scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
Patent
29 Mar 1990
TL;DR: In this article, a video system includes a central facility and a terminal, where the central facility includes means for providing a session encryption key, a data base for storing and retrieving at least one code encryption key corresponding to the program identification data, and means for encrypting the code encrypted key according to the session encryption encryption key.
Abstract: A video system includes a central facility and a terminal. Video program means for provides the terminal with a video program including a series of television fields including a first field containing both a random digital code encrypted according to a code encryption key and program identification data, and a second field containing an unintelligible video signal previously transformed from an intelligible video signal according to the random digital code. The terminal includes means to store terminal identification data and a terminal specific encryption key; and means to send to the central facility the program idenficiation data and the terminal identification data. The central facility includes means for providing a session encryption key, means for encrypting the session encryption key according to the terminal specific encryption key, means for sending the encrypted session encryption key from the central facility to the terminal, a data base for storing and retrieving at least one code encryption key corresponding to the program identification data, means for encrypting the code encryption key according to the session encryption encryption key, and means for sensing the encrypted code encryption key from the central facility to the terminal. The terminal further includes means for receiving the encrypted session encryption key from the central facility, decryption means for decrypting the session encryption key according to the terminal specific encryption key, means for receiving the encrypted code encryption key from the central facility, decryption means for decrypting the code encryption key according to the session encryption encryption key, and decrypting the encrypted random digital code of the first frame in accordance with the code encryption key; and means for transforming the unintelligible video signal of the second frame to the intelligible video signal using the decrypted random digital code.

61 citations

Proceedings ArticleDOI
12 Dec 2011
TL;DR: It has been proved that the algorithm has achieved the computing-security level in the encryption security estimating system and the validity of the algorithm is proved through simulation and the theoretical analysis, including bio-security and math-security.
Abstract: In this paper, a new index-based symmetric DNA encryption algorithm has been proposed. Adopting the methods of Block-Cipher and Index of string, the algorithm encrypts the DNA-sequence-based plaintext. First, the algorithm encodes each character into ASCII codes. And then, according to the nucleotide sequence, the researcher should convert it to the DNA coding. Besides, the researcher selects the special DNA sequence as the encryption index, and likewise, the pretreated plaintext will be divided into different groups. Next, the key created by the Chaos Key Generator based on the Logistic Mapping and initialized by the number x 0 and μ, will take XOR operation with the block-plaintext. The type of number x 0 and μ, which is selected by the researcher, is double. Then, the result of these processes will be translated on the DNA sequence. In addition, compared to special DNA sequence, the algorithm finds the sequence which has no difference with it. Then, the algorithm will store the position as the Cipher-text. The researcher proves the validity of the algorithm through simulation and the theoretical analysis, including bio-security and math-security. The algorithm has a huge key space, high sensitivity to plaintext, and an extremely great effect on encryption. Also, it has been proved that the algorithm has achieved the computing-security level in the encryption security estimating system.

61 citations

Book ChapterDOI
23 Mar 2015
TL;DR: One approach towards basing public-key encryption (PKE) schemes on weak and credible assumptions is to build “stronger” or more general schemes generically from “weaker’ or more restricted ones.
Abstract: One approach towards basing public-key encryption (PKE) schemes on weak and credible assumptions is to build “stronger” or more general schemes generically from “weaker” or more restricted ones. One particular line of work in this context was initiated by Myers and shelat (FOCS ’09) and continued by Hohenberger, Lewko, and Waters (Eurocrypt ’12), who provide constructions of multi-bit CCA-secure PKE from single-bit CCA-secure PKE.

61 citations

Proceedings ArticleDOI
06 Nov 2002
TL;DR: This paper presents a novel fault detection scheme which is based on a multiple parity bit code and shows that the proposed scheme leads to very efficient and high coverage fault detection.
Abstract: Concurrent fault detection for a hardware implementation of the Advanced Encryption Standard (AES) is important not only to protect the encryption/decryption process from random faults. It will also protect the encryption/decryption circuitry from an attacker who may maliciously inject faults in order to find the encryption secret key. In this paper we present a novel fault detection scheme which is based on a multiple parity bit code and show that the proposed scheme leads to very efficient and high coverage fault detection. We then estimate the associated hardware costs and detection latencies.

61 citations

Patent
07 Jun 2001
TL;DR: In this paper, a method and a corresponding device for generating true random numbers for use in encryption of a message for secure transmission of said message from a sending device to a receiver, or for authentication of a sent message.
Abstract: A method and a corresponding device for generating true random numbers for use in encryption of a message for secure transmission of said message from a sending device to a receiver, or for authentication of a sent message. An optical image represented by optical data is obtained by an optical sensor and processed in order to improve the stochasticity of the optical data. The thus processed data is then used for generating random numbers which can be used as an encryption key, or for generating an encryption key, for subsequent use in an encryption algorithm for encrypting the message. The method is implemented in a digital pen (DP) to be used in an information management system.

61 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194