Chaotic jerk system with hump structure for text and image encryption using DNA coding

VR Folifack Signing, T Fozin Fonzin… - Circuits, Systems, and …, 2021 - Springer
Nowadays, advances in technology have led to the expansion of the use and exchange of
digital data, which places great importance on the security of these data. The protection of …

Evaluation of key dependent S-box based data security algorithm using Hamming distance and balanced output

MK Balajee, JM Gnanasekar - Tem Journal, 2016 - ceeol.com
Data security is a major issue because of rapid evolution of data communication over
unsecured internetwork. Here the proposed system is concerned with the problem of …

[PDF][PDF] Modified blowfish algorithm

TFG Quilala, AM Sison, RP Medina - Indonesian Journal of …, 2018 - researchgate.net
Cryptography guarantees security in communication through encryption. This paper
proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to …

Ensemble of chaotic and naive approaches for performance enhancement in video encryption

J Chandrasekaran… - The Scientific World …, 2015 - Wiley Online Library
Owing to the growth of high performance network technologies, multimedia applications
over the Internet are increasing exponentially. Applications like video conferencing, video …

Speech encryption applying a modified Blowfish algorithm

AA Abd El-Sadek, A Talaat… - … on Engineering and …, 2014 - ieeexplore.ieee.org
This paper applied the high quality speech coding algorithm G. 729 which has been
standardized by ITU-T with low bit rate 8kb/s. This algorithm is based on a conjugate …

[PDF][PDF] A dynamic 3D S-box based on cylindrical coordinate system for blowfish algorithm

AM Alabaichi - Indian Journal of Science and …, 2015 - sciresol.s3.us-east-2.amazonaws …
Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate
simple encryption and decryption functions. The BA key varies from 32 to 448 bits to ensure …

Resim şifreleme amacıyla dinamik S kutusu tasarımı için bir yöntem

E Güvenoğlu - El-Cezeri, 2016 - dergipark.org.tr
Yer değiştirme kutuları (Substitution Box, s-box) blok şifreleme algoritmalarında yaygın
olarak kullanılmaktadır. S kutularının kullanılması şifreleme algoritmasını daha güçlü hale …

Parallel DES with modified mode of operation

K Chaudhari, P Prajapati - … , Control and Devices: Proceedings of ICICCD …, 2020 - Springer
In this paper, we tried to model parallel version of Data Encryption Standard (DES) by
means of the modified mode of operation. Block size specifications followed by DES have …

[PDF][PDF] A new symmetric cryptosystem using randomized parameters of SHA-512 and MD5 hash functions

T Sivakumar, T Anusha - … Journal of Innovations in Engineering and …, 2016 - academia.edu
The explosive growth of digital information places a high demand for information security.
Information security deals with securing the information from unauthorized access or …

[PDF][PDF] An Enhanced Blowfsh Algorithm with Reduced Computational Speed

GM Damola, R Jimoh, O Abikoye - 2022 - sciresliterature.org
Cryptography guarantees security in communication through encryption. By superimposing
shares in pairs, it is possible to identify any instances of fraud. The hidden picture is …