Search Results - random key algorithm
Search alternatives:
-
1
Message based random variable length key encryption algorithm.
Published 2009“…Exhaustive key search shows that key generation should be indeterminist and random for each round. …”
Get full text
Get full text
Article -
2
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
Published 2005“…Attacks against simplified variants of the AES algorithm have been reported for 128-bit keys, 7 rounds out of 10 have been attacked; for 192-bit keys, 7 rounds out of 12 have been attacked; for 256-bit keys, 9 rounds out of 14 have been attacked. …”
Get full text
Get full text
Thesis -
3
A shift column different offset for better Rijndael security
Published 2009“…The strength of an encryption algorithms depends on the key’s secrecy combined with the structure of the block cipher that is able to produce random output. …”
Get full text
Get full text
Get full text
Article -
4
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
Published 2021“…Unfortunately, the failed test results for Cipher Block Chaining Mode (CBCM), Strict Key Avalanche (SKA), High Density Key (HDK), and Random Plaintext Random Key (RPRK) data categories indicate that 3D-AES produced non-random output binary sequences. …”
Get full text
Get full text
Thesis -
5
Enhancing The Randomness Of Symmetric Key Using Genetic Algorithm
Published 2019“…As the advancement of technology in Artificial Intelligence (AI), Genetic Algorithm (GA) is implemented to generate the best-fit key in symmetric-key cryptography. …”
Get full text
Get full text
Get full text
Article -
6
A novel enhancement technique of the hill cipher for effective cryptographic purposes.
Published 2011“…A random matrix key, RMK is introduced as an extra key for encryption. …”
Get full text
Get full text
Get full text
Article -
7
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
Published 2018“…In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
Get full text
Get full text
Get full text
Article -
8
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…A random matrix key is introduced as an extra key for encryption. …”
Get full text
Get full text
Article -
9
A true random number generator for crypto embedded systems
Published 2006“…All crypto protocols require the generation and use of secret values that must be unknown to attackers. Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
10
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…In this paper, asymmetric key algorithm is used. Asymmetric key algorithm is also known as public-key cryptography, is a class of cryptographic algorithms with require two separate keys, one is secret (private) key and another one is public key. …”
Get full text
Get full text
Thesis -
11
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Keys are traditionally generated from small size input (seed) to a bigger size random key(s). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Randomness improvement of AES using MKP
Published 2013“…In previous work we proposed a Multiple-key Protocol (MKP) for AES algorithm. In this paper we tested the randomness of MKP-AES algorithm by using the diehard statistical tests software. …”
Get full text
Get full text
Get full text
Article -
14
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The enhanced BA is known as Ramlan Ashwak Faudziah (RAF) algorithm. The implementation phase involved performing key expansion, data encryption, and data decryption. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Randomness Tests On Nine Data Categories Of RECTANGLE Using NIST Statistical Test Suite
Published 2024Article -
18
Conflict-free automated guided vehicles routing using multi-objective genetic algorithm
Published 2013“…The algorithm used weight mapping crossover (WMX) and Insertion Mutation (IM) for priority-based representation and parameterized uniform crossover (PUX) for random-key based representation. …”
Get full text
Get full text
Get full text
Article -
19
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. …”
Get full text
Get full text
Conference or Workshop Item -
20
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…Finally, the implementation result in this research shows the average time needed to encrypt and decrypt a voice packet size using a proposed algorithm with the long key of 1024-bits is much smaller than AES_Rijndael algorithm with a short key length of 128-bits.…”
Get full text
Get full text
Get full text
Get full text
Thesis
