Inventive Cubic Symmetric Encryp- Tion System for Multimedia

نویسندگان

  • David C. Wyld
  • Ali M Alshahrani
  • Stuart Walker
چکیده

Cryptography is a security technique that must be applied in both communication sides to protect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is called encryption. On the other communication side, the decryption process will be done and the data will be returned to its former shape by using the agreed key. The importance of cryptography is to fulfil the communication security requirements. Real time applications (RTA) are vulnerable for the moment because of their big size. However, some of the current algorithms are not really appropriate for use with these kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has been illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair of binary inputs. The cube can provide a huge number of combinations that can produce a very strong algorithm and a long key size. Due to the lightweight and fast technique used in this idea, it is expected to be extremely rapid compared to the majority of current algorithms, such as DES and AES.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Choices: An Object-Oriented Multimedia Operating System

This paper describes the design of the Choices object oriented multimedia operating system. Choices provides an architecture for interconnecting different OS subsystems, with these subsystems realized as separate modules. The modules will be implemented as independent object-oriented frameworks. Frameworks interact through exported abstract interfaces. The sub-classing of components within fram...

متن کامل

Cubic symmetric graphs of orders $36p$ and $36p^{2}$

A graph is textit{symmetric}, if its automorphism group is transitive on the set of its arcs. In this paper, we  classifyall the connected cubic symmetric  graphs of order $36p$  and $36p^{2}$, for each prime $p$, of which the proof depends on the classification of finite simple groups.

متن کامل

Cryptosystems Based on Reversible Cellular Automata

We propose the use of reversible cellular automata (RCA) as eecient encryp-tion and decryption devices. The eeciency is due to their inherent parallelism. They can be used both as classical secret-key cryptosystems and as public-key systems.

متن کامل

Axisymmetric Vibrations in Micropolar Thermoelastic Cubic Crystal Plate Bordered with Layers or Half Spaces of Inviscid liquid

In present study is concerned with the propagation of axisymmetric vibrations in a homogenous isotropic micropolar thermoelastic cubic crystal plate bordered with layers or half spaces of inviscid liquid subjected to stress free boundary conditions in context of Lord and Shulman (L-S) and Green and Lindsay (G-L) theories of thermoelasticity. The secular equations for symmetric and skew-symmetri...

متن کامل

On Tame Transformation Method (ttm)

A fast encryption system (TTM) will be discussed in this article. TTM is an encryp-tion system based on multivariate tame automorphisms over some small eld. It is related to an open and diicult problem in mathematics. The TTM system is 100 or more faster than RSA 1024 and the corresponding ECC. In 11] and 12], the mathematical part of the system is provided. However, the presentation there is q...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014