scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
Proceedings ArticleDOI
01 Oct 2010
TL;DR: The main idea of the algorithm is to use one half of image data for encryption of the other half of the image reciprocally, to increase the image entropy.
Abstract: In this paper, a novel algorithm for image encryption based on SHA-512 is proposed. The main idea of the algorithm is to use one half of image data for encryption of the other half of the image reciprocally. Distinct characteristics of the algorithm are high security, high sensitivity and high speed that can be applied for encryption of gray-level and color images. The algorithm consists of two main sections: The first does preprocessing operation to shuffle one half of image. The second uses hash function to generate a random number mask. The mask is then XORed with the other part of the image which is going to be encrypted. The aim of this work is to increase the image entropy. Both security and performance aspects of the proposed algorithm are analyzed and satisfactory results are achieved in various rounds.

54 citations

Patent
29 Oct 2003
TL;DR: In a network, a router uses some secret information combined with a cryptographic process in determination of a subnet's routing prefix as mentioned in this paper, and several methods are disclosed, including using an IP suffix for prefix generation and for decryption, maintaining a pool of pseudo prefixes at the router, using public key encryption and symmetric key encryption.
Abstract: In a network, a router uses some secret information combined with a cryptographic process in determination of a subnet's routing prefix. Several methods are disclosed, including using an IP suffix for prefix generation and for decryption, maintaining a pool of pseudo prefixes at the router, using public key encryption and symmetric key encryption.

54 citations

Journal ArticleDOI
TL;DR: A variant of Waters' identity-based encryption scheme with a much smaller system parameters size (only a few kilobytes) is presented in this article, which is shown to be semantically secure against passive adversaries in the standard model.
Abstract: A variant of Waters' identity-based encryption scheme with a much smaller system parameters size (only a few kilobytes) is presented. It is shown that this variant is semantically secure against passive adversaries in the standard model. In essence, the new variant divides Waters' system parameters size by a factor l at the cost of (negligibly) reducing security by l bits. The construction yields a fully secure practical identity-based encryption scheme.

54 citations

Book ChapterDOI
13 Nov 2005
TL;DR: In this paper, a selective encryption scheme is constructed on Advanced Video Coding that keeps secure against brute-force attack, replacement attack or known-plaintext attack, combines encryption process with compression process with low cost, and keeps the file format unchanged with some direct operations supported.
Abstract: Advanced Video Coding is recently announced and widely used, although the according protection means have not been developed thoroughly. In this paper, a selective encryption scheme is constructed on Advanced Video Coding. During AVC encoding, such sensitive data as intra-prediction mode, residue data, inter-prediction mode and motion vector are partially encrypted. This encryption scheme keeps secure against brute-force attack, replacement attack or known-plaintext attack, combines encryption process with compression process with low cost, and keeps the file format unchanged with some direct operations (such as displaying, time seeking, copying, cutting, etc.) supported. These properties make it suitable for secure video transmission.

54 citations

Journal ArticleDOI
TL;DR: This paper provides two generic transformations to construct a designated tester public-key encryption with keyword search scheme using two identity-based encryption schemes and identifies the properties of identity- based encryption that are sufficient to provide the confidentiality and consistency in designated testers public- key encryption with keywords search.

54 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194