• Nenhum resultado encontrado

NEW APPROACH IN SYMMETRIC BLOCK CIPHER SECURITY USING A NEW CUBICAL TECHNIQUE

N/A
N/A
Protected

Academic year: 2017

Share "NEW APPROACH IN SYMMETRIC BLOCK CIPHER SECURITY USING A NEW CUBICAL TECHNIQUE"

Copied!
7
0
0

Texto

Loading

Imagem

Table 1: cube movement directions  Encryption Algorithm:
Figure 2: Decryption process.
Figure 3: The experiment result

Referências

Documentos relacionados

The principle characteristics of TinySec are (a) a light weight and efficient link layer security package (b) Skipjack as the block cipher with only 80-bit key size (c) integrated

Upendra Kumar [7] proposed a secure key exchange and encryption mechanism for group communication in wireless adhoc networks that aims to use the MAC address as an

In this approach the encryption is simply adding the key to the plain text number to get the cipher text number while decryption is subtracting the key from the cipher text number

The algorithm encryption and decryption of an image transform an image into cipher code using the random keys, which allow users to have confidentiality and security in

Encryption is the process of converting a plaintext message into cipher text which can be decoded back into the original message using the secret key. An encryption/

The sequence of musical notes generated for the particular character sequence of plain text message mimic a musical pattern.. This musical pattern is sent to the receiver as a

The DySC algorithm takes plain text of length n bits, a key of length n bits and it produces an output of length n bits. This is dynamic, since it uses plain text, key of

It is very suitable for factorization against RSA algorithms, because that have a product of two prime number, so there is no more than two factors, NF method factorize all