2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT) 2019
DOI: 10.1109/atit49449.2019.9030509
|View full text |Cite
|
Sign up to set email alerts
|

Block Encryption Algorithm for Digital Information Using Open Keys for Selfgeneration of Closed Random Private Keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Encryption keys [ 5 , 22 , 23 ] are labeled to perform specific tasks related to their security on the system. For the exchange and transmission of data between “unreliable” nodes, encryption keys are required, ensuring a level of security in the system.…”
Section: The Proposed Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Encryption keys [ 5 , 22 , 23 ] are labeled to perform specific tasks related to their security on the system. For the exchange and transmission of data between “unreliable” nodes, encryption keys are required, ensuring a level of security in the system.…”
Section: The Proposed Systemmentioning
confidence: 99%
“…Combining the cloud and the blockchain can result in a verifiable [ 1 , 4 ], permanent, and unmodified file in terms of data sharing between a private chain, eliminating the primary issue of supervision by allowing anybody permitted to join the network to observe and evaluate the activities transparently. In the event that something goes wrong with the processes (e.g., information leaks), blockchain makes it fairly straightforward to find the weak node [ 5 ]. Furthermore, the existence of a central service for storing and processing authentication information is not required for blockchain.…”
Section: Introductionmentioning
confidence: 99%
“…This parameter determines the speed of the shift register and LFSR as a whole. The T LFSR value should be chosen according to expression (1). It should also be noted that, according to the LFSR condition, Δ ≤ 2 N -1.…”
Section: Fig 5 Implementation Of a Single Pulse Generator In Simulinkmentioning
confidence: 99%
“…The level of effectiveness of such protection is estimated by cryptographic strength. The level of cryptographic strength is the ability of a cryptographic algorithm to resist decryption [1]. A strong algorithm is an algorithm that can not be decrypted for a long time, so long that by the time the information is received, the encrypted data will not be relevant.…”
Section: Introductionmentioning
confidence: 99%