2015 World Symposium on Computer Networks and Information Security (WSCNIS) 2015
DOI: 10.1109/wscnis.2015.7368295
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating SHA-2 256 with OFB to realize a novel encryption method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Scrambling text and pictures is recommended in this approach resulting in the reduction of computational cost and better permutation. The SHA-2 algorithm is presented (Ibrahim et al, 2015). Scrambling and diffusion stages are presented (Salagundi et al, 2016).…”
Section: Literature Surveymentioning
confidence: 99%
“…Scrambling text and pictures is recommended in this approach resulting in the reduction of computational cost and better permutation. The SHA-2 algorithm is presented (Ibrahim et al, 2015). Scrambling and diffusion stages are presented (Salagundi et al, 2016).…”
Section: Literature Surveymentioning
confidence: 99%
“…Telemetry and control links are especially susceptible to attacks and is in active debate within global space/satellite community [4]. SHA-2 is also known as a oneway algorithm and it is susceptible to infringement and researchers are currently using it in combination with OFB to make it reversible with an added advantage of making it more secure [5]. In this paper, a high speed, low latency and low resource consuming design for AES-128 encryption is presented for streaming applications.…”
Section: Introductionmentioning
confidence: 99%