scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
Patent
Mark G. Spiotta1, Erling Bjerga1
06 Oct 1989
TL;DR: An encryption key required to encrypt and decrypt data according to a predefined algorithm is usually retained in a volatile memory device Detection of loss or corruption of the key is frequently possible only be means of the encryption circuit itself testing the key Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption key to test an encryption key minimizes data loss and system down time due to corrupted or lost keys as discussed by the authors.
Abstract: An encryption key, required to encrypt and decrypt data according to a predefined algorithm is usually retained in a volatile memory device Detection of loss of the key or corruption of the key is frequently possible only be means of the encryption circuit itself testing the key Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption circuit to test an encryption key minimizes data loss and system down time due to corrupted or lost keys

31 citations

Posted Content
TL;DR: This paper classify various image encryption schemes and analyze them with respect to various parameters like tunability, visual degradation, compression friendliness, format compliance, encryption ratio, speed, and cryptographic security.
Abstract: Image applications have been increasing in recent years. Encryption is used to provide the security needed for image applications. In this paper, we classify various image encryption schemes and analyze them with respect to various parameters like tunability, visual degradation, compression friendliness, format compliance, encryption ratio, speed, and cryptographic security.

31 citations

Patent
20 Dec 2007
TL;DR: In this paper, a space-based satellite device obtains one or more encryption key symbols and transmits them to multiple nodes of a land-based network using quantum cryptographic mechanisms.
Abstract: A space-based satellite device obtains one or more encryption key symbols. The satellite device transmits the one or more encryption key symbols to multiple nodes of a land-based network using quantum cryptographic mechanisms.

31 citations

Book ChapterDOI
01 Mar 2004
TL;DR: A new security requirement of the encryption schemes called “key-privacy” asks that the encryption provide (in addition to privacy of the data being encrypted) Privacy of the key under which the encryption was performed.
Abstract: Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “key-privacy.” It asks that the encryption provide (in addition to privacy of the data being encrypted) privacy of the key under which the encryption was performed. Incidentally, Rivest, Shamir, and Tauman [2] recently proposed the notion of ring signature, which allows a member of an ad hoc collection of users S to prove that a message is authenticated by a member of S without revealing which member actually produced the signature.

31 citations

Patent
25 Oct 2007
TL;DR: In this paper, a portable electronic storage device (PESD) comprises a security engine integrated thereon, which is configured to provide data encryption, data decryption, and encryption/decryption key generation according to a security standard (e.g., AES).
Abstract: Portable electronic storage devices with hardware based security are described. According to one exemplary embodiment of the present invention, a portable electronic storage device (PESD) comprises a security engine integrated thereon. The security engine is configured to provide data encryption, data decryption, and encryption/decryption key (referred to as a key) generation according to a security standard (e.g., Advance Encryption Standard (AES)). AES is a symmetric encryption algorithm processing data in block of 128 bits. Under the influence of a key, a 128-bit data block is encrypted by transforming the data block in a unique way into a new data block of the same size. AES is symmetric sine the same key is used for encryption and the reverse transformation (i.e., decryption). The only secret necessary to keep for security is the key. AES may use different key-lengths (i.e., 128-bit, 192-bits and 256-bits).

31 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194