2015
DOI: 10.1016/j.asej.2014.08.001
|View full text |Cite
|
Sign up to set email alerts
|

LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm

Abstract: Cryptographic algorithms for confidentiality and authentication play a major important role in nowadays information security Sen (2012) [1]. Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. A new stream cipher is proposed. The design is very simple and based on 16 shift registers, nonlinear and an output function. The proposed algorithm is characterized by a high performance in software with measured encryption/decryption on Pentium… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 9 publications
(5 reference statements)
0
3
0
Order By: Relevance
“…And, furthermore, it is unable to guarantee the data authentication of patients. The other common secret key algorithm is suggested in [16], that uses a single key of 128 bits. It's achieved full diffusion after just one round.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…And, furthermore, it is unable to guarantee the data authentication of patients. The other common secret key algorithm is suggested in [16], that uses a single key of 128 bits. It's achieved full diffusion after just one round.…”
Section: Related Workmentioning
confidence: 99%
“…However, initially, there is a International Journal of Intelligent Engineering and Systems, Vol. 16 need to decrypt the stored data in the cloud to perform computations on it, which makes the data exposed to the service provider. Nevertheless, these systems with public cloud services lead to a breach of privacy.…”
Section: Introductionmentioning
confidence: 99%
“…Over the last decade, variations of LWC with different properties have been proposed [12]. A word-oriented stream cipher [13] that takes 128-bit as an initial vector and an initial key as inputs while the generated output is a 32-bit key-stream. Afterwards, the keystream is used to encrypt the plain text.…”
Section: Related Workmentioning
confidence: 99%