2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) 2016
DOI: 10.1109/iciccs.2016.7542294
|View full text |Cite
|
Sign up to set email alerts
|

Proposed symmetric key cryptography algorithm for data security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…For this, it was obtained as a result that the AES cryptographic algorithm is the most optimal, according to the score obtained; Within the research, the variables that characterize it were identified: key strength, block size, number of rounds and encryption speed; characteristics mentioned by the authors of the references (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16).…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…For this, it was obtained as a result that the AES cryptographic algorithm is the most optimal, according to the score obtained; Within the research, the variables that characterize it were identified: key strength, block size, number of rounds and encryption speed; characteristics mentioned by the authors of the references (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16).…”
Section: Discussionmentioning
confidence: 99%
“…Cryptography, in addition to providing confidentiality and privacy, within its main features that it provides are: authentication, data integrity, non-repudiation, etc [4,5]. The two main methods are Symmetric Key Cryptography and Asymmetric Key Cryptography [6].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Anonymous communication system is one of the main topics in information security system, and the attack against the system is very vulnerable due to the less security issues in the system. These attacks have to be checked and analyzed using various cryptographic techniques [18,19] to find the chip attack on chips and the attacks in digital circuits [1] to be predicted with various important technologies during the decryption of the message in the receiver's end. The Vigenere cipher algorithm method is used for data protection in the form of images, especially for the data transfer in the form of images [20].…”
Section: Related Workmentioning
confidence: 99%
“…Information sharing has become a major area in the digitized world. Information is shared through data, images, and files [1], and may involve any public and private messages or any conversations [2]. It may also include some confidential messages.…”
Section: Mathematics Subject Classification 94-xx 1 Introductionmentioning
confidence: 99%