkan keamanan komunikasi data. Tujuannya adalah menghasilkan algoritma AES-CBC yang lebih efektif dan efisien dalam melindungi data. Metode penelitian meliputi studi literatur, perancangan perangkat keras dan lunak, integrasi sistem, pengujian, pengambilan data, dan analisis. Implementasi dilakukan pada perangkat keras berbasis Arduino
APA, Harvard, Vancouver, ISO, and other styles
7

Antariksa, Feillyan Alfreda. "Ransomware Attack using AES Encryption on ECB, CBC and CFB Mode." Jurnal Ilmu Komputer 12, no. 1 (2019): 8. http://dx.doi.org/10.24843/jik.2019.v12.i01.p06.

Full text
Abstract:
With the help of internet, users are faster getting data that they needed. It’s possible that villain insert an evil program (malware) without user knowing it. One of the malwares that spread like a plague right now is ransomware. The infected computer system will encrypt all files on the computer and blackmail the users to pay some money if you want to access back your files. For this experiment it’s using 2 approach, first is using online attack and second is offline attack. Ransomware in this experiment is using AES 256 for encrypting the files and using ECB, CBC and CFB mode for comparing
APA, Harvard, Vancouver, ISO, and other styles
8

Hwang, Seongjin, and Changhoon Lee. "Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD." Journal of Society for e-Business Studies 20, no. 1 (2015): 89–97. http://dx.doi.org/10.7838/jsebs.2015.20.1.089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aliyah, Jannatun. "APLIKASI MOBILE UNTUK ENKRIPSI DATA GAMBAR MENGGUNAKAN KOMBINASI FUNGSI XOR DAN MODE OPERASI CBC." Jurnal Informatika, Teknologi dan Sains 2, no. 4 (2020): 214–22. http://dx.doi.org/10.51401/jinteks.v2i4.824.

Full text
Abstract:
Dalam tulisan ini memaparkan pembuatan aplikasi kriptografi dan mengimplementasikan model enkripsi pada datagambar. Tujuannya untuk keamanan pada penyimpanan file gambar. Proses enkripsi pada gambar akan menghasilkan hasilenkripsi yang dapat merahasiakan gambar. Sebaliknya, proses dekripsi akan mengembalikan gambar yang dirahasiakantersebut kembali menjadi gambar aslinya. Metode yang digunakan dalam enkripsi dan dekripsi data gambar ini adalahkombinasi fungsi XOR dan mode operasi CBC (chipherblock Chaining). Dimana enkripsi yang dilakukan pertama kali denganfungsi XOR kemudian dilanjutkan deng
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Jiajian, Shuai Cao, and Erol Yilmaz. "Characterization of Macro Mechanical Properties and Microstructures of Cement-Based Composites Prepared from Fly Ash, Gypsum and Steel Slag." Minerals 12, no. 1 (2021): 6. http://dx.doi.org/10.3390/min12010006.

Full text
Abstract:
Using solid wastes (SWs) as backfilling material to fill underground mined-out areas (UMOAs) solved the environmental problems caused by SWs and reduced the backfilling cost. In this study, fly ash (FA), gypsum and steel slag (SS) were used to prepare cement-based composites (CBC). The uniaxial compression, computed tomography (CT) and scanning electron microscope (SEM) laboratory experiments were conducted to explore the macro and micromechanical properties of CBC. The findings showed that the uniaxial compressive strength (UCS) of CBC with a curing time of 7 d could reach 6.54 MPa. The incre
APA, Harvard, Vancouver, ISO, and other styles
11

Kuo-Tsang, Huang, Chiu Jung-Hui, and Shen Sung-Shiou. "A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 1 (2013): 17–36. https://doi.org/10.5281/zenodo.3786423.

Full text
Abstract:
Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality to keep up with varied environments and provide the various choices, such as multi-mode IPSec support. To begin with we will provide a brief background on the modes of operation for symmetric-key block ciphers. Different block cipher modes of operation have distinct characteristics. For example, the cipher block chaining (CBC) mode is suitable for operating environments that require self-synchronizing capabilities, and the output feedback (OFB) mode requires encryption modules only. When u
APA, Harvard, Vancouver, ISO, and other styles
12

Najah, Maulidyah Lailatun, and Kiswara Agung Santoso. "KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING." Majalah Ilmiah Matematika dan Statistika 21, no. 2 (2021): 101. http://dx.doi.org/10.19184/mims.v21i2.26978.

Full text
Abstract:
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by irresponsible people. Cryptography is the science or art for security message. In cryptography there are two important processes, namely encryption and decryption. The sender's job is to encrypt the message and the receiver's job is to decrypt the message. The key used for this cryptographic process is the Cipher Block Chaining (CBC) operation mode.
APA, Harvard, Vancouver, ISO, and other styles
13

R. K, Meenakshi, and A. Arivazhagan. "RTL Modelling for the Cipher Blcok Chaining Mode (Cbc) for Data Security." Indonesian Journal of Electrical Engineering and Computer Science 8, no. 3 (2017): 709. http://dx.doi.org/10.11591/ijeecs.v8.i3.pp709-711.

Full text
Abstract:
<p>The demand of satellite communication, the security algorithms are to be designed in the board. The information from the satellite to the ground is required the data security with the cryptographic algorithms. Advanced encryption standard (AES) is one of the promising cryptographic algorithms for the terrestrial communication. In this paper, the encryption and decryption is mainly focused on the cipher block chaining (CBC) mode for achieving the high secured data transmission. For efficient data transmission, the AES algorithm is implemented by using CBC mode. The proposed work is des
APA, Harvard, Vancouver, ISO, and other styles
14

Bron, P., K. Martin, S. Sloan, D. Scherrer, and J. Tazi. "P025 Obefazimod and its active metabolites ABX-464-N-Glu act by stabilizing protein-protein interaction among key RNA biogenesis partners, CBC and ARS2." Journal of Crohn's and Colitis 18, Supplement_1 (2024): i279. http://dx.doi.org/10.1093/ecco-jcc/jjad212.0155.

Full text
Abstract:
Abstract Background Obefazimod is an oral, once-daily, small molecule in phase 3 clinical trials for the treatment of patients with ulcerative colitis (UC). Obefazimod selectively enhances the expression of a single micro-RNA (miRNA), miR-124. miRNAs function by binding to specific mRNA targets and reducing their translation into their respective proteins. Enhanced expression of miR-124 results in a decrease in cytokines and immune cells, helping to reduce inflammation and potentially controlling the progression of chronic conditions like UC. Obefazimod and its main active metabolite, ABX464-N
APA, Harvard, Vancouver, ISO, and other styles
15

Alzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.

Full text
Abstract:
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chaining (CBC), output feedback chaining (OFB), and cipher feedback chaining (CFB). The proposed method works by applying the chaos baker map in different operation modes for encrypting digital images. A group of tests were carried out to examine the impact of operation modes on chaos baker-based encryption. This is done using several encryption metrics like visual inspection, statistical measures, entrop
APA, Harvard, Vancouver, ISO, and other styles
16

Nugrahantoro, Achmad, Abdul Fadlil, and Imam Riadi. "Optimasi Keamanan Informasi Menggunakan Algoritma Advanced Encryption Standard (AES) Mode Chiper Block Chaining (CBC)." Jurnal Ilmiah FIFO 12, no. 1 (2020): 12. http://dx.doi.org/10.22441/fifo.2020.v12i1.002.

Full text
Abstract:
Information comes from a collection of data obtained from various sources that have been processed. An information can help in decision making, so it is considered to have a high effectiveness value for the recipient of the information. Information exchange that utilizes public media internet services is widely used, so the validity of information must be done security from unauthorized attacks. One of them uses cryptography. AES is a method used by the National Institute of Standards and Technology (NIST) as a standard for the United States Federal encryption algorithm. Creativity in cryptogr
APA, Harvard, Vancouver, ISO, and other styles
17

Manullang, Sahat, Allwine, and Jakaria Sembiring. "Pengamanan Data File Dokumen Menggunakan Algoritma Advanced Encryption Standard Mode Chiper Block Chaining." Antivirus : Jurnal Ilmiah Teknik Informatika 17, no. 1 (2023): 52–65. http://dx.doi.org/10.35457/antivirus.v17i1.2811.

Full text
Abstract:
Dalam meningkatkan aspek keamanan suatu data dapat dilakukan dengan pengendalian teknik kriptografi. Algoritma AES (Advanced Encryption Standard) merupakan kriptografi yang dapat digunakan untuk melindungi data atau informasi dengan melakukan mengenkripsi dan mendekripsi blok data sepanjang 128 bit dengan panjang kunci 128 bit, 192 bit, atau 256 bit. Proses pengamanan data dapat dilakukan dengan menggunakan metode Chiper Block Chaining (CBC) dalam mode operasinya. Dalam persiapan untuk melakukan proses enkripsi yang digunakan adalah sebuah file dokumen pdf. Data 16 byte pertama dibaca sebagai
APA, Harvard, Vancouver, ISO, and other styles
18

Shams, Rifat Ara. "Effect of Different Block Cipher Modes of Operation for Secured Data Transmission in Convolutional Encoded Dwt Based Mimo Mc-Cdma System." DIU Journal of Science & Technology 12, no. 1 (2024): 61–69. https://doi.org/10.5281/zenodo.13770817.

Full text
Abstract:
In this proposed model, performance of different block cipher Modes of operation over ZF channel equalization technique and BPSK modulation scheme in DWT based MIMO Multi-Carrier Code Division Multiple Access (MC-CDMA) system has been analyzed for security issues through simulation. This system is proposed using convolutional coding scheme over AWGN and Rayleigh fading channel with Walsh Hadamard code as orthogonal spreading code. In this research paper, the performance of Electronic Codebook (ECB) mode, Cipher Block Chaining (CBC) mode, Cipher Feedback (CFB) mode, Output Feedback (OFB) mode a
APA, Harvard, Vancouver, ISO, and other styles
19

Manullang, Sahat. "Implementasi Kriptografi Pengamanan Data File Dokumen Menggunakan Algoritma Advanced Encryption Standard Mode Chiper Block Chaining." Jurnal Nasional Teknologi Komputer 3, no. 2 (2023): 87–95. http://dx.doi.org/10.61306/jnastek.v3i2.69.

Full text
Abstract:
Dalam meningkatkan aspek keamanan suatu data dapat dilakukan dengan pengendalian teknik kriptografi. Algoritma AES (Advanced Encryption Standard) merupakan kriptografi yang dapat digunakan untuk melindungi data atau informasi dengan melakukan mengenkripsi dan mendekripsi blok data sepanjang 128 bit dengan panjang kunci 128 bit, 192 bit, atau 256 bit. Proses pengamanan data dapat dilakukan dengan menggunakan metode Chiper Block Chaining (CBC) dalam mode operasinya. Dalam persiapan untuk melakukan proses enkripsi yang digunakan adalah sebuah file dokumen pdf. Data 16 byte pertama dibaca sebagai
APA, Harvard, Vancouver, ISO, and other styles
20

Dindiene, Lina, Aleksejus Mihalkovich, Kestutis Luksys, and Eligijus Sakalauskas. "Matrix Power Function Based Block Cipher Operating in CBC Mode." Mathematics 10, no. 12 (2022): 2123. http://dx.doi.org/10.3390/math10122123.

Full text
Abstract:
In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. There we also introduced a concept of single round symmetric encryption, i.e., we used the matrix power function together with some rather simple operations to define a three-step encryption algorithm that needs no additional rounds. Interestingly enough, the newly proposed Shannon cipher possesses the option of parallelization—an important property of efficiently performing calculations using several processors. Relying on our previous proposal, in this study we introduce a conce
APA, Harvard, Vancouver, ISO, and other styles
21

Wahab, Adnan, and Rasiban. "Implementasi Keamanan Absensi Digital Menggunakan Algoritma Kriptografi AES Mode CBC." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 6, no. 2 (2025): 941–51. https://doi.org/10.63447/jimik.v6i2.1347.

Full text
Abstract:
This article discusses the Marketing Public Relations strategy of the Bandar Lampung City Tourism Office in increasing Bandar Lampung City Tourist Visits because the number of domestic tourists experienced an insignificant increase of 4.05% and foreign tourists experienced a decrease of 2.15%. This condition makes the Bandar Lampung City Tourism Office as the implementing element of regional autonomy have responsibility for tourism, one of which is visiting tourists from Bandar Lampung City. This research uses the analysis of Philip Kotler and Kevin Lane Keller's Marketing Public Relations str
APA, Harvard, Vancouver, ISO, and other styles
22

Hidayati, Layli Nur, Gita Fadila Fitriana, and Ipam Fuadina Adam. "Perbandingan Keacakan Citra Enkripsi Algoritma AES dan Camelia Uji NPCR dan UACI." JURIKOM (Jurnal Riset Komputer) 8, no. 6 (2021): 274. http://dx.doi.org/10.30865/jurikom.v8i6.3624.

Full text
Abstract:
The need for data security arises because of the many threats made by outside parties to retrieve data and use it for personal interests. Security for medical images is carried out because medical images store patient health information data that is confidential. In this study, the image data used specifically uses radiological medical images. There are many techniques and algorithms that can be used to secure image data. This study uses the AES and Camellia algorithms which in their application use several different operating modes. To measure the quality of the encrypted image, the randomnes
APA, Harvard, Vancouver, ISO, and other styles
23

Riatma, Galih Putra, Bagas Satya Dian Nugraha, Anugrah Nur Rahmanto, and Fitri Fitri. "Performance Evaluation and the Impact of File Size on Various AES Encryption Modes." JURNAL JARTEL: Jurnal Jaringan Telekomunikasi 15, no. 2 (2025): 121–28. https://doi.org/10.33795/jartel.v15i2.7323.

Full text
Abstract:
Important factors in the system are performance and information security. A secure system does not necessarily have fast performance because it takes time for encryption processing that takes time. For that, the system must use an encryption mode that suits the needs. This study measures the encryption performance of five AES methods, namely AES-ECB, AES-SIV, AES-CBC, AES-EAX, and AES-GCM on text data, and images with sizes of 1KB, 10KB, 100KB, and 1000KB. Performance testing is carried out using the same hardware and software to ensure consistency. From the analysis results, it was found that
APA, Harvard, Vancouver, ISO, and other styles
24

Mohammed Jawad, Bushra, and Saif Al-alak. "Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes." Wasit Journal of Computer and Mathematics Science 2, no. 4 (2023): 87–98. http://dx.doi.org/10.31185/wjcms.203.

Full text
Abstract:
In modern communication systems, secret keys are used to secure sensitive information such as personal data, financial transactions and government secrets. However, the security of these systems is only as strong as the secrecy of the key utilized for encrypting and decrypting the data. The use of easy guessable or compromised keys can lead to unauthorized access, data breaches, and identity theft. Additionally, the distribution and management of secret keys present challenges such as key generation, key distribution, key revocation, and key renewal, which can be complex and costly. Therefore,
APA, Harvard, Vancouver, ISO, and other styles
25

Sinurat, Santana, and Maranatha Pasaribu. "Text Encoding Using Cipher Block Chaining Algorithm." Jurnal Info Sains : Informatika dan Sains 11, no. 2 (2021): 13–17. http://dx.doi.org/10.54209/infosains.v11i2.42.

Full text
Abstract:
. Data confidentiality and security are critical in data communication, both for the purpose of shared security, and for individual privacy. Computer users who want their data unknown to unauthorized parties are always trying to work out how to secure the information that will be communicated or that will be stored. Protection against data confidentiality is increasing, one way is by applying cryptographic science. Cipher Block Chaining (CBC), this mode is a feedback mechanism on a block, and in this case the result of the previous block encryption is feedback into the current block encryption
APA, Harvard, Vancouver, ISO, and other styles
26

Siregar, Salman. "Implementasi Mode Operasi Cipher Block Chaining (CBC) Untuk Mengoptimalkan Algoritma Affine Cipher Dalam Pengamanan Data." Bulletin of Information System Research 1, no. 3 (2023): 99–109. https://doi.org/10.62866/bios.v1i3.28.

Full text
Abstract:
Confidentiality and security of data is of paramount importance in data communication, both for the purpose of shared security, and for individual privacy. Computer users who want their data not to be known by unauthorized parties always try to find ways to secure the information to be communicated or to be stored. Protection of data confidentiality is increasing, one way is by applying the science of cryptography. Cryptography is one of the sciences used to maintain the confidentiality and security of data that has been developing since ancient Greece. Cryptography is growing from the cruel e
APA, Harvard, Vancouver, ISO, and other styles
27

Mahmud, Wildan, and Ery Mintorini. "Pengamanan Data Kombinasi Metode Cipher Block Chaining dan Modifikasi LSB." Techno.Com 19, no. 1 (2020): 97–102. http://dx.doi.org/10.33633/tc.v19i1.3375.

Full text
Abstract:
Perkembangan Internet dan aplikasi berbasis jaringan telah menjangkau ke berbagai macam aplikasi yang memungkinkan seseorang untuk saling berkirim pesan dan informasi tanpa dibatasi jarak dan waktu. Seiring dengan perkembangan itu pula, kerentanan akan aspek keamanan sebuah system juga semakin meningkat. Dalam penelitian ini, peneliti mencoba menerapkan kombinasi antara metode kriptografi dan steganografi yang bertujuan untuk meningkatkan upaya pengamanan sebuah pesan. Kriptografi Cipher Block Chaining (CBC) merupakan kriptografi yang sudah umum digunakan contohnya pada protocol internet TLS d
APA, Harvard, Vancouver, ISO, and other styles
28

Gunawan, Renki, and Elvi Rahmi. "Implementasi Algoritma Blowfish Untuk Pengamanan Data Transaksi Dalam Aplikasi Berbasis Website E-commerce." Techno.Com 24, no. 2 (2025): 427–38. https://doi.org/10.62411/tc.v24i2.12472.

Full text
Abstract:
Keamanan data transaksi merupakan aspek krusial dalam sistem e-commerce, khususnya bagi pelaku usaha kecil menengah (UMKM). Penelitian ini bertujuan untuk mengimplementasikan algoritma Blowfish dengan mode Cipher Block Chaining (CBC) dan panjang kunci 160-bit guna meningkatkan keamanan data transaksi penjualan. Algoritma Blowfish dipilih karena efisien dan mendukung penggunaan Initialization Vector (IV) acak yang memperkuat proteksi terhadap serangan pattern dan dictionary. Data transaksi pelanggan dan pembayaran disimpan dalam bentuk ciphertext menggunakan OpenSSL. Pengujian dilakukan terhada
APA, Harvard, Vancouver, ISO, and other styles
29

Sasongko, Arif, I. M. Narendra Kumara, Arief Wicaksana, Frédéric Rousseau, and Olivier Muller. "Hardware Context Switch-based Cryptographic Accelerator for Handling Multiple Streams." ACM Transactions on Reconfigurable Technology and Systems 14, no. 3 (2021): 1–25. http://dx.doi.org/10.1145/3460941.

Full text
Abstract:
The confidentiality and integrity of a stream has become one of the biggest issues in telecommunication. The best available algorithm handling the confidentiality of a data stream is the symmetric key block cipher combined with a chaining mode of operation such as cipher block chaining (CBC) or counter mode (CTR). This scheme is difficult to accelerate using hardware when multiple streams coexist. This is caused by the computation time requirement and mainly by management of the streams. In most accelerators, computation is treated at the block-level rather than as a stream, making the managem
APA, Harvard, Vancouver, ISO, and other styles
30

Fahlevvi, Mohammad Rezza, Dhita Satria Aprilliana Putra, and Wahyu Ariandi. "ALGORITMA AES128-CBC (ADVANCED ENCRYPTION STANDARD) UNTUK ENKRIPSI DAN DEKRIPSI BERKAS DOKUMEN PT. ADIARTA MUZIZAT." Journal of Innovation And Future Technology (IFTECH) 7, no. 1 (2025): 166–76. https://doi.org/10.47080/iftech.v7i1.3929.

Full text
Abstract:
The rapid advancement of digital technology has increased concerns about data security, especially in document storage and transmission. PT. Adiarta Muzizat, a logistics company, has experienced multiple data breaches, highlighting the need for a more secure encryption method. This study focuses on implementing the Advanced Encryption Standard (AES) 128-bit with Cipher Block Chaining (CBC) mode to enhance document security. The research follows the Rational Unified Process (RUP) methodology, comprising four phases: inception, elaboration, construction, and transition. The encryption and decryp
APA, Harvard, Vancouver, ISO, and other styles
31

Sengamalai, Usha, T. M. Thamizh Thentral, Palanisamy Ramasamy, et al. "Mitigation of Circulating Bearing Current in Induction Motor Drive Using Modified ANN Based MRAS for Traction Application." Mathematics 10, no. 8 (2022): 1220. http://dx.doi.org/10.3390/math10081220.

Full text
Abstract:
Induction motors are popularly used in various applications because of the proposed modest construction, substantiated process, and limited size of specific power. The traditional AC traction drives are experimentally analyzed. There is a high circulating current due to the high Common-Mode Voltage (CMV). The high Circulating Bearing Current (CBC) is a major problem in conventional two-level voltage source inverter fed parallel-connected sensor-based induction motors for traction applications. A sensorless method is well known for shrinking costs and enhancing the reliability of an induction m
APA, Harvard, Vancouver, ISO, and other styles
32

Yeni, Manovri, Rosyidah Siregar, and Tommy Tommy. "Analisis Pengaplikasian Linear Congruential Generator (LCG) pada mode Cipher Block Chaining (CBC) Advanced Encryption Standard (AES)." JiTEKH 11, no. 2 (2023): 105–13. http://dx.doi.org/10.35447/jitekh.v11i2.795.

Full text
Abstract:
The use of the Linear Congruential Generator (LCG) as a part of the Cipher Block Chaining (CBC) method in the Advanced Encryption Standard (AES) has been a focus of international research to enhance data security. In this experiment, chi-square analysis and entropy analysis are employed to evaluate the effectiveness of applying LCG to CBC-AES compared to conventional CBC-AES. The chi-square analysis indicates the highest improvement of 15.1098 and the lowest decrease of -10.4293. This improvement reflects an enhancement in the probability distribution of encrypted data, approaching a random di
APA, Harvard, Vancouver, ISO, and other styles
33

Ngo, Chi Trung, Jason K. Eshraghian, and Jong-Phil Hong. "An Area-Optimized and Power-Efficient CBC-PRESENT and HMAC-PHOTON." Electronics 11, no. 15 (2022): 2380. http://dx.doi.org/10.3390/electronics11152380.

Full text
Abstract:
This paper introduces an area-optimized and power-efficient implementation of the Cipher Block Chaining (CBC) mode for an ultra-lightweight block cipher, PRESENT, and the Keyed-Hash Message Authentication Code (HMAC)-expanded PHOTON by using a feedback path for a single block in the scheme. The proposed scheme is designed, taped out, and integrated as a System-on-a-Chip (SoC) in a 65-nm CMOS process. An experimental analysis and comparison between a conventional implementation of CBC-PRESENT/HMAC-PHOTON with the proposed feedback basis is performed. The proposed CBC-PRESENT/HMAC-PHOTON has 128
APA, Harvard, Vancouver, ISO, and other styles
34

Kim, Chan-Jung. "Prediction of System Parameters of Carbon-Based Composite Structure for Different Carbon Fiber Orientations with Mode Information at Reference Angle Only." Materials 14, no. 24 (2021): 7626. http://dx.doi.org/10.3390/ma14247626.

Full text
Abstract:
The prediction of system parameters is important for understanding the dynamic behavior of composite structures or selecting the configuration of laminated carbon in carbon-based composite (CBC) structures. The dynamic nature of CBC structures allows the representation of system parameters as modal parameters in the frequency domain, where all modal parameters depend on the carbon fiber orientations. In this study, the variation in the system parameters of a carbon fiber was derived from equivalent modal parameters, and the system parameters at a certain carbon fiber orientation were predicted
APA, Harvard, Vancouver, ISO, and other styles
35

ROTH, YUVAL, and RAMESH JAIN. "SIMULATION AND EXPECTATION IN SENSOR-BASED SYSTEMS." International Journal of Pattern Recognition and Artificial Intelligence 07, no. 01 (1993): 145–73. http://dx.doi.org/10.1142/s0218001493000091.

Full text
Abstract:
Simulations have traditionally been used as off-line tools for examining process models and experimenting with system models for which it would have been either impossible or too dangerous, expensive, or time-consuming, to perform with physical systems. We propose a novel way of regarding simulations as part of both the development and the working phases of systems. In our approach simulation is used within the processing and control loop of the system to provide sensor and state expectations. This minimizes the inverse sensory data analysis and model maintenance problems. We refer to this mod
APA, Harvard, Vancouver, ISO, and other styles
36

Penchalaiah, P., and K. Ramesh Reddy. "Random multiple key streams for encryption with added CBC mode of operation." Perspectives in Science 8 (September 2016): 57–60. http://dx.doi.org/10.1016/j.pisc.2016.03.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Rocha, Bruno dos S., Jose´ A. M. Xexe´o, and Renato H. Torres. "Artificial Intelligence Applied to the Identification of Block Ciphers under CBC Mode." International Journal of Computer Applications 185, no. 34 (2023): 1–8. http://dx.doi.org/10.5120/ijca2023923114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

De, Mello Flavio, and José A. M. Xexéo. "Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence." JUCS - Journal of Universal Computer Science 24, no. (1) (2018): 25–42. https://doi.org/10.3217/jucs-024-01-0025.

Full text
Abstract:
This paper analyzes the use of machine learning techniques for the identification of encryption algorithms, from ciphertexts only. The experiment involved corpora of plain texts in seven different languages; seven encryption algorithms, each one in ECB and CBC modes; and six data mining algorithms for classification. The plain text files were encrypted with each cryptographic algorithm under both cipher modes. After that, the ciphertexts were processed to produce metadata, which were then used by the classification algorithms. The overall experiment involved not only a high quantity of ciphert
APA, Harvard, Vancouver, ISO, and other styles
39

Li, Yuanjian, Chunhe Song, Jingya Dong, and Hao Zheng. "An efficient encryption method for smart grid data based on improved CBC mode." Journal of King Saud University - Computer and Information Sciences 35, no. 9 (2023): 101744. http://dx.doi.org/10.1016/j.jksuci.2023.101744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Wati, Vera, Hanifatus Sa’diyah, and Dony Ariyus. "PENDEKATAN STEGO-KRIPTO MODE CIPHER BLOCK CHAINING UNTUK PENGAMANAN INFORMASI PADA CITRA DIGITAL." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 2 (2020): 197–204. http://dx.doi.org/10.33480/jitk.v5i2.1160.

Full text
Abstract:
The digital image can be one of the media for information security. The contents of information have an important value of effectiveness, one of which is as a support in decision making. Then the information needs to be done to safeguard the authority of parties who are not responsible. Such security can utilize Steganography and Cryptography (Stego-Crypto). The method used combines Stego-Crypto by randomizing information using Cipher Block Chaining (CBC) then the encryption results are secured through digital images. Based on the test results by measuring the capacity of information on the im
APA, Harvard, Vancouver, ISO, and other styles
41

Afsari, Melani, Dadang Iskandar Mulyana, Alfiani Damaiyanti, and Naini Sa’adah. "Implementasi Mode Operasi Kombinasi Cipher Block Chaining dan Metode LSB-1 Pada Pengamanan Data text." Jurnal Pendidikan Sains dan Komputer 2, no. 01 (2022): 70–82. http://dx.doi.org/10.47709/jpsk.v2i01.1381.

Full text
Abstract:
Pengamanan data text diperlukan untuk menjaga informasi yang dirahasiakan agar tidak diketahui oleh orang lain kecuali orang yang diberihak untuk itu. Maka diperlukan pengaman data, salah satunya dengan mengkombinasikan Cipher Block Chaning (CBC) dan Metode Least Significant Bit (LSB-1) pada pengamanan data text. Cipher Block Chaning memiliki kecepatan dan efisiensi lebih tinggi dan dinilai lebih mudah diimplementasikan. Sedangkan metode Steganografi Least Significant Bit mampu bekerja secara sederhana namun sangat efektif dalam menyisipkan pesan tersembunyi. Namun, beberapa peneliti dapat men
APA, Harvard, Vancouver, ISO, and other styles
42

Mustafa, Emad Hameed, Mat Ibrahim Masrullizam, and Abd Manap Nurulfajar. "Compression and encryption for ECG biomedical signal in healthcare system." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 6 (2019): 2826–33. https://doi.org/10.12928/TELKOMNIKA.v17i6.13240.

Full text
Abstract:
The ECG data needs large memory storage device due to continuous heart rate logs and vital parameter storage. Thus, efficient compression schemes are applied to it before sending it to the telemedicine center for monitoring and analysis. Proper compression mechanisms can not only improve the storage efficiency but also help in faster porting of data from one device to another due to its compact size. Also, the collected ECG signals are processed through various filtering techniques to remove unnecessary noise and then compressed. In our scheme, we propose use of buffer blocks, which is quite n
APA, Harvard, Vancouver, ISO, and other styles
43

Chhetri, Chhetra Bahadur. "Performance Analysis of Block Chaining Message Authentication Code (CBC MAC) and its Variants." National College of Computer Studies Research Journal 1, no. 1 (2021): 27–41. http://dx.doi.org/10.3126/nccsrj.v1i1.59973.

Full text
Abstract:
The cryptographic algorithms employed in internet security must be able to handle packets which may vary in size over a large range. The majority of cryptography algorithms divide messages into large blocks to process them. due to this fact the messages must be prepared by padding the desired amount of zero bits to induce an integer number of blocks. This process contributes a considerable overhead when the short messages are more dominant within the message stream. In this paper, analyze is targeted on the performance of varied message authentication code generator algorithm supported cipher
APA, Harvard, Vancouver, ISO, and other styles
44

Hamdy, Muhammad Ihsan, Yanti Sopianti, Ekie Gilang Permata, and Muhammad Nur. "Perencanaan Perawatan pada Mesin Cake Breaker Conveyor di Pabrik Kelapa Sawit." Jurnal Teknik Industri: Jurnal Hasil Penelitian dan Karya Ilmiah dalam Bidang Teknik Industri 6, no. 1 (2020): 60. http://dx.doi.org/10.24014/jti.v6i1.10081.

Full text
Abstract:
Penelitian ini dilakukan pada sebuah perusahaan pengolahan kelapa sawit. Permasalahan pada studi ini adalah adanya kerusakan mesin dan belum menemukan solusi hingga saat ini. Reliability Centered Maintenance adalah salah satu metode untuk menentukan tindakan pemeliharaan pada komponen kritis. fokus kajian ini pada mesin Cake Breaker Conveyor (CBC) berdasarkan hasil analisis menggunakan FMEA method (Failure Mode and Effect Analisys). hasilnya diperolah bahwa nilai RPN tertinggi diperoleh pada 4 komponen kritis dari 11 komponen utama mesin Cake Breaker Conveyor (CBC) yaitu komponen bearing, Univ
APA, Harvard, Vancouver, ISO, and other styles
45

Kim, Chan-Jung. "Mode Tracking of Unidirectional Carbon-Based Composite Structures Using Modified Mode Shape Vectors." Crystals 12, no. 2 (2022): 236. http://dx.doi.org/10.3390/cryst12020236.

Full text
Abstract:
A comparison of mode shapes in isotropic structures can be efficiently performed using the modal assurance criterion (MAC) to determine the similarity between mode shape vectors. However, the unidirectional, carbon-based composite (UCBC) structure shows different dynamic characteristics according to the carbon fiber orientation, even for the same structural configuration. The MAC of a certain mode may result in a poor value for the CBC structures in the case of the existence of the distorted mode shape vector from reinforced carbon fibers. In this study, the mode tracking of the UCBC structure
APA, Harvard, Vancouver, ISO, and other styles
46

Gáll, József, Pinar Gürgez, and Géza Horváth. "Adding an Avalanche Effect to a Stream Cipher Suitable for IoT Devices." Electronics 14, no. 13 (2025): 2546. https://doi.org/10.3390/electronics14132546.

Full text
Abstract:
In recent decades, a wide variety of Internet of Things (IoT) devices have been using encrypted communication. Hence, so-called light-weight cryptography has become especially important. The main advantage of stream ciphers is that their complexity, operation requirements, and memory usage are negligible compared to block ciphers. At the same time, these ciphers do not have the avalanche effect typical of block ciphers. The avalanche effect is the most important advantage of a block cipher over a stream cipher. A good block cipher will have an appropriate avalanche effect, whereas stream ciphe
APA, Harvard, Vancouver, ISO, and other styles
47

Joshi, Jay M., Kiran R. Parmar, and Upena D. Dalal. "Design and Implementation of KASUMI Algorithm in ISMACryp Encryption for Video Content Protection in DVB-H Application." Advanced Materials Research 403-408 (November 2011): 3847–53. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.3847.

Full text
Abstract:
Three technologies can be used for content protection in DVB-H; IPSec, SRTP and ISMACryp. ISMA Encryption and Authentication is one of the three chosen technologies for service protection in DVB-H (Digital Video Broadcasting - Handheld), the TV system for portable handheld devices. This paper deals with modification in ISMACryp. The ISMACryp is encoded with MPEG-4 video and MPEG-4 AAC (advanced audio coding), while leaving all structural data as it is. Two modes of ISMACryp are available; the CTR mode (Counter type) and CBC mode (Cipher Block Chaining) mode. Both modes of ISMACryp is based on
APA, Harvard, Vancouver, ISO, and other styles
48

Abidi, Abdessalem, Christophe Guyeux, and Mohsen Machhout. "Evaluation of Chaotic Properties Of CBC Mode of Encryption Embedded with RC5 Block Cipher Algorithm." Interdisciplinary journal of Discontinuity, Nonlinearity, and Complexity 9, no. 4 (2020): 607–18. http://dx.doi.org/10.5890/dnc.2020.12.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Saidi, Riad, Tarek Bentahar, Nada Cherrid, Atef Bentahar, and Hichem Mayache. "Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes." International Journal on Electrical Engineering and Informatics 12, no. 4 (2020): 912–32. http://dx.doi.org/10.15676/ijeei.2020.12.4.13.

Full text
Abstract:
This paper falls within the framework of the security of satellite images, in particular interferograms from an Interferometric Synthetic Aperture Radar (inSAR) system. The innovation of this work consists in the application of a cryptosystem based on two algorithms Advanced Encryption Standard (AES) and the Rivest, Shamir and Adleman (RSA) encryption algorithm for securing interferograms of inSAR systems. AES employs five encryption modes Electronic Code Book (ECB), Cipher Bloc Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and counter-mode encryption (CTR). The use of the AES
APA, Harvard, Vancouver, ISO, and other styles
50

Krishna, Prasad Nandeti, Anshuman Singh Dr., and Mahmoud Yousef Dr. "Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text." International Journal on Cryptography and Information Security (IJCIS) 7, no. 1 (2017): 1–8. https://doi.org/10.5281/zenodo.1172584.

Full text
Abstract:
ABSTRACT This paper proposes a new system of Substitution-Permutation network along with Randomization Expansion of 240 bits of input data. System uses 16 S-Boxes which are selected randomly based on the subkey values throughout 64 rounds of substitution steps. 64 sub-keys are generated during the SubstitutionPermutation process. The middletext is transposed based on decimal value of the sub-key generated during the each round. A CBC mode is the best associated with this system.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!