Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of …
TFG Quilala, AM Sison, RP Medina - Indonesian Journal of …, 2018 - researchgate.net
Cryptography guarantees security in communication through encryption. This paper proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to …
J Chandrasekaran… - The Scientific World …, 2015 - Wiley Online Library
Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video …
AA Abd El-Sadek, A Talaat… - … on Engineering and …, 2014 - ieeexplore.ieee.org
This paper applied the high quality speech coding algorithm G. 729 which has been standardized by ITU-T with low bit rate 8kb/s. This algorithm is based on a conjugate …
AM Alabaichi - Indian Journal of Science and …, 2015 - sciresol.s3.us-east-2.amazonaws …
Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. The BA key varies from 32 to 448 bits to ensure …
Yer değiştirme kutuları (Substitution Box, s-box) blok şifreleme algoritmalarında yaygın olarak kullanılmaktadır. S kutularının kullanılması şifreleme algoritmasını daha güçlü hale …
K Chaudhari, P Prajapati - … , Control and Devices: Proceedings of ICICCD …, 2020 - Springer
In this paper, we tried to model parallel version of Data Encryption Standard (DES) by means of the modified mode of operation. Block size specifications followed by DES have …
T Sivakumar, T Anusha - … Journal of Innovations in Engineering and …, 2016 - academia.edu
The explosive growth of digital information places a high demand for information security. Information security deals with securing the information from unauthorized access or …
Cryptography guarantees security in communication through encryption. By superimposing shares in pairs, it is possible to identify any instances of fraud. The hidden picture is …