Topic
40-bit encryption
About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.
Papers published on a yearly basis
Papers
More filters
••
01 Dec 2016TL;DR: This paper evaluates and compares the performance between the universally used Advanced Encryption Standard (AES) and Blowfish algorithms and finds Symmetric algorithms to be less complicated than Asymmetric and hence more widely used.
Abstract: The security of information being stored and transmitted is paramount in today's world. Many efficient encryption standards exist for securing classified data from cyber threats. Two common types of encryption algorithms are classified as Symmetric and Asymmetric. With Symmetric encryption, the same key/password is used to cipher and decipher data whereas with Asymmetric algorithms, we have different key/passwords for encryption and decryption. Symmetric algorithms tend to be less complicated than Asymmetric and hence are more widely used. In this paper, we evaluate and compare the performance between the universally used Advanced Encryption Standard (AES) and Blowfish algorithms. The execution time is measured for different types of data string values. The length of the string as well as ASCII value range is also varied.
120 citations
••
TL;DR: In this article, a switched capacitor circuit that equalizes the current to isolate the critical encryption activity from the external supplies, eliminating the side-channel information leakage, was implemented in a 0.13 mm CMOS technology with 7.2% area and 33% power overheads and a 2 × performance degradation.
Abstract: Hardware encryption engines are essential components of secure systems. They are widely used in desktop applications such as the trusted platform module as well as in mobile applications where they offer high energy efficiency compared to their software implementation counterparts. Unfortunately, ASIC encryption engines leak side-channel information through their power supplies. This information can be used by attackers to reveal their secret keys with attacks such as differential power analysis. Dual-rail logic and noise addition circuits increase the security against these attacks, but they add higher than 3x overheads in area, power, and performance to unsecured encryption engines. In this work, we present a switched capacitor circuit that equalizes the current to isolate the critical encryption activity from the external supplies, eliminating the side-channel information leakage. The secure encryption system was implemented in a 0.13 ?m CMOS technology with 7.2% area and 33% power overheads and a 2 × performance degradation. The secret encryption key was not revealed after ten million side-channel attacks.
120 citations
•
29 Dec 2000
TL;DR: In this paper, a method and apparatus for improved data management is described, which comprises generating a first key component, generating an encryption key using the first key, a token key and a personal identification number (PIN).
Abstract: A method and apparatus for improved data management are described. In one embodiment, the method comprises generating a first key component, generating an encryption key using the first key component, a token key and a personal identification number (PIN), encrypting data using the encryption key, and sending the data encrypted with the encryption key to a server along with the first key component.
120 citations
01 Jun 2002
TL;DR: This document proposes several new ciphersuites for Transport Layer Security (TLS) that would be enhanced by the addition of Advanced Encryption Standard (AES) ciphersuite.
Abstract: This document proposes several new ciphersuites. At present, the symmetric ciphers supported by Transport Layer Security (TLS) are RC2, RC4, International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES), and triple DES. The protocol would be enhanced by the addition of Advanced Encryption Standard (AES) ciphersuites.
120 citations
•
03 Jun 1996
TL;DR: An access control module as discussed by the authors allows a user with a preassigned passphrase to have access to the encryption or decryption portion of a program by comparing a generated vector or key with a partially decrypted version of a second vector and key stored on a portable storage medium, such as a floppy disk.
Abstract: An access control module permits a user with a preassigned passphrase to have access to the encryption or decryption portion of a program by comparing a generated vector or key with a partially decrypted version of a second vector or key stored on a portable storage medium, such as a floppy disk. If successful, the access control module creates a main key that is then used throughout the remainder of the program to encrypt or decrypt labels. Part of the encryption or decryption process utilizes an internal, reproducible, but not reversible, scrambling subroutine in which the bytes of an initializing vector are successively Exclusive Ored with one another; an input number, called spinup number, controls the number of times the process is repeated.
120 citations