期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Security Implementation in WSN with Symmetric and Matrix Mapping on Asymmetric ECC Cryptographic Techniques
1
作者 S. Hemalatha V. Rajamani V. Parthasarathy 《Circuits and Systems》 2016年第10期3204-3211,共8页
As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various fields of military and commercial areas. In order to attain security on the data exchanged ... As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various fields of military and commercial areas. In order to attain security on the data exchanged over the network, a hybrid cryptographic mechanism which includes both symmetric and asymmetric cryptographic functions is used. The public key cryptographic ECC security implementation in this paper performs a matrix mapping of data’s at the points on the elliptical curve, which are further encoded using the private symmetric cipher cryptographic algorithm. This security enhancement with the hybrid mechanism of ECC and symmetric cipher cryptographic scheme achieves efficiency in energy conservation of about 7% and 4% compared to the asymmetric and symmetric cipher security implementations in WSN. 展开更多
关键词 WSN SECURITY Elliptic Curve cryptography symmetric Cipher cryptography Hybrid Cryptosystem Matrix Mapping
下载PDF
Design of a Cryptographic Algorithm in the Form of an API in Order to Secure Monetary Transactions in a Supermarket
2
作者 Atsopmene Tango Vanette Eleonore Gamom Ngounou Ewo Roland Christian Kom Charles Hubert 《Journal of Information Security》 2023年第4期437-453,共17页
Supermarkets and large-scale retail stores are usually subject to huge monetary transactions for certain customers’ purchases. The computerization of these systems is common in supermarkets but the security of these ... Supermarkets and large-scale retail stores are usually subject to huge monetary transactions for certain customers’ purchases. The computerization of these systems is common in supermarkets but the security of these transactions remains a mystery. This article presents an algorithm as an API based on symmetric cryptography that can enable end-to-end encryption of a monetary transaction in a supermarket. This algorithm is the first part of the complete supermarket management system which will be presented in the following article. The Python language and the Flask framework allow us to develop the algorithm as an independent component. Tests have been performed and our algorithm uses 98.49% less memory and 10.18% time saving than the AES algorithm. 展开更多
关键词 Application Programming Interface (API) symmetric cryptography End-to-End Encryption
下载PDF
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds
3
作者 Muhammad Akram Muhammad Waseem Iqbal +3 位作者 Syed Ashraf Ali Muhammad Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali 《Computers, Materials & Continua》 SCIE EI 2022年第9期6061-6077,共17页
In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext ot... In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples. 展开更多
关键词 Encryption DECRYPTION CIPHER symmetric key cryptography single key attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部