Modern and Lightweight Component-based Symmetric Cipher Algorithms

SA Qassir, MT Gaata, AT Sadiq - ARO-The Scientific …, 2022 - eprints.koyauniversity.org
Information security, being one of the corner stones of network and communication
technology, has been evolving tremendously to cope with the parallel evolution of network …

Towards a scalable symmetric key cryptographic scheme: Performance evaluation and security analysis

HA Kholidy - 2019 2nd International Conference on Computer …, 2019 - ieeexplore.ieee.org
In most applications, security attributes are pretty difficult to meet but it becomes even a
bigger challenge when talking about Grid Computing. To secure data passes in Grid …

[PDF][PDF] Symmetric security algorithms implementation in CBC mode

MT Hadi, S Al-Alak - Journal of University of Babylon for Pure and Applied …, 2021 - iasj.net
Security at the present time is very important and highly effective for Internet and network
applications, which are rapidly growing, therefore the data that is exchanged over the …

[PDF][PDF] Evaluating AES Performance Using NIST Recommended Block Cipher Modes of Operation

A Altigani, M Abdelmagid, B Barry - 2015 - researchgate.net
Encryption plays a central role in providing electronic security and countering cybercrimes.
In particular, symmetric encryption algorithms have gained popularity on the Internet and its …

Designing and performance analysis of a proposed symmetric cryptography algorithm

BK Mandal, D Bhattacharyya… - … Systems and Network …, 2013 - ieeexplore.ieee.org
We design an algorithm to merge both RSA algorithm and Diffie-Hellman Algorithm of them
to provide a user with even higher level of data security. Actually, our intent is to secure data …

Research on the Programming Language for Symmetric Cryptographic Algorithms

F Li, J Yan, R Xie, J Ma - Chinese Journal of Electronics, 2010 - ieeexplore.ieee.org
The Programming language for symmetric cryptographic algorithms (PLSCA) is proposed.
The detailed specification of the syntax of PLSCA is presented, and the cipher of IDEA is …

Modern symmetric ciphers—Des and Aes

D Buell - Fundamentals of Cryptography: Introducing …, 2021 - Springer
In a symmetric cryptosystem, the key used for encrypting a message is the same as the key
used for decrypting a message. Although this does place a burden of proper key …

Evaluation of computing resources consumption of selected symmetric-key algorithms

SA Ajagbe, AO Adesina, TJ Odule… - Journal of Computer …, 2019 - ajol.info
Data security is becoming more important as data driven activities rose to cloud computing
and big data. This concept been addressed using various computing devices and methods …

[PDF][PDF] A new symmetric-key block ciphering algorithm

JN Salameh - Middle-East J Sci Res, 2012 - researchgate.net
Strong cryptographic algorithms have been used for securing data communication. It is
considered as one of the best tools to help people to protect their sensitive information from …

[PDF][PDF] A performance test on symmetric encryption algorithms-RC2 Vs rijndael

NA Sharma, M Farik - … Journal of Scientific & Technology Research, 2017 - researchgate.net
Cryptography is one of the most integral components when trying to maintain achieve a
secure communication medium and determining the best cryptography algorithm is as …