2018
DOI: 10.1007/978-981-10-6872-0_21
|View full text |Cite
|
Sign up to set email alerts
|

BRRC: A Hybrid Approach Using Block Cipher and Stream Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…The increasing demand for the confidentiality of information necessitates the creation of new encryption techniques and algorithms [1], [2], [5], [6]. According to William Stalling, the security of encrypted data is entirely dependent on two factors: the strength of the cryptographic technology and the secrecy of the key [7]. These algorithms must be fast and secure enough to prevent wasting resources in low constrain devices.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The increasing demand for the confidentiality of information necessitates the creation of new encryption techniques and algorithms [1], [2], [5], [6]. According to William Stalling, the security of encrypted data is entirely dependent on two factors: the strength of the cryptographic technology and the secrecy of the key [7]. These algorithms must be fast and secure enough to prevent wasting resources in low constrain devices.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptographic analysts have successfully exploited any flaws in algorithm designs and there have been security breaches in [7]- [9]. To prevent a cryptanalyst from exploiting algorithm weaknesses, two or more algorithms are combined to create a new one called a hybrid cipher.…”
Section: Introductionmentioning
confidence: 99%