scispace - formally typeset
Search or ask a question
Book ChapterDOI

BRRC: A Hybrid Approach Using Block Cipher and Stream Cipher

01 Jan 2018-Advances in intelligent systems and computing (Springer, Singapore)-Vol. 563, pp 221-231
TL;DR: The current work presents design of a hybrid algorithm that makes uses of content replication removal in input data, block cipher and stream cipher cryptographic algorithms.
Abstract: Design of cryptographic algorithms has ever been meant for making messages confidential strong enough for cryptanalysts This has resulted into different categories of encryption/decryption algorithms while they have their own pros and cons The cryptanalysts have played roles in observing confidential messages, identifying used algorithms to encrypt messages, and they have been successful in exploiting the weak points, if found any, in the algorithms’ designs But Hybrid cryptographic algorithms, which bring mixture of randomness in the ciphered text, are ones of some obstacles for them It is more difficult to break the hybrid ciphered text than that of block or stream cipher text The current work presents design of a hybrid algorithm that makes uses of content replication removal in input data, block cipher and stream cipher cryptographic algorithms
Citations
More filters
Peer Review
TL;DR: Simulation results show, according to a National Institute of Standards and Technology (NIST) test, the performance achieved by the SSDIC is increased by nearly 66% more than that achieved from the Speck in terms of data integrity and confidentiality.
Abstract: Received May 11, 2022 Revised Jun 14, 2022 Accepted Jun 21, 2022 The induction motor is extremely well known and used as an alternating current (AC) machine. Therefore, torque and speed regulations are very essential for this type of machine. This paper presents direct torque control (DTC) based on induction motors (IM). The mathematical model of IM is reported, and the machine is modeled in a synchronous coordinate farm. Classic DTC is applied to IM with two bandwidths of hysteresis controller for electromagnetic torque and stator flux. The system is simulated and investigated via MATLAB/Simulink and the results carry out a high ripple on the torque. There are numerous of improving torque response, one of them is adding a new loop for speed with proportional, integral, and derivative (PID) controllers. IM model with PID based on DTC is simulated through MATLAB. A contrast performance of IM is presented between traditional DTC and DTC with PID. As result, the new DTC with PID carries out improvement in the speed response as well reduces the ripples of torque.
Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, double layer protection is implemented in order to ruggedize the security mechanism of LTE networks, which utilizes better speed of AES and robust security of Rivest-Shamir-Adleman (RSA) together to achieve a hybrid system with improved performance compared to the traditional algorithm.
Abstract: Achieving better security for the transmission of data over cellular networks has always being a hard nut to crack. Security of long-term evolution (LTE) network is prime concern because of existence of malicious attackers. The security of network can be enhanced by utilizing cryptography. However, each cryptographic algorithm has its own pros and cons. So, hybridization (merging two or more algorithms) is one of the solutions to achieve better security. In this paper, double layer protection is implemented in order to ruggedize the security mechanism of LTE networks. The proposed algorithm utilizes better speed of AES and robust security of Rivest–Shamir–Adleman (RSA) together to achieve a hybrid system with improved performance compared to the traditional algorithm. The cryptanalysis has been intricated by increasing the number of keys to six. Further, the time required for encryption of keys is less when compared to decryption making the network more rugged and secure. In order to further enhance the speed, the concept of parallel processing is utilized. Then, proposed framework is analysed based on various parameters, and it is experimentally concluded that it provides approximately 22.7% increment in acceleration when compared to encryption rate and about 22.3% increment in acceleration when compared to decryption rate. 10% enhancement in percentage of avalanche effect has been achieved thereby increasing confusion in ciphertext and reducing chances of decoding. 5.39% increment in PSNR values of the proposed algorithm has been achieved when compared to existing algorithm.
References
More filters
Book
01 Jan 1996
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Abstract: From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.

13,597 citations

Book
01 Jun 1998

2,624 citations

Journal ArticleDOI
TL;DR: In this paper, the authors collected file system content data from 857 desktop computers at Microsoft over a span of four weeks and analyzed the data to determine the relative efficacy of data deduplication, particularly considering whole file versus block-level elimination of redundancy.
Abstract: We collected file system content data from 857 desktop computers at Microsoft over a span of 4 weeks. We analyzed the data to determine the relative efficacy of data deduplication, particularly considering whole-file versus block-level elimination of redundancy. We found that whole-file deduplication achieves about three quarters of the space savings of the most aggressive block-level deduplication for storage of live file systems, and 87p of the savings for backup images. We also studied file fragmentation, finding that it is not prevalent, and updated prior file system metadata studies, finding that the distribution of file sizes continues to skew toward very large unstructured files.

547 citations

Journal ArticleDOI
Andreas Klein1
TL;DR: The attack described by Fluhrer, Mantin, Shamir in such a way, that it will work, if the weak keys described in that paper are avoided, and a further attack will work if the first 256 Byte of the output remain unused.
Abstract: In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described by Fluhrer, Mantin, Shamir (In: Selected Areas in Cryptography, 2001) in such a way, that it will work, if the weak keys described in that paper are avoided. A further attack will work even if the first 256 Byte of the output remain unused. Finally we show that variants of the RC4 algorithm like NGG and RC4A are also vulnerable by these techniques.

206 citations

Proceedings ArticleDOI
03 Dec 2010
TL;DR: By studying the data de-duplication strategy, processes, and implementations for the following further lay the foundation of the work.
Abstract: With the information and network technology, rapid development, rapid increase in the size of the data center, energy consumption in the proportion of IT spending rising In the great green environment many companies are eyeing the green store, hoping thereby to reduce the energy storage system Data de-duplication technology to optimize the storage system can greatly reduce the amount of data, thereby reducing energy consumption and reduce heat emission Data compression can reduce the number of disks used in the operation to reduce disk energy consumption costs By studying the data de-duplication strategy, processes, and implementations for the following further lay the foundation of the work

90 citations