scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
Proceedings ArticleDOI
01 Feb 2017
TL;DR: The proposed algorithm reduces the time of encryption and decryption processes by dividing the file into blocks and enhances the strength of the algorithm by increasing the key size, which paves the way to store data in cloud by the users without any inconvenience.
Abstract: Cloud Computing is a distributed and centralized network of inter connected and inter related systems with one or more IT resources provisioned based on pay-on-demand usage. Even though Cloud consumers or users are more flexible with cloud resources, there exist various issues which bring down the usage of cloud resources. Security issue is the major one among them. Data Security and Privacy, Identity and Access Management, Disaster Recovery/Business Continuity Planning etc., are some of the crisis related to data stored on the cloud. Since the cloud users are more concerned with their data, its security is a major issue which has to be dealt seriously. Securing the users' data can be achieved by the conventional method of Cryptography. Encryption is done by using any one of the popular symmetric or asymmetric key algorithms such as AES, DES, RSA, Blowfish and Triple DES etc., RSA algorithm which is a asymmetric key algorithm using two different keys for encryption and decryption processes. The Key size can be varied to make the encryption process strong. Hence it is difficult for the attackers to intrude dthe data. Increasing key size correspondingly increases the time taken for encryption and decryption process. The proposed algorithm reduces the time of encryption and decryption processes by dividing the file into blocks and enhances the strength of the algorithm by increasing the key size. This strength paves the way to store data in cloud by the users without any inconvenience.

32 citations

Journal ArticleDOI
TL;DR: A chaotic medical image encryption algorithm based on bit-plane decomposition that combines the image encryption and chaotic system to improve the security and can increase the security of key space and image effectively.
Abstract: Due to the rapid rise of telemedicine, a lot of patients’ information will be transmitted through the Internet. However, the patients’ information is related to personal privacy, therefore, patients’ information needs to be encrypted when transmited and stored. Medical image encryption is a part of it. Due to the informative fine features of medical images, a common image encryption algorithm is no longer applied. Common encryption algorithm has a single theory based on chaos image encryption algorithm, other encryption algorithms are based on information entropy. However, the images processed with these cipher text encryption algorithm are cyclical, the outline is clear and the anti-tamper capability is not strong. In view of the bit being the smallest measure unit of pixel, in order to overcome the weakness from above algorithm, and take the advantage of the chaotic system, this paper will present a chaotic medical image encryption algorithm based on bit-plane decomposition. The paper combines the image encryption and chaotic system to improve the security. This way, it can increase the security of key space and image effectively. The histogram, pixel correlation, number of pixels change rate (NPCR) and other experimental results show that the algorithm satisfies the desired effect.

32 citations

Journal ArticleDOI
TL;DR: To protect the privacy of sensitive images, a format-compliant degradation and encryption method for Portable Network Graphics PNG is proposed and improved prefix method and noise generation methods are developed.
Abstract: In cloud storage environment, users frequently store images and retrieve them by personal device, including mobile phones. However, the content of outsourced images will be leaked to the cloud server, which is not trusted by users. To protect the privacy of sensitive images, this paper proposes format-compliant degradation and encryption method for Portable Network Graphics PNG. More specifically, for PNG degradation, improved prefix method and noise generation methods are developed. Furthermore, for PNG encryption, a modified generalised-Feistel method is developed. Finally, our security analysis demonstrates that the proposed scheme is secure. Our experiment results also show that the scheme is efficient and practical.

32 citations

Journal ArticleDOI
TL;DR: Results of statistical and differential analysis show that the proposed algorithm has high security for secure digital images, has key sensitivity together with a large key space and is very fast compared to other competitive algorithms.

32 citations

Book ChapterDOI
26 Sep 2012
TL;DR: This work proposes searchable symmetric encryption which can check characters in the specified position as the authors perform search on plaintexts, and realizes a variety of searches such as fuzzy keyword search, wildcard search, and so on.
Abstract: There are encryption schemes called searchable encryption which enable keyword searches. Traditional symmetric ones support only full keyword matches. Therefore, both a data owner and data searcher have to enumerate all possible keywords to realize a variety of searches. It causes increases of data size and run time. We propose searchable symmetric encryption which can check characters in the specified position as we perform search on plaintexts. Our scheme realizes a variety of searches such as fuzzy keyword search, wildcard search, and so on.

32 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194