2021
DOI: 10.11591/ijece.v11i3.pp2335-2342
|View full text |Cite
|
Sign up to set email alerts
|

Files cryptography based on one-time pad algorithm

Abstract: The Vernam-cipher is known as a one-time pad of algorithm that is an unbreakable algorithm because it uses a typically random key equal to the length of data to be coded, and a component of the text is encrypted with an element of the encryption key. In this paper, we propose a novel technique to overcome the obstacles that hinder the use of the Vernam algorithm. First, the Vernam and advance encryption standard AES algorithms are used to encrypt the data as well as to hide the encryption key; Second, a passwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…In recent years, computer sciences and technology have played a key role in many areas, such as the internet of things [1], network security [2], object detection, scene classification [3], and remote sensing [4]. Scene classification plays a key role in daily life due to alteration in the scenes' countenance and environment.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, computer sciences and technology have played a key role in many areas, such as the internet of things [1], network security [2], object detection, scene classification [3], and remote sensing [4]. Scene classification plays a key role in daily life due to alteration in the scenes' countenance and environment.…”
Section: Introductionmentioning
confidence: 99%
“…With the speedy evolution of digital documents and data exchange, the process of protecting data also needs to be advanced to ensure the safety of data from loss or modification [1]. Cryptographic algorithms can be classified according to symmetrical and asymmetrical encryption algorithms [2].…”
Section: Introductionmentioning
confidence: 99%