2017 Annual Conference on New Trends in Information &Amp; Communications Technology Applications (NTICT) 2017
DOI: 10.1109/ntict.2017.7976119
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement CAST block algorithm to encrypt big data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(16 citation statements)
references
References 3 publications
0
16
0
Order By: Relevance
“…Any of the cryptosystems encrypts plaintext image into an image that has random pixels. After the process of encryption, the purpose of histogram analysis is to show the dispersal of these pixels [27].…”
Section: Histogram Analysismentioning
confidence: 99%
“…Any of the cryptosystems encrypts plaintext image into an image that has random pixels. After the process of encryption, the purpose of histogram analysis is to show the dispersal of these pixels [27].…”
Section: Histogram Analysismentioning
confidence: 99%
“…The group G 5 =<x: x 32 =1> of order 32 with only one generator, that is, x:= (27,24,28,21,3,11,5,25,17,9,23,26,8,12,18,20,7,30,22,14,19,29,15,6,1,10,4,2,32,31,13,16); acts naturally on the index set I Ωi of A 1 that is, 5×5 S-box from chaos-based search. This action can be defined as:…”
Section: B Proposed Group Structures and Actionsmentioning
confidence: 99%
“…Due to open and insecure nature of internet and networking technologies, security of sensitive information and multimedia data has been crucial issue since decades. Over the years, different types of data security techniques have been suggested the cryptographers [1,2]. Depending upon how data is processed, the cryptographic algorithms can be classified as block ciphers and stream ciphers.…”
Section: Introductionmentioning
confidence: 99%
“…Write the hypothesis for T test: Writing a test hypothesis for Pearson Correlation: H0: There is no linear relationship between Time and Method 2 for results 1 H1: There is a linear relationship between Time and Method 2 for results 1 The results of T test and Correlation obtained through applying the SPSS statistical analysis program for the data are as follows:…”
Section: A Test Metthod-1mentioning
confidence: 99%
“…Since there is a limited number of trained and experienced personnel that are able to verify the validity of these biases manually, it is necessary to find an efficient and inexpensive method, particularly one that does not require vast experience or an advanced level of training. Hence, it is dependent on computer methods [1]- [6]. It can store and retain sensitive and important information and data securely by eliminating data fraud, enhancing data safety and security.…”
Section: Introductionmentioning
confidence: 99%