2016 Symposium on Colossal Data Analysis and Networking (CDAN) 2016
DOI: 10.1109/cdan.2016.7570921
|View full text |Cite
|
Sign up to set email alerts
|

Exploration of efficient symmetric AES algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…In addition, the forgotten password feature and the secret answer lock used to change forgotten passwords are more secure than in other systems. From the study [14] it was found that the Twofish algorithm has mean encryption performance compared to the other algorithms in the study and it uses less memory; two factors considered in selecting that algorithm to encrypt the questions and answers for resetting the password in this current study.…”
Section: Discussion Of Phase 1 Resultsmentioning
confidence: 87%
See 2 more Smart Citations
“…In addition, the forgotten password feature and the secret answer lock used to change forgotten passwords are more secure than in other systems. From the study [14] it was found that the Twofish algorithm has mean encryption performance compared to the other algorithms in the study and it uses less memory; two factors considered in selecting that algorithm to encrypt the questions and answers for resetting the password in this current study.…”
Section: Discussion Of Phase 1 Resultsmentioning
confidence: 87%
“…In [14] , the authors clarify the scalability of different Symmetric Key Cryptography algorithms, and these SKC algorithms are analysed relying on encryption execution and memory usage. The main goal of the memory usage test in [14] is to quantify the effectiveness and execution of SKC algorithms. The encryption rate ought to be as low as feasibly possible for better performance.…”
Section: Twofish Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The first categorization method depends on the number of keys: Symmetric versus asymmetric (Wahid, et al, 2018), whereas the second categorization method involves the type of cipher operation: Substitution (S-Box), permutation (P-Box), cipher product (S-P), and numbers manipulation. The third categorization method takes into consideration the way of processing plain text into two main categories: Stream (which is further sub-categorized into synchronous and selfsynchronous) and block ciphers (Mewada, Sharma and Gautam, 2016). The last categorization method depends on the chronological order: Beginning with the traditional, into modern, the most recent lightweight and ultra-lightweight (Hasan, et al, 2021).…”
Section: Cipher Classificationmentioning
confidence: 99%
“…The cryptosystem generates a symmetrical encryption Key [12]. The main idea is to shuffle the colors of the image -M‖ with dimensions , using the generated key.…”
Section: A Descriptionmentioning
confidence: 99%