Modern applications, especially real time applications, are hungry for high-speed end-to-end transmission which usually conflicts with the necessary requirements of confidential and secure transmission. In this work, a relatively fast, lightweight and attack-resistant crypto algorithm is proposed. The algorithm is a symmetric block cipher that uses a secure pre-shared secret as the first step. Then, a dynamic length key is generated and inserted inside the cipher text. Upon receiving the cipher text, the receiver extracts the key from the received cipher text to decrypt the message. In this algorithm, ciphering and deciphering are mainly based on simple XoR operations followed by substitutions and transpositions in order to add more confusi...
Lightweight block cipher algorithms are vital for constrained environment. There are many applicatio...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
Today security is the important thing that we need to transpose data from a location to another safe...
Cryptography technology is a security technique used to change plain text to another shape of data o...
Abstract:Information security is the process of protecting information. It protects its availability...
International audienceSecurity attacks are constantly on the rise leading to drastic consequences. S...
International audienceCryptography is the central component of a large number of security solutions....
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a ...
Today Service Providers are achieving ever-increasing transmission over networks due to Cloud and We...
Abstract: In this paper, we propose an improved block cipher symmetric encryption algorithm that has...
An approach to the development of «lightweight» cipher algorithms is considered. The confidential ci...
This paper presents a new cryptographic technique for secured transmission of text and image data ov...
The desire to transmit messages securely is not new. For centuries, community kept communication in ...
The new attack methods show some lacuna in the encryption algorithms and key schedule. As the streng...
International audienceSecurity attacks against Internet of Things (IoT) are on the rise and they lea...
Lightweight block cipher algorithms are vital for constrained environment. There are many applicatio...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
Today security is the important thing that we need to transpose data from a location to another safe...
Cryptography technology is a security technique used to change plain text to another shape of data o...
Abstract:Information security is the process of protecting information. It protects its availability...
International audienceSecurity attacks are constantly on the rise leading to drastic consequences. S...
International audienceCryptography is the central component of a large number of security solutions....
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a ...
Today Service Providers are achieving ever-increasing transmission over networks due to Cloud and We...
Abstract: In this paper, we propose an improved block cipher symmetric encryption algorithm that has...
An approach to the development of «lightweight» cipher algorithms is considered. The confidential ci...
This paper presents a new cryptographic technique for secured transmission of text and image data ov...
The desire to transmit messages securely is not new. For centuries, community kept communication in ...
The new attack methods show some lacuna in the encryption algorithms and key schedule. As the streng...
International audienceSecurity attacks against Internet of Things (IoT) are on the rise and they lea...
Lightweight block cipher algorithms are vital for constrained environment. There are many applicatio...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
Today security is the important thing that we need to transpose data from a location to another safe...