2021
DOI: 10.1007/978-3-030-63115-4
|View full text |Cite
|
Sign up to set email alerts
|

Modern Cryptography

Abstract: translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Diffusion is the property of the cryptographic algorithm which defines that multiple characters of the cipher text are changed if one character changes in the plaintext. It achieves through the permutation process [18]. As we have seen in Table 7 the comparison of the existing hybrid algorithm and the proposed algorithm using the same plain text.…”
Section: Confusion and Diffusion Propertymentioning
confidence: 99%
See 1 more Smart Citation
“…Diffusion is the property of the cryptographic algorithm which defines that multiple characters of the cipher text are changed if one character changes in the plaintext. It achieves through the permutation process [18]. As we have seen in Table 7 the comparison of the existing hybrid algorithm and the proposed algorithm using the same plain text.…”
Section: Confusion and Diffusion Propertymentioning
confidence: 99%
“…Frequency analysis is one method to evaluate whether the cipher text is exposed to attack or not due to how often the characters or symbols appear in the cipher text [18]. If the frequency occurrence of a character is high, the cipher text can be easily broken by cryptanalysis attacks.…”
Section: Frequency Occurrence Of a Charactermentioning
confidence: 99%
“…When using IoT devices, conventional cryptographic methods such as the symmetric cryptographic algorithm AES, hashing functions like SHA-256, MD5, as well as other cryptographic security methods such as RSA or ECC (Elliptic Curve Cryptography), do not perform optimally on systems with limited computational power and memory capacity because they occupy too much physical space and processor power, consequently consuming too much power, which is unacceptable for devices with limited capabilities [1], [2]. One of the biggest security threats associated with IoT devices is that even the simplest data collection devices (sensors and measuring modules) can be vulnerable to cyberattacks.…”
Section: Introductionmentioning
confidence: 99%
“…1e5 MB/photo, or 100e600 MB/min of video e depending on the data format and applied quality configuration), analyze (over 1 GHz in clock rate e the running frequency of the CPU [27]), and store (8e512 GB) or transfer (up to approx. 100 megabites per second (MbPS) for 4G mobile networks [28]) large quantities of raw information [29] and to securely transmit the interpreted results to relevant authenticated parties by network encryption protocols [30]. Yet, the complexities associated with SbS data handling related to data collection, processing, interpretation, and storage/ persistence, are rarely reported in the literature.…”
Section: Introductionmentioning
confidence: 99%