scholarly journals DATA ENCRYPTION ALGORITHM AES BY USING BLOCKCHAIN TECHNOLOGY: A REVIEW

2021 ◽  
Vol 42 (1) ◽  
pp. 19
Author(s):  
Taufik Hidayat ◽  
Rahutomo Mahardiko

Blockchain is used as encryption algorithm in cryptocurrency, but less researches are found to study blockchain for data encryption. Data encryption is needed to protect the data from data theft. We know about data encryption, there are RSA, LEAP, AES, and other algorithms. This research proposed a review in AES algorithm for data encryption within blockchain technology. The research process is followed by determining library, then creating relevant questions and criteria. For good opportunity in the future, this paper generated suggestions and opportunities so that better research can be established in data encryption.

2012 ◽  
Vol 220-223 ◽  
pp. 2698-2701
Author(s):  
Yang Yu ◽  
Shi Min Wang

AES is a new generation encryption standard which is designed by the American National Institute of Standards and Technology (NIST) to replace DES. This paper described the concrete steps of the AES encryption algorithm which take the 128-bit keys as an example, including SubBytes, ShiftRows, MixColumns and AddRoundKey, and a detailed study of the IC card data encryption with the application of the AES algorithm.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


2021 ◽  
Vol 13 (16) ◽  
pp. 9213
Author(s):  
Gary N. Wilson

A knowledge ecosystem is a collection of individuals and organizations who are involved in the creation, management and dissemination of knowledge, both in the form of research and lived experience and teaching. As is the case with ecosystems more generally, they thrive on variation and diversity, not only in the types of individuals and organizations involved but also in the roles that they play. For many decades, the northern knowledge ecosystem in Canada was dominated and controlled by Western scholarly approaches and researchers based in academic institutions outside the North. More recently, this research landscape has started to change, largely in response to the efforts of Indigenous peoples and northerners to realize greater self-determination and self-government. Not only have these changes led to the development of research and educational capacity in the North, but they have also changed the way that academic researchers engage in the research process. The keys to maintaining the future sustainability and health of the northern knowledge ecosystem will be encouraging diversity and balance in the research methodologies and approaches used to generate knowledge about the North and ensuring that the needs and priorities of northern and Indigenous peoples are recognized and addressed in the research process.


Sign in / Sign up

Export Citation Format

Share Document