2016 International Conference on Information Science and Security (ICISS) 2016
DOI: 10.1109/icissec.2016.7885839
|View full text |Cite
|
Sign up to set email alerts
|

All-or-Nothing Key Derivation Function Based on Quasigroup String Transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…The zig_zag pattern [3,9,10] refers to the matrix structure of the N2 integers that increases anti-diagonally along the arrays. Figure 1 depicts the various types of zig_zag designs.…”
Section: Zig_zag Scrambling Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The zig_zag pattern [3,9,10] refers to the matrix structure of the N2 integers that increases anti-diagonally along the arrays. Figure 1 depicts the various types of zig_zag designs.…”
Section: Zig_zag Scrambling Methodsmentioning
confidence: 99%
“…By converting sensitive information into an incoherent format (encryption) that the authorized recipient can only decode, encryption enables secure communication and protects that information (decryption). Unauthorized access is mitigated through various mathematical compromises, including cryptography algorithms [1,2,3]. Scrambling encryption, an essential part of picture security, is now a widely investigated image steganography technology.…”
Section: Introductionmentioning
confidence: 99%
“…The aim of Key Derivation Functions (KDFs) is to create unpredictable and random secret keys. So, [55] proposed KDF that is completely key-dependent that cryptanalyst has to precisely foresee completely the elements in the key string. A Quasigroup-based key metadata expansion and reduction functions are integrated with the design.…”
Section: Related Workmentioning
confidence: 99%
“…The insignificant key generation algorithm generates weak keys that are used for encryption process can easily attack using brute force attack because cryptanalyst continuously trying all possible combinations to get original text using this attack [27]- [29]. All cryptographic algorithms follow the consideration of Advanced Encryption Standard (AES) that must support the key lengths include 128 bits, 192 bits and 256 bits [19].…”
Section: Key Schedule Algorithmmentioning
confidence: 99%