Proceedings of the ACM Symposium on Women in Research 2016 2016
DOI: 10.1145/2909067.2909083
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Kerberos using DES Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…We leverage the LibTomCrypt as a filter to help us obtain the block cipher list in our experiment. In the end, we chose the Data Encryption Standard (DES) [17], Triple Data Encryption Standard (3DES) [18], Rivest Cipher2 (RC2) [19], Rivest Cipher5 (RC5) [20], Blowfish [21], and Advanced Encryption Standard (AES) [22].…”
Section: Preliminarymentioning
confidence: 99%
See 1 more Smart Citation
“…We leverage the LibTomCrypt as a filter to help us obtain the block cipher list in our experiment. In the end, we chose the Data Encryption Standard (DES) [17], Triple Data Encryption Standard (3DES) [18], Rivest Cipher2 (RC2) [19], Rivest Cipher5 (RC5) [20], Blowfish [21], and Advanced Encryption Standard (AES) [22].…”
Section: Preliminarymentioning
confidence: 99%
“…Cipher Block Chaining (CBC) was designed to address the problem of obtaining the same ciphertext after encrypting the same plaintext in ECB. It reduces the possibility of repeated patterns in the ciphertext [17]. In CBC mode, before a block of plaintext is encrypted, it needs to be XORed with the previous block of ciphertext.…”
Section: The Combination Of Block Cipher (Rc5) and Model Of Operation...mentioning
confidence: 99%