Modern Symmetric Cryptography methodologies and its applications

نویسندگان

  • Amin Daneshmand Malayeri
  • Jalal Abdollahi
چکیده

Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper. Security-based networks and some complex technologies such as RFID and parallel security settings has been introduced by using Symmetric Cryptography is the main base of discussion in this paper. Designing an unique protocol for Symmetric Cryptography in security networks elements is our focus. Reviewing benefits of using these methodologies has been presented and discussed in this paper. KeywordsCryptography; Symmetric Cryptography; RFID; parallel security; Complex designing

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptography in Embedded Systems: An Overview

It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Note that a large share o...

متن کامل

On the Cryptography with ”Mathematica” Package

Cryptography courses are very popular among students around the globe. I started this teaching subject in Oman together with Dr. Abderezak Touzene via supervision of two completed Master Projects (by Huda Al Naamani and Rahma Al Habsi. The topic was the implementation of graph based symmetric encryption algorithm. In fact it was the first step to interesting further research. So I think that th...

متن کامل

Cryptography in Modern Communication Systems

It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Note that a large share o...

متن کامل

A classical introduction to cryptography - applications for communications security

The book is aimed at bridging the gap between cryptography and its standard applications. From my point of view, it has achieved its goal. This book presents basic tools of cryptography with applications in communication and information security. This book is a compilation of author’s lecture notes that he used for teaching cryptography to undergraduate students. Though this book is titled like...

متن کامل

PERFORMANCE ANALYSIS OF SYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS: DES, AES and BLOWFISH

Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0912.1092  شماره 

صفحات  -

تاریخ انتشار 2009