RBJ25 cryptography algorithm for securing big data
S. Rajaprakash,C. Bagath Basha,S. Muthuselvan,N. Jaisankar,Ravi Pratap Singh +4 more
- Vol. 1706, Iss: 1, pp 012146
Reads0
Chats0
About:
The article was published on 2020-12-01 and is currently open access. It has received 8 citations till now. The article focuses on the topics: Cryptography & Big data.read more
Citations
More filters
Journal Article
Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round.
TL;DR: In this article, the authors present an optimized attack based on a divide-and-conquer strategy named bricklayer attack for ChaCha20 on a 32-bit architecture.
Journal ArticleDOI
Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud
TL;DR: The FAEA method is evaluated for its performance toward efficiency, scalability, and security and proved to be 98% ahead of the existing methods of Security Hadoop Distributed File System Sec (HDFS) and Map Reduce Encryption Scheme (MRE).
Book ChapterDOI
Security Techniques Implementation on Big Data Using Steganography and Cryptography
TL;DR: In this article , the authors have studied popular data hiding techniques, especially steganography and cryptography used for providing security to big databases, and they have proposed a scheme to enhance the secrecy, privacy, and increase the capacity for hiding secret cover.
Journal ArticleDOI
A Novel Security Algorithm RPBB31 for Securing the Social Media Analyzed Data using Machine Learning Algorithms
Meenakumari Ramachandran,S Muthusamy,Hitesh Panchal,Kokilavani Thangaraj,A. Antony Ravindaran +4 more
TL;DR: In this paper , the authors proposed a new security algorithm named RPBB31, which has seven stages, the first stage is to find the secret key N, n, and p values from the matrix.
References
More filters
Book ChapterDOI
Improved key recovery attacks on reduced-round salsa20 and chacha
TL;DR: Improved key recovery attacks on reduced-round Salsa20 and ChaCha are presented, which generalize the notion of PNB to probabilistic neutral vectors (PNV) and show that the set of PNV is no smaller than that of P NB.
Journal Article
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20.
S. V. Dilip Kumar,Sikhar Patranabis,Jakub Breier,Debdeep Mukhopadhyay,Shivam Bhasin,Anupam Chattopadhyay,Anubhab Baksi +6 more
TL;DR: In this article, the authors present the first practical fault attack on the ChaCha family of addition-rotation-XOR (ARX)-based stream ciphers.
Journal ArticleDOI
Enhancing the security using SRB18 method of Embedding Computing
C. Bagath Basha,S. Rajaprakash +1 more
TL;DR: A novel algorithm is proposed by modifying the Salsa20/4 to further enhance the security of the polarity scores, which is an important requirement of the present world.
Journal Article
Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round.
TL;DR: In this article, the authors present an optimized attack based on a divide-and-conquer strategy named bricklayer attack for ChaCha20 on a 32-bit architecture.
Proceedings ArticleDOI
Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure
TL;DR: This work proposes a fault injection attack on Salsa20 and ChaCha stream ciphers that skips the corresponding addition (add) instruction to obtain the matrix X or X(20) and extracts the key and demonstrates an algorithm-specific but extremely lightweight countermeasure with less than 0.5% execution time overhead.