Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman
نویسندگان
چکیده
منابع مشابه
FPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملCircular-Secure Encryption from Decision Diffie-Hellman
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a “key cycle” usage, where we have a cycle of public/secret key-pairs (pki, ski) for i = 1, . . . , n, and we encrypt each ski under pk(i mod n)+1. Such usage scenarios sometimes arise in key-management systems and in the context o...
متن کاملSimple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
This paper proposes practical chosen-ciphertext secure public-key encryption systems that are provably secure under the computational Diffie-Hellman assumption, in the standard model. Our schemes are conceptually simpler and more efficient than previous constructions. We also show that in bilinear groups the size of the public-key can be shrunk from n to 2 √ n group elements, where n is the sec...
متن کاملTwo Level Encryption Decryption by Diffie – Hellman and Elliptic Curve Cryptography with Open ID scenario for Securing Cloud Environment
Cloud Computing offers services to end-users rather than a product, by sharing resources, software and other information under a pay per usage model, hence economic benefit is the key for Cloud in terms of capital and operational expenditure. It permits hosting of different types of applications such as business, scientific and social networking because it has key characteristics like multitena...
متن کاملEvaluating the performance of Symmetric Key Algorithms: AES (Advanced Encryption Standard) and DES (Data Encryption Standard)
Encryption algorithms are known to be computational intensive. Internet and networks applications growing very fast, so the needs to protect. Encryption plays the very important role in information security system. On the other side, the symmetric key algorithms consume a significant amount of computed resources such as speed, time, memory and cost. The symmetrical algorithms AES and DES as a s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2017
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2017.11.3.02