scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: An image encryption algorithm based on two-dimensional partitioned cellular automaton is presented, which is demonstrated by experiments to own the properties of randomness and sensitivity.

77 citations

Patent
18 Sep 1996
TL;DR: In this article, a system and method for generating, storing and retrieving cryptographic keys to be utilized in a processor-based system is presented, where a Touch Memory (TM) containing unique information is used as a portable memory to interface with a processor.
Abstract: A system and method for generating, storing and retrieving cryptographic keys to be utilized in a processor-based system. In one embodiment, a Touch Memory ("TM") containing unique information is used as a portable memory to interface with a processor-based system wherein a cryptographic key generation program utilizes the unique information in the generation of cryptographic key sets. The generated encryption and decryption keys are stored on at least one such portable memory. Additionally, the encryption key is stored in the processor-based system. The presence of at least one specific portable memory is necessary at the time of decryption of data encrypted utilizing an encryption key associated with a decryption key, or portion thereof, stored on the specific portable memory.

77 citations

Patent
13 Nov 2002
TL;DR: In this article, a method of upgrading an encryption process for encryption of video information from an old encryption process to a new encryption process consistent with certain embodiments involves selecting a portion of video content for selective encryption.
Abstract: A method of upgrading an encryption process for encryption of video information from an old encryption process to a new encryption process, consistent with certain embodiments involves selecting a portion of video content for selective encryption. The selected portion is duplicated to produce first and second copies of the selected portion. The first copy is encrypted using the old encryption process and the second copy is encrypted using the new encryption process to produce a dual partially encrypted segment of video information that can either be broadcast over a cable or satellite system or stored in a package medium as two program chains.

76 citations

Proceedings ArticleDOI
24 Apr 2014
TL;DR: This work develops a homomorphic encryption scheme operating directly on integer vectors that supports three operations of fundamental interest in signal processing applications: addition, linear transformation, and weighted inner products.
Abstract: Homomorphic encryption, aimed at enabling computation in the encrypted domain, is becoming important to a wide and growing range of applications, from cloud computing to distributed sensing. In recent years, a number of approaches to fully (or nearly fully) homomorphic encryption have been proposed, but to date the space and time complexity of the associated schemes has precluded their use in practice. In this work, we demonstrate that more practical homomorphic encryption schemes are possible when we require that not all encrypted computations be supported, but rather only those of interest to the target application. More specifically, we develop a homomorphic encryption scheme operating directly on integer vectors that supports three operations of fundamental interest in signal processing applications: addition, linear transformation, and weighted inner products. Moreover, when used in combination, these primitives allow us to efficiently and securely compute arbitrary polynomials. Some practically relevant examples of the computations supported by this framework are described, including feature extraction, recognition, classification, and data aggregation.

76 citations

Book ChapterDOI
09 Aug 2004
TL;DR: This paper considers the security notions for length-preserving, deterministic and symmetric encryption schemes, also termed ciphers: semantic security under lunchtime and challenge-adaptive adversaries, and provides some relations for this notion between different models of adversaries.
Abstract: Probabilistic symmetric encryption have already been widely studied, from a theoretical point of view. Nevertheless, many applications require length-preserving encryption, to be patched at a minimal cost to include privacy without modifying the format (e.g. encrypted filesystems). In this paper, we thus consider the security notions for length-preserving, deterministic and symmetric encryption schemes, also termed ciphers: semantic security under lunchtime and challenge-adaptive adversaries. We furthermore provide some relations for this notion between different models of adversaries, and the more classical security notions for ciphers: pseudo-random permutations (PRP) and super pseudo-random permutations (SPRP).

76 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194