scispace - formally typeset
Open AccessJournal ArticleDOI

RBJ25 cryptography algorithm for securing big data

Reads0
Chats0
About
The article was published on 2020-12-01 and is currently open access. It has received 8 citations till now. The article focuses on the topics: Cryptography & Big data.

read more

Citations
More filters
Journal Article

Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round.

TL;DR: In this article, the authors present an optimized attack based on a divide-and-conquer strategy named bricklayer attack for ChaCha20 on a 32-bit architecture.
Journal ArticleDOI

Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud

A Vidhya
TL;DR: The FAEA method is evaluated for its performance toward efficiency, scalability, and security and proved to be 98% ahead of the existing methods of Security Hadoop Distributed File System Sec (HDFS) and Map Reduce Encryption Scheme (MRE).
Book ChapterDOI

Security Techniques Implementation on Big Data Using Steganography and Cryptography

TL;DR: In this article , the authors have studied popular data hiding techniques, especially steganography and cryptography used for providing security to big databases, and they have proposed a scheme to enhance the secrecy, privacy, and increase the capacity for hiding secret cover.
Journal ArticleDOI

A Novel Security Algorithm RPBB31 for Securing the Social Media Analyzed Data using Machine Learning Algorithms

TL;DR: In this paper , the authors proposed a new security algorithm named RPBB31, which has seven stages, the first stage is to find the secret key N, n, and p values from the matrix.
References
More filters
Book ChapterDOI

Improved key recovery attacks on reduced-round salsa20 and chacha

TL;DR: Improved key recovery attacks on reduced-round Salsa20 and ChaCha are presented, which generalize the notion of PNB to probabilistic neutral vectors (PNV) and show that the set of PNV is no smaller than that of P NB.
Journal Article

A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20.

TL;DR: In this article, the authors present the first practical fault attack on the ChaCha family of addition-rotation-XOR (ARX)-based stream ciphers.
Journal ArticleDOI

Enhancing the security using SRB18 method of Embedding Computing

TL;DR: A novel algorithm is proposed by modifying the Salsa20/4 to further enhance the security of the polarity scores, which is an important requirement of the present world.
Journal Article

Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round.

TL;DR: In this article, the authors present an optimized attack based on a divide-and-conquer strategy named bricklayer attack for ChaCha20 on a 32-bit architecture.
Proceedings ArticleDOI

Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure

TL;DR: This work proposes a fault injection attack on Salsa20 and ChaCha stream ciphers that skips the corresponding addition (add) instruction to obtain the matrix X or X(20) and extracts the key and demonstrates an algorithm-specific but extremely lightweight countermeasure with less than 0.5% execution time overhead.