scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
Proceedings ArticleDOI
01 Dec 2016
TL;DR: This paper evaluates and compares the performance between the universally used Advanced Encryption Standard (AES) and Blowfish algorithms and finds Symmetric algorithms to be less complicated than Asymmetric and hence more widely used.
Abstract: The security of information being stored and transmitted is paramount in today's world. Many efficient encryption standards exist for securing classified data from cyber threats. Two common types of encryption algorithms are classified as Symmetric and Asymmetric. With Symmetric encryption, the same key/password is used to cipher and decipher data whereas with Asymmetric algorithms, we have different key/passwords for encryption and decryption. Symmetric algorithms tend to be less complicated than Asymmetric and hence are more widely used. In this paper, we evaluate and compare the performance between the universally used Advanced Encryption Standard (AES) and Blowfish algorithms. The execution time is measured for different types of data string values. The length of the string as well as ASCII value range is also varied.

120 citations

Journal ArticleDOI
TL;DR: In this article, a switched capacitor circuit that equalizes the current to isolate the critical encryption activity from the external supplies, eliminating the side-channel information leakage, was implemented in a 0.13 mm CMOS technology with 7.2% area and 33% power overheads and a 2 × performance degradation.
Abstract: Hardware encryption engines are essential components of secure systems. They are widely used in desktop applications such as the trusted platform module as well as in mobile applications where they offer high energy efficiency compared to their software implementation counterparts. Unfortunately, ASIC encryption engines leak side-channel information through their power supplies. This information can be used by attackers to reveal their secret keys with attacks such as differential power analysis. Dual-rail logic and noise addition circuits increase the security against these attacks, but they add higher than 3x overheads in area, power, and performance to unsecured encryption engines. In this work, we present a switched capacitor circuit that equalizes the current to isolate the critical encryption activity from the external supplies, eliminating the side-channel information leakage. The secure encryption system was implemented in a 0.13 ?m CMOS technology with 7.2% area and 33% power overheads and a 2 × performance degradation. The secret encryption key was not revealed after ten million side-channel attacks.

120 citations

Patent
29 Dec 2000
TL;DR: In this paper, a method and apparatus for improved data management is described, which comprises generating a first key component, generating an encryption key using the first key, a token key and a personal identification number (PIN).
Abstract: A method and apparatus for improved data management are described. In one embodiment, the method comprises generating a first key component, generating an encryption key using the first key component, a token key and a personal identification number (PIN), encrypting data using the encryption key, and sending the data encrypted with the encryption key to a server along with the first key component.

120 citations

01 Jun 2002
TL;DR: This document proposes several new ciphersuites for Transport Layer Security (TLS) that would be enhanced by the addition of Advanced Encryption Standard (AES) ciphersuite.
Abstract: This document proposes several new ciphersuites. At present, the symmetric ciphers supported by Transport Layer Security (TLS) are RC2, RC4, International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES), and triple DES. The protocol would be enhanced by the addition of Advanced Encryption Standard (AES) ciphersuites.

120 citations

Patent
03 Jun 1996
TL;DR: An access control module as discussed by the authors allows a user with a preassigned passphrase to have access to the encryption or decryption portion of a program by comparing a generated vector or key with a partially decrypted version of a second vector and key stored on a portable storage medium, such as a floppy disk.
Abstract: An access control module permits a user with a preassigned passphrase to have access to the encryption or decryption portion of a program by comparing a generated vector or key with a partially decrypted version of a second vector or key stored on a portable storage medium, such as a floppy disk. If successful, the access control module creates a main key that is then used throughout the remainder of the program to encrypt or decrypt labels. Part of the encryption or decryption process utilizes an internal, reproducible, but not reversible, scrambling subroutine in which the bytes of an initializing vector are successively Exclusive Ored with one another; an input number, called spinup number, controls the number of times the process is repeated.

120 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194