Search
Search Results
-
XECryptoGA: a metaheuristic algorithm-based block cipher to enhance the security goals
Cloud computing has become a pivotal component of all digital organizations and its adoption poses many security concerns for organizations’ data and...
-
Device-compatible ultra-high-order quantum noise stream cipher based on delta-sigma modulator and optical chaos
Data security is a key feature of future communications networks. Physical layer introduces rich physical mechanisms to increase the complexity of...
-
Qualitative and Quantitative Analysis of Modifications in Playfair Cipher
Security in digital world has become a paramount issue, even more so in the post pandemic world when the digital footprint of the world has... -
Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques
The rapidly evolving field of biometric recognition and verification technologies has seen substantial progress recently. However, the storage of...
-
Partially identified Babassu cipher and attack on it
In the present article, we consider a new class of one-pad ciphers. We define its encryption algorithm as a partial function with two arguments. The...
-
Performing Cryptanalysis on the Secure Way of Communication Using Purple Cipher Machine
Given the large amount of data that is available, it is vital to protect data. The main goal of cryptography is creating and analyzing methods to... -
An Approach Towards Modification of Playfair Cipher Using 16 \(\times \) 16 Matrix
The Play fair cipher is a popular polyalphabetic encryption. It mathematically secures information by encrypting the message with a key. The same key... -
A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher
The one-dimensional cellular automata (CA) system detailed herein uses a hybrid mechanism to attain reversibility, and this approach is adapted to...
-
Unsafe Mechanisms of Bluetooth, \(E_0\) Stream Cipher Cryptanalysis with Quantum Annealing
Due to Shor’s and Grover’s algorithms, quantum computing has become one of the fastest-evolving areas in computational science. Nowadays, one of the... -
An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme
Sensitive images are being transmitted over insecure media as network and information technology evolve at a rapid pace. As a result, people are...
-
Graph Key-Based Encryption Technique for IoT Networks: Graph-Affine Cipher
The Internet of things (IoT) is a cutting-edge paradigm that is getting a lot of attention in the realm of contemporary wireless telecommunications.... -
A Novel Hybrid Cipher Using Cipher Squares for Better Security
Cryptography uses encryption and decryption to secure information. In the field of Information Security, many algorithms have been devised to encrypt... -
Image cipher using image filtering with 3D DNA-based confusion and diffusion strategy
In this paper, an image cipher is presented based on DNA sequence operations, image filtering and memrisitve chaotic system. Firstly, plain image is...
-
Securing Digital Images using Stream Cipher and MDS Matrix
This is an improved and extended version of the paper presented in CVIP 2020 conference. Stream ciphers are extensively used over a wide range of...
-
Visual Cryptography Using Hill Cipher and Advanced Hill Cipher Techniques
Visual cryptography is a method in cryptography which deals with encryption of visual information such as pictures or text in such a way that the... -
Washington DC, 1917–1918
With the outbreak of World War One Manly was put in charge of the Code and Cipher section of the American Black Chamber (MI-8) in Washington, D.C.... -
QUIET: Quatro-Inverse Exponential Cipher Technique
Majority of the available traditional symmetric key cipher techniques rely on a single key encoding scheme to secure the data before transmitting it... -
Lightweight and secure cipher scheme for multi-homed systems
Multiple access technologies allow a network to connect to two or more communication networks efficiently, to enhance system performance. They are...
-
Latin Square and Machine Learning Techniques Combined Algorithm for Image Encryption
Multimedia data is crucial in the military, medical, forensics, social, etc., to transmit a large amount of data. Security of this sensitive...
-
A hybrid authenticated image encryption scheme using elliptic curves for enhanced security
The rapid evolution of digital technology has heightened concerns about the security of multimedia communication across vulnerable platforms. In...