scispace - formally typeset
Search or ask a question
Topic

Cipher

About: Cipher is a research topic. Over the lifetime, 9409 publications have been published within this topic receiving 110309 citations. The topic is also known as: cypher & cryptographic algorithm.


Papers
More filters
Proceedings ArticleDOI
01 Jan 2007
TL;DR: A full-featured high-throughput low-power AES cipher which is suitable for widespread network applications and utilizes a cost-efficient two-stage pipeline for the CCM mode by a single datapath.
Abstract: We propose a full-featured high-throughput low-power AES cipher which is suitable for widespread network applications. Different modes of operation are implemented, i.e., the ECB, CBC, CTR and CCM modes. Our cipher utilizes a cost-efficient two-stage pipeline for the CCM mode by a single datapath. With the design-for-test circuitry, the maximum throughput is 4.27 Gbps using a 0.13mum CMOS technology with a 333MHz clock rate. The hardware cost is 86.2K gates with the power of 40.9mW.

26 citations

Journal Article
TL;DR: The characteristics of modern cipher were incorporated to classical cipher and the modified hybrid of both the Caesar Cipher and Vigenere Cipher is now made a very strong cipher and difficult to break using a frequency method, brute force, etc.
Abstract: Many Ciphers have been developed to provide data security. This paper sets out to contribute to the general body of knowledge in the area of classical cryptography by developing a new modified hybrid way of encryption of plaintext. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the same time affects speed of operation. Hence in this paper, a modified hybrid of Caesar Cipher and Vigenere Cipher with diffusion and confusion which Classical ciphers cannot boast of is proposed. The Caesar Cipher and Vigenere Cipher have been modified and expanded so as to include alphabets, numbers and symbols and at the same time introduced a complete confusion and diffusion into the modified cipher developed. Classical ciphers can be made effective and used for providing security by adding the properties possessed by the modern ciphers. In this paper, the characteristics of modern cipher were incorporated to classical cipher. Thus the proposed Scheme is a hybrid version of classical and modern cipher properties in which the modified hybrid of both the Caesar Cipher and Vigenere Cipher is now made a very strong cipher and difficult to break using a frequency method, brute force, etc. Keywords: Encryption, Decryption, Substitution, Cipher, Random Number, Recursive, Primitive Root, Plaintext, Cipher Text, Optimization

26 citations

Journal ArticleDOI
03 Jan 2019-Sensors
TL;DR: A privacy-preserving clinical decision-support system based on a novel privacy- Preserving single decision tree algorithm for diagnosing new symptoms without exposing patients’ data to different network attacks is proposed.
Abstract: Medical service providers offer their patients high quality services in return for their trust and satisfaction. The Internet of Things (IoT) in healthcare provides different solutions to enhance the patient-physician experience. Clinical Decision-Support Systems are used to improve the quality of health services by increasing the diagnosis pace and accuracy. Based on data mining techniques and historical medical records, a classification model is built to classify patients’ symptoms. In this paper, we propose a privacy-preserving clinical decision-support system based on our novel privacy-preserving single decision tree algorithm for diagnosing new symptoms without exposing patients’ data to different network attacks. A homomorphic encryption cipher is used to protect users’ data. In addition, the algorithm uses nonces to avoid one party from decrypting other parties’ data since they all will be using the same key pair. Our simulation results have shown that our novel algorithm have outperformed the Naive Bayes algorithm by 46.46%; in addition to the effects of the key value and size on the run time. Furthermore, our model is validated by proves, which meet the privacy requirements of the hospitals’ datasets, frequency of attribute values, and diagnosed symptoms.

26 citations

Patent
21 Apr 1992
TL;DR: The game can be played by one player or several players in competition as discussed by the authors, where a puzzle solver first forms a guess-pair, a plain character and a cipher character that could be the plain character's substitute.
Abstract: A game apparatus including a puzzle and a conforming means. The puzzle includes ciphertext indicia and a number of designated spaces corresponding with the ciphertext for displaying a developing solution. The ciphertext is a message encrypted according to some substitutional and/or transpositional encipherment scheme. At each stage of solving, the ciphertext and developing solution show what has been correctly solved and what remains to be solved. The conforming means verifies the correctness of correct guesses and corrects incorrect guesses without prejudicing future guesses. Manifold types of messages, encipherment schemes, developing solutions and conforming means are disclosed, as well as a computerized method of making some puzzles and conforming means. The game can be played by one player or several players in competition. To solve a puzzle, a puzzle solver first forms a guess-pair. Typically, a guess-pair is a plain character and a cipher character that could be the plain character's substitute. The conforming means is used to verify the correctness of the guess-pair, or if it is wrong, to obtain a correction. The verified or corrected guess-pair is then used to update the developing solution. These three steps are repeated usually until the puzzle is solved or ready to be solved in one outright guess. Various scoring rules for one or more puzzle solvers are disclosed.

26 citations

Patent
30 Sep 2004
TL;DR: In this article, the authors proposed a method to achieve new additions of terminals that use a wireless LAN with a simple process, while preventing leakage of data indicating cipher keys. But the access point is not notified of the cipher systems adaptable to the terminals.
Abstract: The invention intends to achieve new additions of terminals that use a wireless LAN with a simple process, while preventing leakage of data indicating cipher keys. The access point is notified of the cipher systems adaptable to the terminals. The access point narrows the cipher systems adaptable to itself, sets the cipher keys and notifies them, and also determines the station IDs for the cipher keys each. Thereafter, when the access point modifies the cipher systems based on the security policy, the access point adopts the station IDs corresponding to the cipher systems each. Therefore, the terminals specify the cipher systems based on the station IDs, and perform wireless communications by using the cipher keys notified in advance.

26 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
90% related
Encryption
98.3K papers, 1.4M citations
89% related
Authentication
74.7K papers, 867.1K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023155
2022309
2021343
2020415
2019509
2018487