Siga este enlace para ver otros tipos de publicaciones sobre el tema: Secret-key cryptography.

Artículos de revistas sobre el tema "Secret-key cryptography"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Secret-key cryptography".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Liu, Shuiyin, Yi Hong, and Emanuele Viterbo. "Unshared Secret Key Cryptography." IEEE Transactions on Wireless Communications 13, no. 12 (2014): 6670–83. http://dx.doi.org/10.1109/twc.2014.2364022.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Girija, Rani Suthoju, and Suresh babu M. "Cryptographic Services to Enforce Secure Messaging and Data Storage." International Journal of Innovative Science and Research Technology 7, no. 11 (2022): 1693–96. https://doi.org/10.5281/zenodo.7478875.

Texto completo
Resumen
In secret key cryptography, a single key is used for both encryption and decryption. It achieves privacy and confidentiality. In this, sender sends the cipher text by encrypting the plain text with a secret key and receiver decrypts the cipher text by using same secret key to generate original plain text. The secret key must be shared between two authorized users secretly to apply at both the ends for encrypting and decrypting. Major challenge of secret key cryptography is the key sharing i.e., distribution of secret key to the sender and the receiver. This paper discusses the symmetric key cr
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

NAGY, NAYA, MARIUS NAGY, and SELIM G. AKL. "KEY DISTRIBUTION VERSUS KEY ENHANCEMENT IN QUANTUM CRYPTOGRAPHY." Parallel Processing Letters 20, no. 03 (2010): 239–50. http://dx.doi.org/10.1142/s0129626410000193.

Texto completo
Resumen
It has been said that quantum cryptography in general offers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, can use quantum protocols to establish a new large secret key. This large secret key can be arbitrarily long and is unbreakable. Thus, to date, the main contribution of quantum cryptography has been believed to be quantum key enhancement. This paper shows that quantum cryptography can do significantly more. The quantum protocol described here distributes an unbreakable secret key to the two parties by relying on publ
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Joye, Marc, and Sung-Ming Yen. "ID-based secret-key cryptography." ACM SIGOPS Operating Systems Review 32, no. 4 (1998): 33–39. http://dx.doi.org/10.1145/302350.302359.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Kak, S. C. "Secret-hardware public-key cryptography." IEE Proceedings E Computers and Digital Techniques 133, no. 2 (1986): 94. http://dx.doi.org/10.1049/ip-e.1986.0010.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Septafiansyah, Dwi Putra, Yudhiprawira Mario, Sutikno Sarwono, Kurniawan Yusuf, and Suwandi Ahmad Adang. "Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1282–89. https://doi.org/10.12928/TELKOMNIKA.v17i3.9384.

Texto completo
Resumen
Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware’s power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses d
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Makeri, Yakubu Ajiji. "INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT." Acta Informatica Malaysia 4, no. 1 (2020): 19–21. http://dx.doi.org/10.26480/aim.01.2020.19.21.

Texto completo
Resumen
Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme. Identity-based (ID-based) cryptography is very useful because it simplifies certificate management in public-key cryptocurrency. For the design of the Integrated File Level Cryptographic Access Control (IFLCAC) system, it makes file security much easier for the end-user. This system combines the advantages of traditional file-level cryptography
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Pallavi, Vijay Chavan, Mohammad Atique Dr., and Latesh Malik Dr. "Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares." International Journal of Network Security & Its Applications (IJNSA) 6, no. 1 (2014): 91–102. https://doi.org/10.5281/zenodo.6471758.

Texto completo
Resumen
Novel idea of hierarchical visual cryptography is stated in this paper. The key concept of hierarchical visual cryptography is based upon visual cryptography. Visual cryptography encrypts secret information into two pieces called as shares. These two shares are stacked together by logical XOR operation to reveal the original secret. Hierarchical visual cryptography encrypts the secret in various levels. The encryption in turn is expansionless. The original secret size is retained in the shares at all levels. In this paper secret is encrypted at two different levels. Four shares are generated o
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Sagala, Sarah. "Application of Diffie-Hellman Algorithm Method (Key-Exchange) in Cryptography." Login : Jurnal Teknologi Komputer 18, no. 02 (2024): 114–19. https://doi.org/10.58471/login.v18i02.114.

Texto completo
Resumen
In cryptography, key exchange security is essential. Because the message code can only be a message that is analyzed with a key offer that matches this message. Secret messages can be delivered through symmetric cryptographic algorithms with coded keys or with key exchange algorithms. One of the key exchange methods that has been developed is Diffie-Hellman Key-Exchange (DHKE). Diffie-Hellman is a simple method used to generate a key between two parties in order to communicate securely. The two parties running this algorithm have their own secret variables, by exchanging two public variable va
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Dubey, Praveer, and Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography." International Journal of Current Engineering and Technology 10, no. 06 (2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.

Texto completo
Resumen
Quantum Cryptography is an approach to securing communications by applying the phenomena of quantum physics. Unlike traditional classical cryptography, which uses mathematical techniques to restrict eavesdroppers, quantum cryptography is focused on the physics of information. The development of quantum cryptography was motivated by the short-comings of classical cryptographic methods, which can be classified as either public-key or secret-key Methods. There are classical solutions to insecure communication all rely on making some or assumption, about the computational power of a cheater, about
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Bachman, Dale J., Ezra A. Brown, and Anderson H. Norton. "Chocolate Key Cryptography." Mathematics Teacher 104, no. 2 (2010): 100–104. http://dx.doi.org/10.5951/mt.104.2.0100.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Bachman, Dale J., Ezra A. Brown, and Anderson H. Norton. "Chocolate Key Cryptography." Mathematics Teacher 104, no. 2 (2010): 100–104. http://dx.doi.org/10.5951/mt.104.2.0100.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Anilkumar, Chunduru, Swathi Lenka, N. Neelima, and Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution." Scalable Computing: Practice and Experience 25, no. 1 (2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.

Texto completo
Resumen
Security awareness is one of the most pressing topics in today's globe. The idea of cryptography is introduced when the subject is information security. Conventional cryptography-based security techniques rely on the presumption that keys are shared before secure connections. The most crucial factor to consider when integrating cryptographic operations into account when integrating cryptographic operations in with any system is the safe key management strategy required for sending and transferring a secret key between two entities The systems will be vulnerable to bugs and possibly fatal exter
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Dayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.

Texto completo
Resumen
Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has le
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Seredynski, Franciszek, Pascal Bouvry, and Albert Y. Zomaya. "Cellular automata computations and secret key cryptography." Parallel Computing 30, no. 5-6 (2004): 753–66. http://dx.doi.org/10.1016/j.parco.2003.12.014.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Zhang, Guoyan. "Secret Key-Awareness Secure in Certificateless Cryptography." Procedia Environmental Sciences 10 (2011): 633–39. http://dx.doi.org/10.1016/j.proenv.2011.09.102.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

I, Arshiya, and Sekar R. "Securing M2m Post-Quantum Secret Key Cryptography." IOSR Journal of Electronics and Communication Engineering 9, no. 1 (2014): 22–27. http://dx.doi.org/10.9790/2834-09132227.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Mukhammadovich, Nurullaev Mirkhon, and Aloev Rakhmatillo Djuraevich. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 911. http://dx.doi.org/10.11591/ijece.v13i1.pp911-919.

Texto completo
Resumen
It is important to create a cryptographic system such that the encryption system does not depend on the secret storage of the algorithm that is part of it, but only on the private key that is kept secret. In practice, key management is a separate area of cryptography, which is considered a problematic area. This paper describes the main characteristics of working with cryptographic key information. In that, the formation of keys and working with cryptographic key information are stored on external media. The random-number generator for generating random numbers used for cryptographic key gener
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Nurullaev, Mirkhon Mukhammadovich, and Rakhmatillo Djuraevich Aloev. "Working with cryptographic key information." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 911–19. https://doi.org/10.11591/ijece.v13i1.pp911-919.

Texto completo
Resumen
It is important to create a cryptographic system such that the encryption system does not depend on the secret storage of the algorithm that is part of it, but only on the private key that is kept secret. In practice, key management is a separate area of cryptography, which is considered a problematic area. This paper describes the main characteristics of working with cryptographic key information. In that, the formation of keys and working with cryptographic key information are stored on external media. The random-number generator for generating random numbers used for cryptographic key gener
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Alqadi, Ziad. "Comparative Analysis of using SIK for Message Cryptography." International Journal of Computer Science and Mobile Computing 12, no. 8 (2023): 45–57. http://dx.doi.org/10.47760/ijcsmc.2023.v12i08.006.

Texto completo
Resumen
The process of selecting the private key, which is used in the process of generating the secret key to encrypt messages, is one of the most important processes used in the encryption process, which determines the efficiency of the method used in terms of security and speed of implementation, because part of the encryption time is consumed in generating the secret key. In this paper research we will introduce two methods of using private keys to generate a secret index key, the first key will be used a chaotic logistic map model to generate a chaotic key, the chaotic key will be converted to se
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Caleg Sadrak Sinaga, Alwi Findo Gultom, Dewi Ruth Nababan, Ari Rivaldo Simanjuntak, and Edi Ginting. "Cryptography With Mceliece Algorithm (Code Based Cryptography)." Jurnal Teknik Indonesia 3, no. 02 (2024): 49–53. https://doi.org/10.58471/ju-ti.v3i02.665.

Texto completo
Resumen
Cryptography is the science used to protect information from unauthorized access. One promising cryptographic algorithm is the McEliece algorithm, which uses code-based cryptography. This algorithm was introduced by Robert McEliece in 1978 and is known for its resistance to attacks from quantum computers, which are expected to be able to break most current cryptographic algorithms. The McEliece algorithm uses binary Goppa code for encryption and decryption, offering high execution speed and resistance to various types of attacks. Although one of its main drawbacks is the large public key size,
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Octora Ginting, Ferraro S., Veithzal Rivai Zainal, and Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization." Journal of Accounting and Finance Management 3, no. 6 (2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.

Texto completo
Resumen
Security method of data transmission process has been growing rapidly with the science of cryptography. Cryptography can provide security services that includes security aspects like confidentiality, data integrity, authentication and non-repudiation. Modern cryptography uses a key that must be kept secret to overcome the problem of cryptographic security. Problem in the use of the same key by two entities that communicate with each other in exchanging messages is a way to distribute the key. This problem can be overcome by using public-key cryptography, which allows users to communicate secur
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Minal, Lopes1 and Dr. Nisha Sarwade2. "Cryptography from Quantum Mechanical Viewpoint." International Journal on Cryptography and Information Security (IJCIS) 4, no. 2 (2014): 13. https://doi.org/10.5281/zenodo.7379782.

Texto completo
Resumen
Cryptography is an art and science of secure communication. Here the sender and receiver are guaranteed the security through encryption of their data, with the help of a common key. Both the parties should agree on this key prior to communication. The cryptographic systems which perform these tasks are designed to keep the key secret while assuming that the algorithm used for encryption and decryption is public. Thus key exchange is a very sensitive issue. In modern cryptographic algorithms this security is based on the mathematical complexity of the algorithm. But quantum computation is expec
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Maram, Balajee, Y. Ramesh Kumar, and K. Lakshmana Rao. "NARSKCA: Novel and robust symmetric key cryptography algorithm." International Journal of Scientific World 3, no. 2 (2015): 244. http://dx.doi.org/10.14419/ijsw.v3i2.5111.

Texto completo
Resumen
<p>In this research paper, a novel and strong symmetric key cryptography algorithm is proposed. NARSKCA is based on several symmetric cryptographic algorithms. NARSKCA is very simple that uses character converting algorithm, Fibonacci Number Series, Lucas Number series and bitwise XOR. In NARSKCA, 32 files are shared-secret files plays a vital role in this Proposed Algorithm. The Sub-keys are generated from those 32 shared-secret files which are useful in different rounds of Encryption and Decryption Process. The most important feature is the calculation of the final key from the Sub-Key
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Tseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server." Information Technology And Control 49, no. 4 (2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.

Texto completo
Resumen
Certificateless public-key system (CL-PKS) is a significant public-key cryptography and it solves both the key escrow and certificate management problems. Outsourced revocable certificateless public-key system (ORCL-PKS) with a cloud revocation server (CRS) not only provides a revocation mechanism, but also further outsources the revocation functionality to the CRS to reduce the computational burden of the key generation center (KGC). Recently, side-channel attacks have threatened some existing conventional cryptography (including CL-PKS). Indeed, adversaries can apply side-channel attacks to
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Geetha, M., and K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS." IJISCS (International Journal of Information System and Computer Science) 2, no. 3 (2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.

Texto completo
Resumen
With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligibl
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Nong Phuong Trang and Luu Hong Dung. "A type of public - key block cipher algorithm." Journal of Military Science and Technology, CSCE7 (December 30, 2023): 50–60. http://dx.doi.org/10.54939/1859-1043.j.mst.csce7.2023.49-59.

Texto completo
Resumen
The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Subhalaxmi Sabitri Das, Subhalaxmi Sabitri Das, Sachin Jena Sachin Jena, and H. Dipali Singh H.Dipali Singh. "The Role of Cryptography in Cyber Security." International Journal of Engineering and Science Invention 14, no. 5 (2025): 48–54. https://doi.org/10.35629/6734-14054854.

Texto completo
Resumen
One description of cryptography is the study and practice of information concealment. Cryptography intersects with fields like computer wisdom and mathematics. Among the terms used in this term paper are plaintext, or information to be conveyed, Cipher textbook, or ordinary textbook that has been made incomprehensible by an operation of a fine procedure, The key is a numerical value, formula, or procedure that establishes how a plaintext communication is translated or deciphered. The cryptographic algorithm, also, is a fine formula that's used to tousle the plain textbook to produce cipher tex
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Kaushik, Bharti, Vikas Malik, and Vinod Saroha. "A Review Paper on Data Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1986–92. http://dx.doi.org/10.22214/ijraset.2023.50101.

Texto completo
Resumen
Abstract: Cryptography is the technique for hiding data and information from unauthorized users. It is the art of achieving security by encoding messages to make them non-readable. When we send simple message from one location to another then this message called plain text is visible to anybody. If we want to codify the message called cipher text so that no one can easily understand the meaning of message then we use cryptography techniques. There are numerous applications where this technology is used such as ATM pin, Password, Credit Card number or any other secret communication. Cryptograph
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Novianti, Chofifah Alfin, Muhammad Khudzaifah, and Mohammad Nafie Jauhari. "Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks." Jurnal Riset Mahasiswa Matematika 3, no. 1 (2023): 10–25. http://dx.doi.org/10.18860/jrmm.v3i1.22292.

Texto completo
Resumen
A secret message is a message that can only be seen by those who are entitled. In its delivery, a procedure is needed to keep the secret message secure, which is called cryptography. This research uses hybrid cryptography Cipher Block Chaining (CBC) and Merkle-Hellman Knapsack. The purpose of this research is to find out the encryption and decryption process of hybrid cryptography Cipher Block Chaining (CBC) and Merkle-Hellman Knapsack. The stages in this research use a qualitative approach with the library research method. In the encryption process with CBC, plaintext is encrypted first and t
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Mankovskyy, S., and Yu Matiieshyn. "PYTHON MODEL OF SECRET KEY AGREEMENT IN THE GROUP OF ARBITRARY NUMBER OF PARTICIPANTS." Information and communication technologies, electronic engineering 4, no. 1 (2024): 93–101. http://dx.doi.org/10.23939/ictee2024.01.093.

Texto completo
Resumen
The article is devoted to the problem of common secret key agreement in a group of an arbitrary number of participants. Data is exchanged between participants through open data channels. The problem of sharing a secret key over open data channels arose due to the need for a secure exchange of information between two or more parties that may be remote from each other and do not have a common confidential communication channel. Reliable methods of secret key exchange, such as transferring the key in person or using a secure channel, are not practical in remote or scalable scenarios. In the proce
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Nguyen, Thi-Nhung. "Privacy preserving using extended euclidean – algorithm applied to RSA." Tạp chí Khoa học - Trường Đại học Sư phạm Hà Nội 2 1, no. 2 (2023): 53–63. http://dx.doi.org/10.56764/hpu2.jos.2023.1.2.53-63.

Texto completo
Resumen
RSA cryptography is a strong encryption method widely used in online transactions. Using the extended Euclidean algorithm is an important and efficient technique for finding the secret key in RSA cryptography. This study provides an implementation of the extended Euclidean algorithm to find secret keys based on RSA cryptography and hopes that it can be of help to experts in the field of information security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Sasongko, Arif, Hidayat Hidayat, Yusuf Kurniawan, and Sarwono Sutikno. "Architecture for the Secret-Key Bc3 Cryptography Algorithm." ITB Journal of Information and Communication Technology 5, no. 2 (2011): 125–40. http://dx.doi.org/10.5614/itbj.ict.2011.5.2.4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Huang, Jianye, Qiong Huang, and Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting." International Journal of Foundations of Computer Science 28, no. 06 (2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.

Texto completo
Resumen
Traditional cryptography considers the security of cryptosystems when the attackers have no access to the secret key. However, due to the imperfect implementation of cryptosystems, the attackers are able to obtain partial secret state of the systems via side-channel attacks, which are not considered in the traditional security notions of cryptographic primitives, including digital signature, and thus break their security. Leakage-resilient cryptography was then proposed to solve the problem. Recently, Wang et al. showed that any signature scheme can be transformed to a strongly unforgeable one
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Chen, Jingyu, Haitao Deng, Huachang Su, Minghao Yuan, and Yongjun Ren. "Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey." Electronics 13, no. 2 (2024): 287. http://dx.doi.org/10.3390/electronics13020287.

Texto completo
Resumen
As the most popular cryptographic scheme in the post-quantum field, lattices have received extensive attention and research. Not only do they provide quantum-resistant security, they also enable the construction of complex applications. Currently, lattice cryptography schemes based on different difficult problems have been applied in different fields. The threshold secret sharing (TSS) scheme is an important field of cryptography and has important application value and development prospects in key protection, secure multi-party computation, privacy protection, etc. However, with the rapid deve
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Thottempudi, Pardhu, Sateesh R., Naveen K., and Mani Raj K. "Implementation of Steganographic Algorithms Based on Exact Histogram Matching and Colour Visual Cryptography." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 519–22. https://doi.org/10.35940/ijeat.B3006.129219.

Texto completo
Resumen
Sensitive secret data transmission through internet has been of great security concern which can be overcome by steganographic methods achieved through secret image sharing. Two novel steganographic secret algorithms based on colour visual cryptography and exact histogram specification is proposed in the present study. The former approach combines colour visual cryptography with a secret key to produce less distorted meaningful share images. A specified histogram acts as the key for the second approach and provides better security and data obscurity compared to conventional approaches. A novel
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Shankar, K., and P. Eswaran. "RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique." Journal of Circuits, Systems and Computers 25, no. 11 (2016): 1650138. http://dx.doi.org/10.1142/s0218126616501383.

Texto completo
Resumen
Many shares are generated from the secret images that are illogical containing certain message within them in visual cryptography. When all shares are piled jointly, they tend to expose the secret of the image. The multiple shares are used to transfer the secret image by using the encryption and decryption process by means of the elliptic curve cryptography (ECC) technique. In ECC method, the public key is randomly generated in the encryption process and decryption process, the private key ([Formula: see text]) is generated by utilizing the optimization technique and for evaluating the perform
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Abushgra, Abdulbast A. "Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review." Cryptography 6, no. 1 (2022): 12. http://dx.doi.org/10.3390/cryptography6010012.

Texto completo
Resumen
Cryptography is an unexpected revolution in information security in the recent decades, where remarkable improvements have been created to provide confidentiality and integrity. Quantum cryptography is one such improvement that has grown rapidly since the first announced protocol. Quantum cryptography contains substantial elements that must be addressed to ensure secure communication between legitimate parties. Quantum key distribution (QKD), a technique for creating a secret key, is one of the most interesting areas in quantum cryptography. This paper reviews some well-known quantum key distr
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Paruchuri, Vijaya Lakshmi, Dr R. Sridevi, and K. S. SadaSiva Rao. "Image Steganography combined with Cryptography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 1 (2013): 976–84. http://dx.doi.org/10.24297/ijct.v9i1.4160.

Texto completo
Resumen
Steganography is the science of invisible communication. Apart from the sender and intended recipient no one suspects the existence of the message. Using Steganography, information can be hidden in various mediums known as carriers. The carriers can be images, audio files, video files and text files. Image Steganography is a technique of using an image file as a carrier. Cryptography protects the information by applying the encryption and decryption techniques, so that the secret message can be understood only by the right person.This paper proposes a method, which combines the techniques of S
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Incze, Arpad. "Pixel-sieve cryptographic primitives with LSB steganography." Global Journal of Information Technology: Emerging Technologies 7, no. 1 (2017): 14–22. http://dx.doi.org/10.18844/gjit.v7i1.1934.

Texto completo
Resumen
AbstractThis paper contains a brief description of new approach regarding LSB steganography. The novelty of the method resides in the combination of LSB (Least Significant Bits) steganography with some primitives of the pixel-sieve/bit-sieve cryptographic method. In short, we propose to use two or more carrier images and the sieving algorithm, borrowed from the pixel sieve primitive, to determine which carrier image will receive the next set of bits of the secret message. While in classic LSB steganography the secret message must be encrypted prior to embed the information into the carrier ima
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Anirban, Bhowmik, Karforma Sunil, and Dey Joydeep. "Recurrence relation and DNA sequence: A state-of-art technique for secret sharing." International Journal of Reconfigurable and Embedded Systems 10, no. 1 (2021): 65–76. https://doi.org/10.11591/ijres.v10.i1.pp65-76.

Texto completo
Resumen
During the transmission over the Internet, protection of data and information is an important issue. Efficient cryptographic techniques are used for protection but everything depends on the encryption key and robustness of encryption algorithm. Threshold cryptography provides the development of reliable and strong encryption and key management machine which can reconstruct the message even in the case of destruction of some particular numbers of shares and at the opposite the data cannot be reconstructed unless an allowable set of shares are been gathered. The earlier techniques available in l
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

R, Nesamalar, and Dr Ravikumar K. "Proficient and Safe Token with Secret and Public Keys Sharing Algorithm for Preventing Cryptographic Key Leakage in Wireless Sensor Network." International Journal of Engineering Research in Electronics and Communication Engineering 9, no. 9 (2022): 1–6. http://dx.doi.org/10.36647/ijerece/09.09.a001.

Texto completo
Resumen
Sensor devices in the Wireless Sensor Network (WSN) are commonly subjected to various forms of attacks, such as flood attacks, eavesdropping attacks, etc. When an attacker compromises a sensor device, the sensor device's data contents become non-confidential and are grabbed by the attacker, putting the entire network at risk. As a result, to prevent key leaks in WSN networks, this paper proposes a Token with Secret and Public Keys Sharing (TSP-KS) algorithm. In the existence of attackers, cryptography is used to provide secure communication. A traditional public-key cryptosystem is appropriate
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

WANG, XINGYUAN, CHAOFENG DUAN, and NINI GU. "A NEW CHAOTIC CRYPTOGRAPHY BASED ON ERGODICITY." International Journal of Modern Physics B 22, no. 07 (2008): 901–8. http://dx.doi.org/10.1142/s0217979208038983.

Texto completo
Resumen
This paper analyzes the encryption and weaknesses of E. Álvarez cryptography. On the basis of this, a new chaotic cryptography based on ergodicity is presented. The control parameter and the initial condition of the chaotic system are chosen as a secret key. A bit chain is generated by iterating the chaotic map, and the location where a plaintext grouping appears in the chain is found. We then write down the number of iterations of the chaotic map as the ciphertext grouping. Several weaknesses of the E. Álvarez cryptography are avoided in the new scheme, and the security of the new scheme is i
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

International, Journal of Computer Science Engineering and Applications (IJCSEA). "A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication." International Journal of Computer Science, Engineering and Applications (IJCSEA) 1, no. 1 (2024): 1–10. https://doi.org/10.5281/zenodo.14189740.

Texto completo
Resumen
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, th
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

G. S . Wijesiri, P. A. S. D. Perera,. "Encryption and Decryption Algorithms in Symmetric Key Cryptography Using Graph Theory." Psychology and Education Journal 58, no. 1 (2021): 3420–27. http://dx.doi.org/10.17762/pae.v58i1.1280.

Texto completo
Resumen
The present-day society depends heavily on digital technology where it is used in many applications such as banking and e-commerce transactions, computer passwords, etc. Therefore, it is important to protect information when storing and sharing them. Cryptography is the study of secret writing which applies complex math rules to convert the original message into an incomprehensible form. Graph theory is applied in the field of cryptography as graphs can be simply converted into matrices There are two approaches of cryptography; symmetric cryptography and asymmetric cryptography. This paper pro
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Abu, Salim, Tripathi Sachin, and Kumar Tiwari Rajesh. "APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE ACCESS CONTROL IN THE CLOUD." International Journal of Computer Networks & Communications (IJCNC) 11, no. 4 (2019): 121–35. https://doi.org/10.5281/zenodo.3445799.

Texto completo
Resumen
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy –
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Alqadi, Ziad, Yousif Eltous, and Amjad Al Hindi. "Secure, Image based Private Key for Secret Message Cryptography." International Journal of Computer Applications 183, no. 41 (2021): 1–8. http://dx.doi.org/10.5120/ijca2021921802.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Kr. Naskar, Prabir, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, and Atal Chaudhuri. "Shared Cryptography with Embedded Session Key for Secret Audio." International Journal of Computer Applications 26, no. 8 (2011): 5–9. http://dx.doi.org/10.5120/3128-4305.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Sholihat Ruhaedi, Hedy, and Alam Rahmatulloh. "DATA SECURITY SCHEME WITH A COMBINATION OF ADVANCED ENCRYPTION STANDARD (AES) AND RIVEST SHAMIR ALDEMAN (RSA) ALGORITHMS." Antivirus : Jurnal Ilmiah Teknik Informatika 18, no. 2 (2024): 177–90. https://doi.org/10.35457/antivirus.v18i2.3369.

Texto completo
Resumen
The rapid development of data drives the need for security in the data transmission process, with the aim of preventing access by unwanted parties to view the contents of the data sent. In order to achieve an optimal level of security, one of the strategies used is the application of cryptography. Cryptography using the Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) algorithms separately has often been used to protect the security of messages, whether in the form of text or digital images. This research will utilize a combination of the AES and RSA algorithms. This merger a
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Al-Saleh, Salah Mohammed, Hind Alhusban, Shatha Fawaz abd Alrahim Ghazal, Reem S. Khaldi, Saad Musa Ali Khalifah, and Amal Abdelfattah Rabah Alsedawi. "MRBM Reordering for Efficient Secret Message Cryptography." International Journal of Computer Science and Mobile Computing 13, no. 7 (2024): 1–11. http://dx.doi.org/10.47760/ijcsmc.2024.v13i07.001.

Texto completo
Resumen
An efficient method of secret message cryptography will be introduced; this method will be efficiently used to encrypt-decrypt short and long messages. The introduced method will use a simplified encryption and decryption functions, these functions will use a simple message bits reordering to get the encrypted and decrypted messages, the reordering operations will be applied based on the contents of the generated secret indices key. A private key will be used to generate the required indices key, this key will have a long key capable to provide a huge key space to protect hacking attacks, the
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!