scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper designs a new online secure authenticated encryption, called ELmD or Encrypt-Linear mix-Decrypt, which is completely (two-stage) parallel (even in associated data) and fully pipeline implementable and provides full privacy when associated data is not repeated.
Abstract: Authenticated encryption schemes which resist misuse of nonce at some desired level of privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full privacy) and online constructions like McOE, sponge-type authenticated encryptions (such as duplex) and COPA. Only the last one is almost parallelizable except that for associated data processing, the final block-cipher call is sequential (it needs to wait for the encryption of all the previous ones). In this paper, we design a new online secure authenticated encryption, called ELmD or Encrypt-Linear mix-Decrypt, which is completely (two-stage) parallel (even in associated data) and fully pipeline implementable . It also provides full privacy when associated data is not repeated. Like COPA, our construction is based on EME, an Encrypt-Mix-Encrypt type SPRP construction (secure against chosen plaintext and ciphertext). But unlike EME, we have used an online computable efficient linear mixing instead of a non-linear mixing. We have also provided the hardware implementation of the construction and compare the performance with similar constructions like COPA and EME2.

30 citations

01 Jan 2012
TL;DR: A method based on Genetic Algorithm (GA) is proposed which is used to produce a new encryption method by exploitation the powerful features of the Crossover and Mutation operations of (GA).
Abstract: In today's information age, information sharing and transfer has increased exponentially. Security, integrity, non-repudiation, confidentiality, and authentication services are the most important factors in information security. In now days the security of digital images attracts much attention, especially when these digital images are stored in memory or send through the communication networks. Many different image encryption methods have been proposed to keep the security of these images. Image encryption technique tries to convert an image to another image that is hard to understand. Genetic algorithms (GAs) are a class of optimization algorithms. Many problems can be solved using genetic algorithms through modelling a simplified version of genetic processes. In this paper, I proposed a method based on Genetic Algorithm (GA) which is used to produce a new encryption method by exploitation the powerful features of the Crossover and Mutation operations of (GA).

30 citations

Journal ArticleDOI
TL;DR: Although there are many symmetric key algorithms, this work proposed a content-based algorithm, which follows the Symmetric key cryptography method, an algorithm implementing binary addition operation, a circular bit shifting operation and folding method, as a deep concern has given to make the key secure.

30 citations

Journal Article
TL;DR: A chaos-based unequal encryption mechanism which can be applied in the wireless telemedicine with error decryption, and results show when a correct deciphering parameter is put in, these signals will be completely recovered.
Abstract: In this paper, we have developed a chaos-based unequal encryption mechanism which can be applied in the wireless telemedicine with error decryption. The main idea for using chaos sequence is to increase the unpredictability compared with other kinds of random sequences. An essential feature of this unequal encryption scheme is that a bit stream mapping of 1D chaotic scrambler and a permutation scheme are allocated to the medical information that requires higher level encryption. In addition, a bit stream mapping of 1D chaotic scrambler is provided to messages that can meet high speed encryption. Simulation results show when a correct deciphering parameter is put in, these signals will be completely recovered. As long as there is an input parameter error, for example, with 0.00000001% initial point error, these signals will not be recovered.

30 citations

Patent
07 Nov 2014
TL;DR: In this paper, an encryption key management system and method implements enterprise managed encryption key for an enterprise using encryption for cloud-based services, where the enterprise deploys a key agent on the enterprise data network to distribute encryption key material to the network intermediary on a periodic basis.
Abstract: An encryption key management system and method implements enterprise managed encryption key for an enterprise using encryption for cloud-based services. In some embodiments, the enterprise deploys a key agent on the enterprise data network to distribute encryption key material to the network intermediary on a periodic basis. The network intermediary receives the encryption key material from the enterprise and stores the encryption key material in temporary storage and uses the received encryption key material to derive a data encryption key to perform the encryption of the enterprise's data. In this manner, the enterprise can be provided with the added security assurance of maintaining and managing its own encryption key while using cloud-based data storage services. The encryption key management system and method can be applied to ensure that the enterprise's one or more encryption keys do not leave the enterprise's premises.

30 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194