Academic literature on the topic 'Symmetric encryption techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Symmetric encryption techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Symmetric encryption techniques"

1

Parenreng‬, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (February 16, 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.

Full text
Abstract:
E-mail is a medium of long-distance communication via the internet, which is currently often used for message exchange needs. But the use of e-mail has security problems, especially regarding data leakage when sending messages via e-mail. One of the efforts to improve the security of data and information is the application of cryptographic techniques and methods, namely end-to-end encryption. Cryptography is the science of reducing the risk of security threats by encrypting and decrypting data and information. In the implementation of the e-mail system, at least 2 (two) suitable encryption techniques are needed, namely symmetric encryption techniques to encrypt messages and data to be sent via e-mail effectively and efficiently, and asymmetric encryption techniques used to distribute keys used by symmetric encryption. Therefore, in this study, we use the El-Gamal encryption model to distribute the symmetric key, and the AES encryption model is a fairly secure algorithm to protect message data or confidential information.
APA, Harvard, Vancouver, ISO, and other styles
2

Malhotra, Anoushka, Ashwin Arora, and Dr Manjot Kaur Bhatia. "Symmetric Cryptographic Approaches." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 718–21. http://dx.doi.org/10.22214/ijraset.2022.47982.

Full text
Abstract:
Abstract: In recent decades, information security has become a major concern. They have recently been intensively investigated and developed because they need more encryption and decryption and are tough to breach. These constraints need the use of encryption. In recent years, several academics have developed numerous encryption algorithms, such as AES, DES, 3DES, RC4 Algorithm, Blowfish Algorithm, and others. Data encryption techniques have advanced from relatively easy routes to quite hard mathematical calculations to guarantee excellent communication security. This study compares and contrasts symmetric encryption techniques, as well as attack vulnerabilities
APA, Harvard, Vancouver, ISO, and other styles
3

Chowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (September 10, 2020): 5162. http://dx.doi.org/10.3390/s20185162.

Full text
Abstract:
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
APA, Harvard, Vancouver, ISO, and other styles
4

M, Sreekala, and Varghese Paul. "A Novel Hybrid Encryption Method for Multimedia Encryption Using Elliptic Curve Cryptography and TDMRC." International Journal of Emerging Research in Management and Technology 6, no. 7 (June 29, 2018): 1. http://dx.doi.org/10.23956/ijermt.v6i7.178.

Full text
Abstract:
We are in the era of digital revolution and the benefits are remarkable. People are much dependent on digital technology and can’t survive without it. With the advancement of Internet and its applications, we share a wide range of data including texts, images, audios and videos in a more extensive space and time scope that we never had before. This increases the need for security day by day. Cryptography is an art of Science that uses complex logic in order to design powerful encryption techniques. Both symmetric and asymmetric key encryptions have their own advantages. Time Dependant Multiple Random Cipher(TDMRC) code is one of the best symmetric encryption schemes. Elliptic curve cryptography(ECC) is widely used because of its less key size and faster key generation. This paper proposes a new method of hybrid encryption method using ECC and TDMRC.
APA, Harvard, Vancouver, ISO, and other styles
5

Pushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.

Full text
Abstract:
This paper focuses on analyzing the performance of various encryption algorithms, namely RSA, ECC, and DSA, in terms of encrypting and decrypting sensitive data. Encryption is crucial for ensuring the security of data, and there are two types of encryption algorithms: Symmetric key and Asymmetric-key encryption. RSA is highly secure but has high computation time, whereas ECC provides equivalent security with lower computing power and battery usage. The study compares the implementation and analysis of DES, 3DES, AES, RSA, ECC, and DSA, highlighting their strengths and weaknesses. The paper aims to provide a comprehensive comparison of these cryptographic techniques, including their performances, to assist in selecting the most appropriate algorithm for specific applications.
APA, Harvard, Vancouver, ISO, and other styles
6

Kuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin, and Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (April 1, 2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.

Full text
Abstract:
Today's digital data transmission over unsecured wired and wireless communication channels is making encryption algorithms an increasingly important tool for securing data and information. Hybrid encryption techniques combine encryption schemes of either two symmetric keys or both symmetric and asymmetric encryption methods, and that provides more security than public or private key single encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The recommended algorithm scheme is a combination of the well-known Rivest Shamir Adleman (RSA) algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
7

Ahamad, Md Martuza, and Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia." Rajshahi University Journal of Science and Engineering 44 (November 19, 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.

Full text
Abstract:
Cryptographic techniques play crucial role when users exchange information. Multimedia plays an important role in learning and sharing experiences. When multimedia contents are shared among the users, it faces security threats. Usually multimedia contents takes much space. Encryption technique should be time efficient. In this work we consider four encryption techniques: Blowfish, AES, XOR and RSA and four types of media content: text, image, audio and video. Simulation shows that AES is time efficient than others. Comparing between symmetric and asymmetric cryptography, symmetric cryptographic techniques take less time than asymmetric technique.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.

Full text
Abstract:
We provide a strong security notion for broadcast encryption, called adaptive security in the multichallenge setting (MA-security), where the adversary can adaptively have access to the key generation oracle and the encryption oracle many times (multichallenge). The adversary specially can query for the challenge ciphertexts on different target user sets adaptively, which generalizes the attacks against broadcast encryptions in the real world setting. Our general result shows that the reduction of the adaptive secure broadcast encryption will lose a factor of q in the MA setting, where q is the maximum number of encryption queries. In order to construct tighter MA-secure broadcast encryptions, we investigate Gentry and Water’s transformation and show that their transformation can preserve MA-security at the price of reduction loss on the advantage of the underlying symmetric key encryption. Furthermore, we remove the q-type assumption in Gentry and Water’s semistatically secure broadcast encryption by using Hofheinz-Koch-Striecks techniques. The resulting scheme instantiated in a composite order group is MA-secure with constant-size ciphertext header.
APA, Harvard, Vancouver, ISO, and other styles
9

Parveen Sehgal, Satinder ,. "Design a Hybrid Algorithm for Data Encryption to Implementation in Database." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (October 16, 2023): 1328–37. http://dx.doi.org/10.52783/tjjpt.v44.i4.1037.

Full text
Abstract:
In an era where digital data is increasingly prevalent, data encryption has become essential to information security. Because databases usually contain sensitive and significant data and are a popular target for cyberattacks, robust encryption solutions are necessary. This research proposes a novel hybrid encryption method that combines symmetric and asymmetric encryption approaches to safeguard databases. The recommended approach combines the security of asymmetric encryption with the speed of symmetric encryption to provide a dependable and efficient data protection solution. This paper introduces hybrid techniques by combining the two most essential algorithms AES and RSA algorithms with XORed Operation. This hybrid encryption algorithm provides more security as compared to existing hybrid algorithms. The implementation and result are also derived in the paper.
APA, Harvard, Vancouver, ISO, and other styles
10

Ubaidullah, Mohammad, and Qahtan Makki. "A Review on Symmetric Key Encryption Techniques in Cryptography." International Journal of Computer Applications 147, no. 10 (August 16, 2016): 43–48. http://dx.doi.org/10.5120/ijca2016911203.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Symmetric encryption techniques"

1

Jha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES." Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Guruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.

Full text
Abstract:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
APA, Harvard, Vancouver, ISO, and other styles
3

Shin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.

Full text
Abstract:
In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive medical data should be encrypted in databases. There are many encryption/ decryption techniques and algorithms with regard to preserving privacy and security. Currently their performance is an important factor while the medical data is being managed in databases. Another important factor is that the stakeholders should decide more cost-effective ways to reduce the total cost of ownership. As an alternative, DAS (Data as Service) is a popular outsourcing model to satisfy the cost-effectiveness but it takes a consideration that the encryption/ decryption modules needs to be handled by trustworthy stakeholders. This research project is focusing on the query response times in a DAS model (AES-DAS) and analyses the comparison between the outsourcing model and the in-house model which incorporates Microsoft built-in encryption scheme in a SQL Server. This research project includes building a prototype of medical database schemas. There are 2 types of simulations to carry out the project. The first stage includes 6 databases in order to carry out simulations to measure the performance between plain-text, Microsoft built-in encryption and AES-DAS (Data as Service). Particularly, the AES-DAS incorporates implementations of symmetric key encryption such as AES (Advanced Encryption Standard) and a Bucket indexing processor using Bloom filter. The results are categorised such as character type, numeric type, range queries, range queries using Bucket Index and aggregate queries. The second stage takes the scalability test from 5K to 2560K records. The main result of these simulations is that particularly as an outsourcing model, AES-DAS using the Bucket index shows around 3.32 times faster than a normal AES-DAS under the 70 partitions and 10K record-sized databases. Retrieving Numeric typed data takes shorter time than Character typed data in AES-DAS. The aggregation query response time in AES-DAS is not as consistent as that in MS built-in encryption scheme. The scalability test shows that the DBMS reaches in a certain threshold; the query response time becomes rapidly slower. However, there is more to investigate in order to bring about other outcomes and to construct a secured EMR (Electronic Medical Record) more efficiently from these simulations.
APA, Harvard, Vancouver, ISO, and other styles
4

Madhavarapu, Venkata Praveen Kumar. "A Novel Three Phase Symmetric Cipher Technique." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/theses/2031.

Full text
Abstract:
Confusion and Diffusion are two properties of a secure cipher, identified by Claude Shannon. Confusion refers to making the relationship between the ciphertext and the symmetric key as complex and involved as possible. We try to achieve more confusion by creating a ciphertext of different length for a given plaintext when key is changed. As per our knowledge, all the existing symmetric encryption techniques will generate cipher text of same length for a given plaintext with different keys. The technique we are implementing here, will create ciphertext with different length for a given plaintext if we change the appropriate values in the key. This symmetric encryption technique will also possibly make the recovery of key very hard for the attacker.
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Chun-Fang, and 林椿芳. "Research and Implementation of E-Voting System with IC Cards and ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/37609861755636278972.

Full text
Abstract:
碩士
國立高雄師範大學
資訊教育研究所
96
Electors can express the public opinion by electoral voting in the democratic society, and paper-based voting is the most common way in Taiwan. However, if the seal is not clear enough, it may bring some debate on the result; the low efficiency in recording and counting of ballots is another problem. E-voting is widespread in some countries and has excellent effects, so it is worth to learn their experiences. We compare various foreign E-voting systems and analyze the criteria for design and implement an E-voting system with IC card. On the other hand, people transmit their message frequently as information technology has been developed rapidly nowadays, and there are many security issue appeared. The concept of IST, which was proposed by Fukaya and Sakurai, can not only avoid accessing or eavesdropping from unauthorized users, but also reduce the cost of transmission, computation, and storage. IST is abbreviated from ID-based encryption scheme based on symmetric-key technique with a trusted device. This encryption scheme combines tamper-free device with user's identity to achieve ID-based cryptosystem that can provide a high efficient authenticated encryption scheme, and there is no more trouble with memorizing several combinations of users' accounts and passwords. In this research, we implement the IST concept for a GUI tool on Windows platform for its accessibility, and we improve its security and usability by incorporating Java Card into our system.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Symmetric encryption techniques"

1

Harris, Steven. HENMOtP PT001 2021: Unbreakable Symmetric Encryption One Time Pad for Private Person to Person Messages. Knowledge Publications Corporation, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Symmetric encryption techniques"

1

Mikhalev, Vasily, Miodrag J. Mihaljević, Orhun Kara, and Frederik Armknecht. "Selected Design and Analysis Techniques for Contemporary Symmetric Encryption." In Security of Ubiquitous Computing Systems, 49–62. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_3.

Full text
Abstract:
AbstractIn this chapter we provide an overview of selected methods for the design and analysis of symmetric encryption algorithms that have recently been published. We start by discussing the practical advantages, limitations and security of the keystream generators with keyed update functions which were proposed for reducing the area cost of stream ciphers. Then we present an approach to enhancing the security of certain encryption schemes by employing a universal homophonic coding and randomized encryption paradigm.
APA, Harvard, Vancouver, ISO, and other styles
2

Alhayani, Mohammed, and Muhmmad Al-Khiza’ay. "Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System." In Lecture Notes on Data Engineering and Communications Technologies, 97–105. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15191-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Lin, Chungen Xu, Zhongyi Liu, and Lin Mei. "Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme." In Applications and Techniques in Information Security, 14–28. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4706-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Parashar, Deepika, Satyabrata Roy, Nilanjan Dey, Vipin Jain, and U. S. Rawat. "Symmetric Key Encryption Technique: A Cellular Automata Based Approach." In Advances in Intelligent Systems and Computing, 59–67. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8536-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chandra, Sourabh, Smita Paira, Sk Safikul Alam, and Siddhartha Bhattacharyya. "A Rotation Based Encryption Technique Using Symmetric Key Method." In Emerging Research in Computing, Information, Communication and Applications, 21–28. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2550-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mante, Pratik Gajanan, Harsh Rajendra Oswal, Debabrata Swain, and Deepali Deshpande. "A Symmetrical Encryption Technique for Text Encryption Using Randomized Matrix Based Key Generation." In Advances in Data Science and Management, 137–48. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0978-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lalitha, R. V. S. S., and P. Naga Srinivasu. "An Efficient Data Encryption Through Image via Prime Order Symmetric Key and Bit Shuffle Technique." In Lecture Notes in Networks and Systems, 261–70. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3226-4_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chander, Bhanu. "The State-of-the-Art Cryptography Techniques for Secure Data Transmission." In Handbook of Research on Intrusion Detection Systems, 284–305. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2242-4.ch014.

Full text
Abstract:
Cryptography is a progression where message correspondences are intelligently sent from one abuser to an additional abuser which endows with frequent defense services like privacy, data truthfulness, or verification to the wireless transportation structure. An encryption method keeps exceptional crucial contribution to communication safety measures. Here we mentioned characteristics of various Symmetric and Asymmetric encryption techniques along with inclusion of optimization techniques in cryptography for decrease computation difficulty. Moreover, advanced encryption techniques such as Zero-knowledge, Multi-party, Homomorphism encryptions, and Cognitive cryptography, Blockchain with their associated protocols are described. The present day's extensive research practices on quantum computer machines explain mathematical tribulations which are complicated or stubborn for classical computers. Quantum cryptography, challenges, Goal of Quantum resistant cryptography with associated literature work is described.
APA, Harvard, Vancouver, ISO, and other styles
9

Nishchal, Naveen K. "Optical techniques of image encryption: symmetric cryptosystems." In Optical Cryptosystems. IOP Publishing, 2019. http://dx.doi.org/10.1088/978-0-7503-2220-1ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sivasakthi, M., and A. Meenakshi. "Machine Learning Techniques to Predict the Inputs in Symmetric Encryption Algorithm." In Innovative Machine Learning Applications for Cryptography, 163–72. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1642-9.ch009.

Full text
Abstract:
Applying machine learning algorithms for encryption problems is reasonable in today's research connecting with cryptography. Using an encryption standard such as DES can give insight into how machine learning can help in breaking the encryption standards. The inspiration for this chapter is to use machine learning to reverse engineer hash functions. Hash functions are supposed to be tough to reverse one-way functions. The hash function will be learned by machine learning algorithm with a probability of more than 50%, which means the can develop their guesstimate of the reverse. This is concluded by executing the DES symmetric encryption function to generate N numerous values of DES with a set key and the machine learning algorithm is trained on a neural network to identify the first bit of the input based on the value of the function's output. Testing has ended through a new table, which was created similarly but with different inputs. The SVM runs on the new table, and it compares to the other table, and a confusion matrix is used to measure the excellence of the guesstimates.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Symmetric encryption techniques"

1

Dash, Sasmita, Jayanta Mondal, and Debabala Swain. "A survey on symmetric text encryption techniques." In MACHINE LEARNING AND INFORMATION PROCESSING: PROCEEDINGS OF ICMLIP 2023. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0182894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kaushik, Shweta, and Charu Gandhi. "Cloud data security with hybrid symmetric encryption." In 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT). IEEE, 2016. http://dx.doi.org/10.1109/icctict.2016.7514656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shruthy, V. N. Jaya, and V. Maheswari. "A hybrid fusion of symmetric encryption techniques with graph labeling." In 2ND INTERNATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND APPLICATIONS: ICMTA2021. AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0108509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Damasceno, Kayque, Carlos Cruz, Anderson De Oliveira, and Luís De Castro. "Alternative N-bit Key Data Encryption for Block Ciphers." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13990.

Full text
Abstract:
Post-encryption patterns are cribs that can be used by adversaries to unlock the encryption key both in symmetric or asymmetric cryptography, compromising security. Different methods to mitigate the problem, with their advantages and disadvantages, can be found in the literature, including one-time pad encryption, code-based cryptography and cipher block chaining. This work presents an alternative technique to generate an n-bit, n-block and key cipher that can be derived from reasonable short length key. The proposed technique is able to mitigate post-encryption patterns. Experimental results asserting the capabilities of the proposed cipher techniques are presented and discussed in the text.
APA, Harvard, Vancouver, ISO, and other styles
5

Agnihotri, Nishant, and Aman Kumar Sharma. "Comparative Analysis of Different Symmetric Encryption Techniques Based on Computation Time." In 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2020. http://dx.doi.org/10.1109/pdgc50313.2020.9315848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yadav, Vikas, and Manoj Kumar. "A Hybrid Cryptography Approach Using Symmetric, Asymmetric and DNA Based Encryption." In 2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT). IEEE, 2023. http://dx.doi.org/10.1109/icct56969.2023.10076124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Silveira, Matheus M., Danielle S. Silva, Luiz Z. Oliveira, and Rafael L. Gomes. "Analyzing the Performance of Searchable Symmetric Encryption over Huawei Cloud." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc_estendido.2023.465.

Full text
Abstract:
Cloud computing environments store data from companies and end users, bringing reliability and scalability to this remote access. Additionally, encryption techniques have been applied to protect this data in the cloud, where Searchable Symmetric Encryption (SSE) enables a fast search of keywords in encrypted databases. However, the configuration of the cloud environment directly impacts the processing time of SSE and, consequently, affects Service Level Agreement (SLA) requirements. Within this context, this paper analyzes the impact of Huawei Cloud configuration over the SSE task, encompassing the possible existing options regarding computing and architectures available. The experiments performed using a real database over the Huawei Cloud suggest the most suitable configuration according to the requirements needed to meet.
APA, Harvard, Vancouver, ISO, and other styles
8

Shruthy, V. N. Jaya, and V. Maheswari. "A hybrid combination of symmetric and asymmetric encryption technique with graph labeling." In 2ND INTERNATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND APPLICATIONS: ICMTA2021. AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0108506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Krishna Rao, Akula Vamsi, V. N. Aditya Datta Chivukula, Sri Keshava Reddy Adupala, and Abhiram Reddy Cholleti. "Multi-Layer Encryption Algorithm." In 7th International Conference on VLSI and Applications (VLSIA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.112103.

Full text
Abstract:
In recent years, security has become a big issue for many applications to defend attacks from intruders. Exchanging credentials in plaintext might expose it to stealers. Many techniques are required to protect the data of the consumers from attackers. Cryptography has come up with a solution to provide security for the users to exchange data securely by the means of the process called as Encryption/ Decryption. In this field, there are basically two techniques of cryptography i.e Symmetric and asymmetric, developed to achieve a secure connection between the sender and receiver. These techniques provide specific goals in maintaining privacy by converting original message to non-readable form and sends it over a communication channel. The unauthorized members try to break the non-readable form but the difficulty depends upon the techniques that were used to encrypt the data. In this paper, we proposed a quadruple encryption algorithm consists of novel phase-shift algorithm, AES (Advanced Encryption Standard), TwoFish and RC4 and making it hard to attack by common methods.
APA, Harvard, Vancouver, ISO, and other styles
10

Jintcharadze, Elza, Tsitsino Sarajishvili, Anna Surmanidze, and Davit Khojava. "Implementation and Comparative Analysis of Symmetric Encryption Model Based on Substitution Cipher Techniques." In 2021 IEEE East-West Design & Test Symposium (EWDTS). IEEE, 2021. http://dx.doi.org/10.1109/ewdts52692.2021.9580978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography