2019
DOI: 10.1016/j.jisa.2019.03.013
|View full text |Cite
|
Sign up to set email alerts
|

A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Another dynamic cipher has been suggested in [23] to build a polymorphic cipher that picks a different cryptographic suite (i.e. cipher, mode of operation, and key length) in a semirandom approach.…”
Section: B Dynamic Encryptionmentioning
confidence: 99%
“…Another dynamic cipher has been suggested in [23] to build a polymorphic cipher that picks a different cryptographic suite (i.e. cipher, mode of operation, and key length) in a semirandom approach.…”
Section: B Dynamic Encryptionmentioning
confidence: 99%
“…There are several symmetric block cipher algorithms, TDES, RC2, AES, Twofish, Serpent. These algorithms work in Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Data security using random dynamic salting and AES based on master-slave keys for … (Hussam J. Ali) 1021 different operating modes in encrypting each block, the most famous of which are: Cipher block chaining (CBC), electronic code book (ECB), and cipher feedback (CFB) In this research will adopt the CBC operating mode with AES because it has a high-performance speed compared to with CFB [8], each block is also uniquely encrypted [16], on the other hand, it is safer than ECB [17].…”
Section: Symmetric Block Ciphersmentioning
confidence: 99%
“…The time cost analysis showed that the scheme costs less time for greater efficiency. In Altigani et al (2019), a set of solid cipher is used to increase security. The receiver knows the identity of the cipher used, the message, key size and mode of operation.…”
Section: Existing Cloud Encryption Algorithmsmentioning
confidence: 99%
“…While analyzing the algorithms, various drawbacks for each algorithm were identified, such as 3DES does not perform well in terms of running time, power consumption and throughput (Thakur and Kumar, 2011), RSA is slower as compared to symmetric encryption algorithms and is prone to timing attacks (O K Jasim Mohammad et al , 2013), Blowfish suffers from weak keys problem (Thakur and Kumar, 2011) and DES is susceptible to various attacks and can be cracked easily using modern technologies (Aleisa, 2015). Symmetric algorithms are faster than asymmetric algorithms (Yassein et al , 2017), AES algorithm proved to be the most efficient encryption algorithm and most widely used based on various parameters (Altigani et al , 2019; Bhardwaj et al , 2016; O K Jasim Mohammad et al , 2013; Singh and Supriya, 2013; Wani et al , 2017) and a combination of algorithms is believed to perform better as compared to standalone algorithms (Singh and Supriya, 2013).…”
Section: Introductionmentioning
confidence: 99%