2020
DOI: 10.29322/ijsrp.10.04.2020.p10013
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography: Avalanche effect of AES and RSA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
3

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 0 publications
0
6
0
3
Order By: Relevance
“…Penlitian lainnya yang juga mengukur dan membandingkan kekuatan enkripsi antara salah satu Kandidat AES yaitu Rijndael dengan algoritma RSA adalah penelitian [10]. Kekuatan enkripsi diukur melalui avalanche effect.…”
Section: Latar Belakangunclassified
See 1 more Smart Citation
“…Penlitian lainnya yang juga mengukur dan membandingkan kekuatan enkripsi antara salah satu Kandidat AES yaitu Rijndael dengan algoritma RSA adalah penelitian [10]. Kekuatan enkripsi diukur melalui avalanche effect.…”
Section: Latar Belakangunclassified
“…Berdasarkan kajian literatur yang dilakukan pada beberapa penelitian yang telah dijabarkan, penelitian ini akan meneruskan penelitian [8] dan penelitian [9] yang mengukur dan membandingkan kinerja algoritma Kandidat AES 128-bit pada perangkat android, namun penelitian ini akan melakukan enkripsi pada file dokumen dan menambahkan beberapa kinerja yang akan diukur yaitu ukuran file dan kecepatan enkripsi seperti penelitian [7] dan avalanche effect seperti pada penelitian [10]. Penelitian ini penting dilakukan untuk menemukan algoritma mana yang paling efisien untuk mengimplementasikan kriptografi pada file dokumen di perangkat android berdasarkan kebutuhan kinerjanya, sehingga membantu pengembang aplikasi android untuk memilih metode kriptografi yang paling sesuai.…”
Section: Latar Belakangunclassified
“…Another example is the term known as "Avalanche Effect" in crypto science, which is used to describe the situation in which a minor change in the encryption algorithm greatly affects the outcome [93] that results in failure in entire system. In economics, "Multiplier Effect" serves for the similar purpose.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…In this study, Avalanche Effect was used as a tool to measure the strength of AES and LWC Algorithm. Avalanche Effect method was given, explained by Verma and Sharma [9] and also discussed by Ariffin and Ashawesh [10].…”
Section: A Avalanche Effect Toolmentioning
confidence: 99%
“…The security of information, data, and network should be equipped with a strong cryptographic algorithm like Advanced Encryption Standard (AES) on each IoT devices to achieve identification of users, the confidentiality of data, integrity (correctness) of exact information, and deniability of unauthorized users including connection of unwanted devices [6]. Many organizations are shifting their mode of operation to IoT devices [6] - [9].Čolaković et al [6] indicated that security is needed during services requirement of IoT devices than making a profit. Today, IoT devices are needed in many companies for enabling technologies, services and applications, business models, social or environmental impacts [7].…”
Section: Introductionmentioning
confidence: 99%