Triple symmetric key cryptosystem for data security
نویسندگان
چکیده
منابع مشابه
Biometric Cryptosystem for VoIP Security using RSA Key Generation
-This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-“voice over internet protocol (IP)” in which the “voice” to be transmitted u...
متن کاملAn Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security
This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for p...
متن کاملA symmetric version of the McEliece public-key cryptosystem
This article exploits the fact that linear codes can correct twice the number of erasures as that of errors, allowing reduction in code size and providing the same level of security. decryption or both. The large code size of McEliece
متن کاملLecturer : Kartik Krishnan Lectures 22 - 24 Symmetric Key cryptosystem
Symmetric encryption, also referred to as conventional encryption or single key encryption was the only type of encryption in use prior to the development of public-key encryption in 1976. The symmetric encryption scheme has five ingredients (see Figure 1): 1. Plaintext: This is the original intelligible message or data that is fed to the algorithm as input. 2. Encryption algorithm: The encrypt...
متن کاملHandycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem
Handycipher is a low-tech, randomized, symmetric-key, stream cipher, simple enough to permit penand-paper encrypting and decrypting of messages, while providing a significantly high level of security. It combines a simple 31-character substitution cipher with a 3,045-token nondeterministic homophonic substitution cipher, and employs the insertion of randomly chosen decoy characters at random lo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Materials Science and Engineering
سال: 2017
ISSN: 1757-8981,1757-899X
DOI: 10.1088/1757-899x/263/4/042040