Design large symmetric algorithm for securing big data

OA Dawood, AM Sagheer… - 2018 11th International …, 2018 - ieeexplore.ieee.org
Today several Institutions, organizations, companies and research centers deal with
hundreds of gigabytes or terabytes of the massive amount of renewable data every day. This …

A novel chaotic system for text encryption optimized with genetic algorithm

U Menon, AR Menon, A Hudlikar - arXiv preprint arXiv:2011.00575, 2020 - arxiv.org
With meteoric developments in communication systems and data storage technologies, the
need for secure data transmission is more crucial than ever. The level of security provided …

Design and Implementation of Advanced Encryption Standard by New Substitution Box in Galois Field (𝟐𝟖)

W Alsobky, A Ismail, A Mohra, A Hassan… - International Journal …, 2022 - journals.ekb.eg
An inverse multiplexing method for irreducible polynomials is presented in this paper based
on the theory of substitution boxes. The method is based on the theory of substitution boxes …

Comparison of Dynamic DES with Existing Symmetric Key Algorithms

LE Sunny, V Paul - 2023 9th International Conference on Smart …, 2023 - ieeexplore.ieee.org
The concept of security is fundamental to networking. The basic objective of security is to
defend against various types of assaults on these networks that hold sensitive data. By …

[PDF][PDF] Modified 128-EEA2 Algorithm by Using HISEC Lightweight Block Cipher Algorithm with Improving the Security and Cost Factors

AG Sulaiman, SSM AlDabbagh - Indonesian Journal of Electrical …, 2018 - researchgate.net
128-EEA2 (Evolved Packet System Encryption Algorithm 2) is a confidentiality algorithm
which is used to encrypt and decrypt block of data based on confidentiality key. This …

A Chaotic System and Count Tracking Mechanism-based Dynamic S-Box and Secret Key Generation

S Pal, R Selvanambi, P Malik… - International Journal of …, 2023 - search.proquest.com
In cryptography, Block ciphers use S-Boxes to perform substitution and permutation
operations on a data block. S-Boxes provide non-linearity and confusion of bits to the …

An Improved SMS Security Technique to Avoid Plaintext and Dictionary Attacks

H Ashraf, MQUAZ Zam, NZ Jhanjhi - 2024 - preprints.org
Digital communication is becoming an integral component of contemporary society and the
use of mobile devices is increasing faster than ever. The function of message …

SISA En-Decryption Algorithm for Multilingual Data Privacy and Security in IoT

S Kannan, MC Thayammal, S Alphonse… - … for Securing the Cloud …, 2024 - igi-global.com
Because of worldwide integration, multilingual databases and document transfers are quite
widespread, which raises the requirement for data security against hackers. Without regard …

Design of Web Login Security System using ElGamal Cryptography

Y Arta, H Pratama, A Siswanto, A Syukur, PR Setiawan - 2019 - repository.uir.ac.id
The login system is a process for accessing a computer by entering the identity of the user
and the password to obtain permissions using the destination computer resources. In an …

Implementasi Algoritme Speck Untuk Enkripsi One-Time Password Pada Two-Factor Authentication

MA Taqwim, A Kusyanti, RA Siregar - … Teknologi Informasi Dan Ilmu …, 2021 - j-ptiik.ub.ac.id
Static authentication sangat rentan terkena serangan, maka dilakukan two-factor
authentication dengan menambahkan OTP sebagai salah satu faktor dalam autentikasinya …