Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Introducing a Platform for Encryption Algorithms
Authors: Ahmad Habibizad Navin, Yasaman Hashemi, Omid Mirmotahari
Abstract:
In this paper, we introduce a novel platform encryption method, which modify its keys and random number generators step by step during encryption algorithms. According to complexity of the proposed algorithm, it was safer than any other method.Keywords: Decryption, Encryption, Algorithm, security.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1062546
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1434References:
[1] U. D. Block, "Data Communication and Distributed Networks", Reston Block, 1992.
[2] J .E. Ettinger, "Information Security", Chapman & Hall, 1993.
[3] Charles P. Pfleeger, "Security in Computing", Prentice Hall, 1989 William L. Schweber. "Data Communication", MC Grew-Hill 1988.
[4] D. Elizabeth, R. Denning, "Cryptography and Data Security ", Addition - Wesley 1983W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123-135.
[5] Yongdae Kim, ''PRNG, Block and Stream'' September 4, 2001.
[6] Prof. Benny Chor, "Introduction to Modern Cryptography", School of Computer Science, 1987.
[7] Mitchell Chris J., "Some Observation on the Bit _ Search Generator", Technical Report RHUL - MA- 2004-3, 20 October 2004.
[8] K. C. Zeng, C. H. Yang, D. Y. Wei , and T. R. N. Rao, " Pseudo Random Bit Generators in Stream - Cipher Cryptography " , IEEE Computer , February 1991 , PP. 8-17.
[9] Chris J. Mitchell, Alexander W. Dent, "International Standards for Stream Cipher", Information Security Group, Royal Holloway, University of London, 1998.
[10] A. Menezes, P. Van Oorschot, S. Vanstone, "Block Cipher", CRC Press, 1996, www.cacr.math.uwaterloo.ca/hac.
[11] Kim Yongdae, PRNG, "Block and Stream Cipher", September 4, 2002.
[12] Nguyen Cao Dat, ''Network Security'', [email protected].
[13] C. Chan, J. M. Eng, "Global Corporate Communications with Integrated Services Digital Networks", International Journal of Satellite Communications, Vol .9 No.5, Sep- Oct 1991, pp.267- 277.
[14] Chung-Ping Wu and C. C. Jay Kuo, "Design of integrated multimedia Compression and encryption systems," IEEE Transactions on Multimedia, vol. 7, no. 5, 2005, pp. 828-839.
[15] S. H. Jensen, P. C. Hansen, S. D. Hansen, and J. Aa. Srّensen, "Reduction of broad-band noise in speech by truncated qsvd," IEEE Transactions on Speech and Audio Processing, vol. 46, no. 6, 1995, pp. 1737-1741.
[16] P. C. Hansen and S. H. Jensen, "FIR filter representations of reduce-rank noise reduction," IEEE Transactions on Signal Processing, vol. 46, 1998, pp. 1737-1741.
[17] Zou Jian-cheng, Tie Xiao-yun. Arnold transformation of digital image with two- dimensions and its periodicity
[J]. Journal of North China University of Technology, 2000, pp. 12-15.
[18] Yang Ya-li, CAI Na, NI Guo-qiang. Digital image scrambling technology based on the symmetry of Arnold transform. Journal of Beijing Institute of Technology, 2006, Vol.15, No.2: pp. 216-220.
[19] Chen Ming, PING Xi-jian. Image steganography based on Arnold transform. Computer application research, 1, 2006, pp. 235-238.
[20] F. Autrusseau, JP. Guedon, and Y. Bizais, "Watermarking and cryptographic schemes for medical imaging," in SPIE Medical Imaging, 2003, pp. 532-105.
[21] F. Autrusseau, B. Parrein, and M. Servieres, "Lossless compression based on a discrete and exact radon transform: A preliminary study," in ICASSP, 2006, pp. 466 - 468.
[22] G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri, "Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard," IEEE Trans. on Computers, vol. 52, no. 4, April 2003, pp. 492-505.
[23] G. Bertoni, L. Breveglieri, I. Koren, and P. Maistri, "An Efficient Hardware-based Fault Diagnosis Scheme for AES: Performances and Cost," In Proc. of DFT2004, Oct. 2004, pp. 130-138.
[24] L. Breveglieri, I. Koren, and P. Maistri, "Incorporating Error Detection and Online Reconfiguration into a Regular Architecture for the Advanced Encryption Standard," In Proc. of the DFT2005, Oct. 2005, pp. 72-80.
[25] K. Wu, R. Karri, G. Kuznetsov, and M. Goessel, "Low Cost Concurrent Error Detection for the Advanced Encryption Standard," In Proc. of the 2004 International Test Conference, Oct. 2004, pp. 1242-1248.