A novel approach for the development of the Twofish algorithm based on multi-level key space

SM Kareem, AMS Rahma - Journal of Information Security and Applications, 2020 - Elsevier
This paper presents a new modification of the Twofish algorithm for strengthening security.
This is done by using two additional control keys during 16 rounds of the standard Feistel …

Proposed hybrid encryption framework for robust 3D image communication over wireless channels

M Helmy, ESM El-Rabaie, I Eldokany, FE Abd El-Samie - Optik, 2023 - Elsevier
Objective Different cryptosystems have been presented to protect images, videos, and data
against several types of attacks. These cryptosystems use small and medium keys with small …

[PDF][PDF] Performance evaluation of RC6, blowfish, DES, IDEA, CAST-128 block ciphers

K Aggarwal, JK Saini, HK Verma - International Journal of Computer …, 2013 - academia.edu
Rapid growth of internet applications fueled the need for securing information and
computers. Encryption algorithms play vital role to secure information. This paper provides …

Chaotic encryption with different modes of operation based on Rubik's cube for efficient wireless communication

M Helmy, ESM El-Rabaie, IM Eldokany… - Multimedia Tools and …, 2018 - Springer
A novel image encryption algorithm based on the Rubik's cube scrambling is proposed in
this paper to achieve simultaneous encryption of a group of images. This proposed …

3-D image encryption based on Rubik's cube and RC6 algorithm

M Helmy, ESM El-Rabaie, IM Eldokany, FEA El-Samie - 3D Research, 2017 - Springer
A novel encryption algorithm based on the 3-D Rubik's cube is proposed in this paper to
achieve 3D encryption of a group of images. This proposed encryption algorithm begins with …

Analyzing the security-performance tradeoff in block ciphers

P Jindal, B Singh - International conference on computing …, 2015 - ieeexplore.ieee.org
In this paper, we have presented comparative performance analysis of symmetric key
algorithms particularly of block ciphers. Performance evaluation of various block ciphers has …

Design and Implementation of Enhanced version of MRC6 algorithm for data security

NH Khanapur, A Patro - International Journal of Advanced …, 2015 - search.proquest.com
In today's world, data transmission through channel requires more security, since there is
chance of hacking the data while transmitting through a channel. Hence, gaining security is …

A comparative analysis of symmetric cryptographic algorithm as a data security tool: A survey

C Ubochi, B Olaniyi, K Ukagwu… - NIPES-Journal of …, 2023 - journals.nipes.org
Network security is becoming a significant and difficult subject that is growing quickly.
Attacks and risks to information and internet security are becoming harder to identify. As a …

Secure iot data transmission at physical layer using rc6 encryption technique

AM Ashraf, WM Elmedany… - 2022 9th International …, 2022 - ieeexplore.ieee.org
In today's society, the Internet of Things is the foremost important technology. The scope that
incorporates all of the disciplines in which IoT is used is massive. On the other extreme …

Integrating RC6 Stream Cipher to A Chaotic Synchronization System

FH Hsiao, SW Chang - IEEE Access, 2024 - ieeexplore.ieee.org
With the advancement of technology, convenient communication fills every part of people's
lives. However, the data may be stolen during the transmission process. Therefore, this …