Kombinasi Mode Cipher Block Chaining Dengan Algoritma Triangle Chain Cipher Pada Penyandian Login Website

2018 ◽  
Vol 2 (1) ◽  
pp. 1
Author(s):  
Dafirius Lombu ◽  
Siska Dame Tarihoran ◽  
Irwan Gulo

Generally, the database access of a website lies in the user login. When the login data is not accompanied by security techniques, it is very easily accessible by other parties. One effort that can be done to solve the problem is to encode the login data of website users based on cryptographic technique algorithm. Triangle Chain Cipher (TCC) is one of the classic cryptographic algorithms that encode data doubly and generate keys randomly along the plain. The process of encryption and decryption are interdependent to be one of the advantages of this algorithm. This algorithm will be more effective when combined with the Cipher Block Chaining (CBC) operation mode that is widely used in modern cryptographic algorithms today. The feedback mechanism between the blocks in this mode of operation is the operating advantage. This study describes how to combine the mode of operation of block chaining cipher with triangle chain cipher algorithm so that cipher data login website generated more random and difficult to find its original meaning.

2021 ◽  
Vol 21 (2) ◽  
pp. 101
Author(s):  
Maulidyah Lailatun Najah ◽  
Kiswara Agung Santoso

Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by irresponsible people. Cryptography is the science or art for security message. In cryptography there are two important processes, namely encryption and decryption. The sender's job is to encrypt the message and the receiver's job is to decrypt the message. The key used for this cryptographic process is the Cipher Block Chaining (CBC) operation mode. CBC mode is a very simple operation mode, so additional techniques are needed to make it more secure. The plaintext will be replaced with new plaintext resulting from a combination of Caesar Cipher and Reverse Cipher techniques. The results obtained indicate that the application of plaintext modifications to CBC can improve message security because the keys used are increasingly complex.


Author(s):  
Sabitha S ◽  
Binitha V Nair

Cryptography is an essential and effective method for securing information’s and data. Several symmetric and asymmetric key cryptographic algorithms are used for securing the data. Symmetric key cryptography uses the same key for both encryption and decryption. Asymmetric Key Cryptography also known as public key cryptography uses two different keys – a public key and a private key. The public key is used for encryption and the private key is used for decryption. In this paper, certain asymmetric key algorithms such as RSA, Rabin, Diffie-Hellman, ElGamal and Elliptical curve cryptosystem, their security aspects and the processes involved in design and implementation of these algorithms are examined.


2018 ◽  
Vol 224 ◽  
pp. 04016 ◽  
Author(s):  
Sergey Podbolotov ◽  
Anatoly Kolga ◽  
Natalja Dyorina

The article presents the results of mathematic simulation to determine the effect of geometric parameters, coaxially installed impellers, a centrifugal turbo machine on the developed pressure, depending on the mode of operation (frequency and relative direction of the impellers rotation). It is established that irrespective of the operation mode, the influence of the circumferential velocity, the ratio of the input and output diameters and the width of the impeller on the value of the pressure developed by the turbo machine is invariable. While the influence of the density of the blades system decreases with the counter rotation of the impellers.


2016 ◽  
Vol 26 (07) ◽  
pp. 1650113 ◽  
Author(s):  
Abdessalem Abidi ◽  
Qianxue Wang ◽  
Belgacem Bouallegue ◽  
Mohsen Machhout ◽  
Christophe Guyeux

The cipher block chaining (CBC) mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting that is used in various applications. In this paper, we have mathematically proven that, under some conditions, the CBC mode of operation can admit a chaotic behavior according to Devaney. Some cases will be properly studied in order to provide evidence for this idea.


Author(s):  
Abhijit Mitra ◽  
Saikat Chakrabarty ◽  
Poojarini Mitra

The idea of information security lead to the evolution of cryptography. In other words, cryptography is the science of keeping information secure. It involves encryption and decryption of messages. The core of cryptography lies in the keys involved in encryption and decryption and maintaining the secrecy of the keys. Another important factor is the key strength, i.e. the difficulty in breaking the key and retrieving the plain text. There are various cryptographic algorithms. In this project we use Elliptic Curve Cryptography (ECC) over Galois field. This system has been proven to be stronger than known algorithms like RSA, DSA, etc. Our aim is to build an efficient elliptic curve cryptosystem for secure transmission or exchange of confidential emails over a public network.


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

This study combines classic and modern cryptographic algorithms so that the data security of information more awake authenticity. Caesar cipher is the oldest classical cryptography which uses a symmetric key method is the key used for encryption is the same as the key used for the decryption process. Three-Pass Protocol is one of the modern cryptography where the process of sending a message does not need to distribute the key so that each party both the recipient and sender of the message does not need to know each lock. In this combination of receiving and sending messages using the Caesar Cipher algorithm for encryption and decryption, while for its delivery process using algorithms Three Pass protocol. The results from the combination of the two algorithms are to help the information sent is secure.


2021 ◽  
Vol 264 ◽  
pp. 04063
Author(s):  
Tulkin Gayibov ◽  
Elnur Abdullaev

At present, one of the most important issues at the level of various manufacturing enterprises is the development of ways for building and efficiently using renewable energy sources, especially solar energy. In this regard, this article proposes a mathematical model of the problem of determining the optimal daily mode of operation of a photovoltaic system in an enterprise with a private photovoltaic system connected to the electrical system. The effectiveness of the mathematical model was analyzed on the example of determining the optimal mode of operation of the photovoltaic system located on the territory of Jizzakh Polytechnic Institute. It is shown that the mathematical model can be used to determine the optimal operating modes of existing photovoltaic systems in enterprises and distribution networks, as well as to determine the optimal parameters in their design.


2011 ◽  
Vol 48-49 ◽  
pp. 886-890
Author(s):  
Qian Chen ◽  
Xiao Li Li ◽  
Jian Hua Zhang

A growing number of distributed generators have been connected to urban distribution networks in recent years, which brings great challenges to the traditional reliability evaluation of the distribution grids. Island is a new kind of operation mode of the city grid. In consideration of the importance factor of system load, establish the model of island taking the maximum equivalent workload capacity as objective function and heuristic search technology is proposed to solve the problem. According to the island mode of operation, assess the reliability of the network with islands based on equivalent resistance and minimal path, which have certain instructive significance to the improvement of reliability of the modern urban distribution nets.


Energies ◽  
2020 ◽  
Vol 13 (18) ◽  
pp. 4706
Author(s):  
Adam Adamkowski ◽  
Waldemar Janicki ◽  
Mariusz Lewandowski

This article presents the original procedures for measuring the flow rate using the pressure-time and the volumetric gauging method in the case of performance tests of a reversible hydraulic machine in either turbine or pump modes of operation. Achieving the lowest possible measurement uncertainty was one of the basic conditions during implemented machine tests. It was met using appropriate measuring procedures and high-class measuring equipment. Estimation of the uncertainty for both methods was made on the basis of an analysis consistent with current requirements in this respect. The pressure-time method was supplemented by the computational fluid dynamics (CFD) analysis that allowed reducing the impact of the pipeline complex irregular geometry on the uncertainty of flow measurement. Appropriate modifications of the calculation procedure enabled accurate measurements of flow during the pump mode of operation of the tested machine as well. The volumetric gauging method, thanks to a special procedure used for accurate measurement of the water level in the upper reservoir of the power plant, allowed measuring the discharge through the tested reversible machine with very low uncertainty. The obtained results allowed for a detailed comparison and mutual verification of the methods used to measure the discharge of the tested reversible machine in both modes of its operation. The most possible causes of obtained results are discussed and summarized in the paper. The need for further research was pointed out to explain the differences obtained and their influence on the accuracy of discharge measurement using the pressure-time method in pump operation mode.


2016 ◽  
Vol 113 (43) ◽  
pp. 12017-12022 ◽  
Author(s):  
Alexander Giovannitti ◽  
Dan-Tiberiu Sbircea ◽  
Sahika Inal ◽  
Christian B. Nielsen ◽  
Enrico Bandiello ◽  
...  

Electrolyte-gated organic transistors offer low bias operation facilitated by direct contact of the transistor channel with an electrolyte. Their operation mode is generally defined by the dimensionality of charge transport, where a field-effect transistor allows for electrostatic charge accumulation at the electrolyte/semiconductor interface, whereas an organic electrochemical transistor (OECT) facilitates penetration of ions into the bulk of the channel, considered a slow process, leading to volumetric doping and electronic transport. Conducting polymer OECTs allow for fast switching and high currents through incorporation of excess, hygroscopic ionic phases, but operate in depletion mode. Here, we show that the use of glycolated side chains on a thiophene backbone can result in accumulation mode OECTs with high currents, transconductance, and sharp subthreshold switching, while maintaining fast switching speeds. Compared with alkylated analogs of the same backbone, the triethylene glycol side chains shift the mode of operation of aqueous electrolyte-gated transistors from interfacial to bulk doping/transport and show complete and reversible electrochromism and high volumetric capacitance at low operating biases. We propose that the glycol side chains facilitate hydration and ion penetration, without compromising electronic mobility, and suggest that this synthetic approach can be used to guide the design of organic mixed conductors.


Sign in / Sign up

Export Citation Format

Share Document