Search Results - random key algorithm

Refine Results
  1. 1

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Exhaustive key search shows that key generation should be indeterminist and random for each round. …”
    Get full text
    Get full text
    Article
  2. 2

    Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm by Abdulbari Ali, Sherif

    Published 2005
    “…Attacks against simplified variants of the AES algorithm have been reported for 128-bit keys, 7 rounds out of 10 have been attacked; for 192-bit keys, 7 rounds out of 12 have been attacked; for 256-bit keys, 9 rounds out of 14 have been attacked. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A shift column different offset for better Rijndael security by Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim

    Published 2009
    “…The strength of an encryption algorithms depends on the key’s secrecy combined with the structure of the block cipher that is able to produce random output. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof by Mohd Yusof, Nor Azeala

    Published 2021
    “…Unfortunately, the failed test results for Cipher Block Chaining Mode (CBCM), Strict Key Avalanche (SKA), High Density Key (HDK), and Random Plaintext Random Key (RPRK) data categories indicate that 3D-AES produced non-random output binary sequences. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancing The Randomness Of Symmetric Key Using Genetic Algorithm by Zakaria, Afiqah Zahirah, Ramli, Sofia Najwa, Wen, Chuah Chai, Mohd Foozy, Cik Feresa, Palaniappan, P. Siva Shamala, Othman, Nur Fadzilah

    Published 2019
    “…As the advancement of technology in Artificial Intelligence (AI), Genetic Algorithm (GA) is implemented to generate the best-fit key in symmetric-key cryptography. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys by Khalaf, Emad Taha, Mohammed, Muamer N., Kohbalan, Moorthy, Hasan, Raed Abdulkareem

    Published 2018
    “…In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…All crypto protocols require the generation and use of secret values that must be unknown to attackers. Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
    Get full text
    Get full text
    Article
  10. 10

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…In this paper, asymmetric key algorithm is used. Asymmetric key algorithm is also known as public-key cryptography, is a class of cryptographic algorithms with require two separate keys, one is secret (private) key and another one is public key. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Keys are traditionally generated from small size input (seed) to a bigger size random key(s). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Randomness improvement of AES using MKP by Al-Alak, Saif, Zukarnain, Zuriati, Abdullah, Azizol, Subramiam, Shamala

    Published 2013
    “…In previous work we proposed a Multiple-key Protocol (MKP) for AES algorithm. In this paper we tested the randomness of MKP-AES algorithm by using the diehard statistical tests software. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box by Alabaichi, Ashwak Mahmood

    Published 2014
    “…The enhanced BA is known as Ramlan Ashwak Faudziah (RAF) algorithm. The implementation phase involved performing key expansion, data encryption, and data decryption. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Conflict-free automated guided vehicles routing using multi-objective genetic algorithm by Umar, Ali Umar, Mohd Ariffin, Mohd Khairol Anuar, Ismail, Napsiah, Tang, Sai Hong

    Published 2013
    “…The algorithm used weight mapping crossover (WMX) and Insertion Mutation (IM) for priority-based representation and parameterized uniform crossover (PUX) for random-key based representation. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…Finally, the implementation result in this research shows the average time needed to encrypt and decrypt a voice packet size using a proposed algorithm with the long key of 1024-bits is much smaller than AES_Rijndael algorithm with a short key length of 128-bits.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis