Will the Butterfly Cipher keep your Network Data secure? Developments in Computer Encryption
نویسنده
چکیده
Introduction Encryption has been used as a method of protecting computer privacy since 1977. Secret communication plays an increasing role in organizations especially banking, industry, commerce, telecommunication etc. The basic idea of encryption is to modify the network traffic in such a way that its content can be reconstructed only by a legal recipient. This has been central to the setting up of secure systems such as Virtual Private Networks by establishing encrypted data tunnels trough the public Internet. (A general Classification of Encryption systems is shown in Appendix A)
منابع مشابه
Hybrid Algorithm with DSA, RSA and MD5 Encryption Algorithm for wireless devices
Security is the one of the biggest concern in different type of networks. Due to diversify nature of network, security breaching became a common issue in different form of networks. Solutions for network security comes with concepts like cryptography in which distribution of keys have been done. If you want to send data to some other persons through network then if you truly want to keep the in...
متن کاملSecure and Fast Chaos based Encryption System using Digital Logic Circuit
Chaotic system based message encryption system for wired and wireless networks broadly used in computer engineering, communication and network security, such as robotic systems, encryption, synchronization and genetic network. The main motive for developing the chaos based cryptosystem is to attain encryption with several compensation over the conventional encryption algorithms such as high sec...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملA Hybrid Approach for the Secure Transmission of H.264/AVC Video Streams
In order to keep privacy and to maintain security of a data; it was necessary to keep the data in hidden manner or in a crypt format. The proposed work describes the encryption and data hiding techniques for an H.264/ AVC video in a cloud environment. And it clearly specifies how the integrity of the data should be relevant enough in an unsecured and constrained communication medium. The propos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/cs/0604048 شماره
صفحات -
تاریخ انتشار 2006