scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: By combining the P-Box with chaotic S-Box based on the logistic map, the proposed P- box algorithm takes advantage of Gray code properties and allows fast encryption with high information diffusion.

41 citations

Proceedings ArticleDOI
28 Jul 2010
TL;DR: A novel encryption scheme is proposed that can mitigate the contradiction between traditional encryption method and deduplication technology well; and is suitable for the application of disk-based, data dedUplication system which has the requirement of confidentiality.
Abstract: In order to solve the problem that encryption files can not benefit from the data deduplication technology, a novel encryption scheme is proposed. According to the method, the basic encryption unit is transformed from the file to the chunks; and the chunk contents are used to generate the symmetric keys, which ensure the determinate mapping between plaintext and ciphertext of data. The data can be stored and transmitted in security as long as the adversary does not acquire a user's private key and identification password simultaneously. This scheme can mitigate the contradiction between traditional encryption method and deduplication technology well; and is suitable for the application of disk-based, data deduplication system which has the requirement of confidentiality.

41 citations

Proceedings ArticleDOI
16 Sep 2007
TL;DR: A novel H.264 selective encryption algorithm that encrypts sign bits of transform coefficients and motion vectors to allow secure transcoding without decryption to give an optimal compromise between security and transcoding performance.
Abstract: In digital broadcast TV systems, video data is normally encrypted before transmission. For in-home redistribution, it is often necessary to transcode the bitstream to achieve optimum utilization of available bandwidth. If a signal is decrypted before transcoding and re-encrypted, this may lead to a security loophole. This paper presents a solution in the form of a novel H.264 selective encryption algorithm that encrypts sign bits of transform coefficients and motion vectors to allow secure transcoding without decryption. The performance of this system is compared with I-frame encryption. The results show that sign encryption is more secure than I-frame encryption and has a lower complexity. A hybrid system using a modified transcoder and sign encryption is found to give an optimal compromise between security and transcoding performance.

41 citations

Patent
27 Jun 2005
TL;DR: In this paper, a QKD-based network is described, which includes a key management layer that generates an application registration record that includes a list of multiple applications that use the quantum encryption keys.
Abstract: Key manager systems and methods for a QKD-based network are disclosed. The system includes a QKD layer that generates quantum encryption keys, a persistent storage layer that stores the quantum encryption keys, and a key management layer. The key management layer generates an application registration record that includes a list of multiple applications that use the quantum encryption keys. The key management layer also generates a corresponding key storage layer. The multiple applications reside in an applications layer. The applications in each node remove keys from the key storage layer so that each node can encrypt/decrypt data using quantum encryption keys. The methods also include secure QKD system boot-up and authentication that facilitate implementing a commercial QKD system in real-world environments.

41 citations

Journal ArticleDOI
TL;DR: This work proposes a novel scheme of commutative reversible data hiding and encryption in which the gray values of two neighboring pixels are masked by same pseudo-random bits in a reversible manner.
Abstract: This work proposes a novel scheme of commutative reversible data hiding and encryption. In encryption part, the gray values of two neighboring pixels are masked by same pseudo-random bits. In data-hiding part, the additional data are embedded into various bit planes with a reversible manner, and a parameter optimization method based on a capacity–distortion criterion is used to ensure a good performance. Because the data space used for accommodating the additional data is not affected by the encryption operation, the data embedded in plain/encrypted domain can be extracted from encrypted/plain domain, and the way of insertion/extraction of additional data in plain domain is same as that in encrypted domain. Furthermore, the original image can be recovered without any error from an image containing additional data. Copyright © 2013 John Wiley & Sons, Ltd.

41 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194