Skip to main content
This paper is on RSA Encryption Tables.
Digital images have found usage in many applications. These images may contain confidential information and need to be protected when stored on memory or transmitted over networks. Many techniques have been proposed to deal with this... more
Encryption algorithms provide the securely transmitted data over insecure communication channels. In this paper a different stream cipher scheme is presented which is very simple in hardware implementation and provides relatively high... more
The inherent dynamical in grid computing has made it extremely difficult to come up with near-optimal solutions to efficiently schedule tasks in grids. Task Scheduling plays crucial role in Grid computing. It is a challenge-able issue... more
There exist numerous kinds of cryptographic structures. In symmetric cryptography, both sending and receiving events share the identical secret key. While symmetric cryptography is computationally green, it requires that the shared secret... more
There are a lot of Challenges raised over the security of information written to the Mifare classic 1k a Radio Frequency Identification card due to the vulnerability status of this card. The card's information can be traced to another... more
With the massive number of e-Commerce and websites becoming the target of hackers’ attacks in recent years, threats that are commonly targeting web applications include SQL Injection and data theft. Designing, establishing, and... more
It is not secret that the algorithms and methods used to encrypt messages in Arabic language are few and old, there are no modern encryption algorithms to encrypt the Arabic letters along the lines as the encryption algorithms of the... more
Cosa è l'AES? Quanto è difficile decrittare un file criptato con l'AES?
Abstract — Genetic algorithm based Cryptanalysis has gained considerable attention due to its fast convergence time. This paper proposes a Genetic Algorithm (GA) based cryptanalysis scheme for breaking the key employed in Simplified- AES.... more
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe... more
Communication is a basic part of our lives in a daily basis, messages come and go from various places worldwide as long as the user have access to the web. All those messages transform in sets of bytes that will be “surfing” through the... more
Data base security is the mechanisms that protect the data base against intentional or accidental threats. It is also a specialty within the broader discipline of computer security using encryption techniques. Encryption is one of the... more
Encryption algorithms provide the securely transmitted data over insecure communication channels. In this paper a different stream cipher scheme is presented which is very simple in hardware implementation and provides relatively high... more
— The ever-increasing amount of personal or sensitive data stored in a cloud data storage needs to be protected, since losing it is a very serious problem. As their popularity increases, cloud storage is becoming an option for user in... more
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and... more
In  these days communication technology is very advanced. Digital communication has become very important to secure transmission of information between the sender and the receiver. Security for exchange is a very important feature because... more
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe... more
Рассмотрены вопросы построения систем шифрования с использованием технологии виртуальных приборов LabVIEW. Изложены принципы формирования потокового шифра на примере цифрового скремблера, блочного шифра на примере алгоритма шифрования DES... more
In this paper, we propose a novel, secure, and intelligent IoT approach based on agent, we have implemented in the health care domain, where we developed an intelligent patient monitoring system for monitoring the patients heart rate... more
In today’s network-based cloud computing era, software applications are playing big role. The security of these software applications is paramount to the successful use of these applications. These applications utilize cryptographic... more
"Networks are mathematically directed (in practical applications also undirected) graphs and a graph is a one-dimensional abstract complex, i.e., a topological space. Network theory focuses on various topological structures and... more
The widespread use of cryptography is a necessary consequence of the information revolution. With the coming of electronic communications on computer networks, people need a way to ensure that conversations and transactions remain... more
High-speed networks and ubiquitous Internet access become available to users for access anywhere at anytime. Cloud computing is a concept that treats the resources on the Internet as a unified entity, a Cloud storage is a model of... more
Since proof of work was popularized by the Bitcoin project, there has been active research into ways to make Proof of Work (PoW) useful. Unfortunately it has proven remarkably difficult to make PoW serve humans without allowing miners to... more
Playfair is one of the best-known traditional ciphers but it is limited from different aspects. This paper deals with some of its limitations and extensibilities. Proposed modification uses a 7 × 7 matrix with a matrix randomization... more
With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data... more
The purpose of this paper is to present a set of well-investigated Internet of Things (IoT) security guidelines and best practices that others can use as a basis for future standards, certifications, laws, policies and/or product... more
A construction method of í µí±† 8 S-boxes is given in [6]. These í µí±† 8 S-boxes are generated by the action of symmetric group í µí±† 8 on AES S-box and these are 40320 in number. In this paper, we bounce a new method for the... more
Il testo offre una prima introduzione ai concetti chiave dell'informatica, ed è pensato soprattutto per cultori o studenti di discipline umanistiche.
An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from... more
Encryption is almost as old as writing, because as long as people began to write, began to feel the need to hide or not to allow anyone to understand what was written. The purpose of encryption in data transmission is to encode the data... more
Network Security & Cryptography is a concept to protect network and data transmission over wireless network.Data Security is the main aspect of secure data transmission over unreliable network. Network security involves theauthorization... more
Challenges Nigeria organizations are facing which include embezzlement, fraud, misappropriation and mismanagement can be checkmated if there is a proper and secure documentation of all documents. Hence this work focuses on the design and... more
Brain-computer interfaces (BCI) have shown recent potential as a security tool in the field of biometric encryption. Most modern devices contain some form of biometric security such as facial recognition or fingerprint authorization... more
Dikutip oleh Andara Livia (2010), Fast Data Encipherment Algorithm atau yang lebih dikenal dengan FEAL merupakan sebuah enskripsi tipe simetris block ciphers. Algoritma ini diciptakan sebagai bentuk alternatif dari Data Encryption... more
A B S T R A C T Consumers' food choices are often driven by reasons of which consumers are not fully aware. Decision-making about food is influenced by a complex set of emotions, feelings, attitudes, and values that are impossible to... more
Dalam berbagai bidang, aritmetika modulo memiliki peran dan aplikasi yang beraneka ragam.Salah satu aplikasi terpenting dari aritmetika modulo adalah kriptografi. Kriptografi adalah ilmu sekaligus seni untuk menjaga kerahasiaan pesan... more
Data Warehouses (DWs) are the enterprise’s most valuable asset in what concerns critical business information, making them an appealing target for attackers. Packaged database encryption solutions are considered the best solution to... more
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe... more