[PDF][PDF] A new symmetric-key block ciphering algorithm

JN Salameh - Middle-East Journal of Scientific Research, 2012 - researchgate.net
Strong cryptographic algorithms have been used for securing data communication. It is
considered as one of the best tools to help people to protect their sensitive information from …

[PDF][PDF] Jea k-128: a novel encryption algorithm using vhdl

JNB Salameh - WSEAS Transactions on Computers, 2009 - wseas.us
Data security is an important issue in computer networks and cryptographic algorithms are
essential parts in network security. In this paper a new block-ciphering algorithm, JEA K-128 …

New approach in symmetric block cipher security using a new cubical technique

AM Alshahrani, S Walker - International Journal of Computer …, 2015 - search.proquest.com
Cryptography is a security technique that must be applied in both communication sides to
protect the data during its transmission through the network from all kinds of attack. On the …

Performance study of some symmetric block cipher algorithms under Linux operating system

NA Kofahi, T Al-Somani, K Al-Zamil - Journal of Discrete …, 2004 - Taylor & Francis
In this research work, implementation of three symmetric, block encryption algorithms
namely: DES, Triple-DES and Blowfish under Linux platform is presented. A comparison is …

[PDF][PDF] A critical analysis of some symmetric key block cipher algorithms

S Mankotia, M Sood - International Journal of Computer Science and …, 2015 - academia.edu
In this era of information technology and e-commerce security is the key aspect while
transmitting confidential information over insecure network like internet. In order to protect …

[PDF][PDF] Analyzing the performance of the advanced encryption standard block cipher modes of operation: highlighting the national institute of standards and technology …

A Altigani, M Abdelmagid, B Barry - Indian Journal of Science and …, 2016 - researchgate.net
When using a symmetric encryption algorithm, specifically the AES, the Block Cipher Mode
of Operation to be used must be specified. Usually choosing the mode of operation is …

[PDF][PDF] Advanced Encryption Standard Block Cipher Algorithm

AG Sawant, VN Nitnaware… - International Journal of …, 2018 - academia.edu
The importance of cryptography applied to security in electronic data transactions has
gained essential relevance during the last few years. Everyday many users generate and …

[PDF][PDF] A hyper modern cryptography algorithm to improved data security: HMCA

V Gupta, G Singh, R Gupta - International Journal of Computer Science & …, 2011 - Citeseer
In this paper, we propose an improved block cipher symmetric encryption algorithm that has
the same structure of encryption and decryption. So far, conventional cryptography …

[PDF][PDF] Implementation of AES algorithm using Verilog

PG Kumar, PM Kumar - International Conference on …, 2013 - conference.bonfring.org
Advanced Encryption Standard (AES), also known as Rijndael, is an encryption standard
used for securing information. AES was published by NIST (National Institute of Standards …

[PDF][PDF] Computing Symmetric Block Cipher Using Linear Algebraic Equation.

PK Mallick, NK Kamila, S Patnaik… - International Journal of …, 2011 - academia.edu
In this paper, a pair of symmetric block ciphers has been developed for encryption and
decryption of text file. The characters in the file are represented by the ASCII codes. A …