symmetrical key
Recently Published Documents


TOTAL DOCUMENTS

11
(FIVE YEARS 1)

H-INDEX

1
(FIVE YEARS 0)

Author(s):  
Lujain S. Abdulla ◽  
Musaria K. Mahmood ◽  
Abbas F. Salih ◽  
Sulaiman M. Karim

A large number of sensors and intelligent devices are interconnected via the internet to collect data as part of the internet of things (IoT) applications. Data security is one of the important challenges for these applications due to vulnerability of the internet. IoT devices limiting factors, such as delay-sensitivity, restricted memory, and low computing capability, make choosing the appropriate data encryption standard extremely important. The current research focuses on evaluating four data security, block cipher standards for the IoT smart home application. Considering the encryption/decryption speed, DES, TDES, AES, and SAFER+ standards are evaluated by implementing the algorithms with MATLAB to determine the best security solution. The simulation of the four standards shows the superiority of SAFER+ standard in term of encryption speed compared to others added to its capabilities on security, and software implementation opportunity. The use of classical symmetric key standards for real time data security in the IoT application can be validated through the selection of SAFER+.



2020 ◽  
Vol 5 (2) ◽  
pp. 177-182
Author(s):  
Muhammad Kailani Ridwan ◽  
William Frado Pattipeilohy ◽  
Sanwani Sanwani

Electronic documents are information that is permitted or stored in a way that is requested by a computer or other electronic device to be installed, assigned or processed. These documents consist of text, graphics or spreadsheets. For the current technological developments that improve progress, security is very important in companies that are difficult to avoid the follow-up of information by parties who are not responsible. One method that can be used to obtain digital documents is using Steganography and Cryptography technology by using Discrete Cosine Transform (DCT) technology and Advanced Desktop Encryption Standard (AES-192) algorithm based on Java Desktop. The purpose of this application is to prepare data or files to be hidden on the cover image of the file. Before inserting with the closing image file, the file is encrypted with a symmetrical key using the AES-192 algorithm. The benefits obtained in this application, the confidentiality of information or data on this heavy equipment company can be difficult with good and safe. With this application it is expected to help the confidentiality of information or data on heavy equipment companies. .



2020 ◽  
Vol 59 (2) ◽  
pp. 562-573
Author(s):  
Xiao-Hao Zhang ◽  
Xing-Yu Yan ◽  
Yun-Qian Wang ◽  
Li-Hua Gong


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 167975-167984
Author(s):  
Colin Sokol Kuka ◽  
Yihua Hu ◽  
Quan Xu ◽  
Mohammed Alkahtani






Author(s):  
Priya Thakur ◽  
Anurag Rana ◽  
Keyword(s):  


2016 ◽  
Vol 2016 ◽  
pp. 1-14 ◽  
Author(s):  
Hong Zhong ◽  
Song Li ◽  
Ting-Fang Cheng ◽  
Chin-Chen Chang

With the rapid development of the Internet, electronic commerce has become more and more popular. As an important element of e-commerce, many Internet companies such as Yahoo! and eBay have launched electronic auction systems. However, like most electronic commerce products, safety is an important issue that should be addressed. Many researchers have proposed secure electronic auction mechanisms, but we found that some of them do not exhibit the property of unlinkability, which leads to the leakage of users’ privacy. Considering the importance of privacy preservation, we have designed a new auction mechanism. Through symmetrical key establishment in the registration phase, all messages transmitted over the Internet would be protected and, meanwhile, achieve the property of unlinkability. The security analysis and performance analysis show that our protocol fulfills more security properties and is more efficient for implementation compared with recent works.



2012 ◽  
Vol 198-199 ◽  
pp. 1057-1061
Author(s):  
Jing Chen ◽  
Ke Chen ◽  
Xian Lian Shang

This article has given one kind of IC card system based on EAS(Enterprise Application System)platform, Including system architecture description, the main module describes the structure and function. IC card system using the standard PBOC1.0 and Symmetrical key system ,can support three types of applications:Electronic wallet,Medical Insurance,Rechargeable card.This system have the main features of security ,flexibility, and already put into application.



Sign in / Sign up

Export Citation Format

Share Document