A novel symmetric hybrid cryptography technique using linear block cipher (lbc) and simple symmetric key

Author: Prakash Kuppuswamy and Saeed Q Al-Khalidi Al-Maliki

*Wait a few seconds for the document to load, the time may vary depending on your internet connection. If you prefer, you can download the file by clicking on the link below.

Information

Description: A novel symmetric hybrid cryptography technique using linear block cipher (lbc) and simple symmetric key by Prakash Kuppuswamy and Saeed Q Al-Khalidi Al-Maliki presents an innovative approach to data encryption by combining enhanced hill cipher and modulo 37. This hybrid method offers improved security, speed, and privacy compared to existing encryption schemes, making it a valuable read for cryptography enthusiasts.

Pages: 11

Megabytes: 0.27 MB

Download

This may interest you

Obfuscation for Cryptographic Purposes

Obfuscation for Cryptographic Purposes

Extension: PDF | 27 pages

Obfuscation for Cryptographic Purposes por Dennis Hofheinz, John Malone-Lee and Martijn Stam introduces a new definition of obfuscation, arguing for its reasonability and usefulness in cryptographic applications. It shows potential positive results while considering limitations, making it a valuable resource for those studying obfuscation.

Asymmetric Cryptography and Practical Security

Asymmetric Cryptography and Practical Security

Extension: PDF | 26 pages

Asymmetric Cryptography and Practical Security by David Pointcheval explores the evolution and current state of asymmetric cryptography, focusing on provable security and practical schemes. It covers digital signatures and public-key encryption, making it a valuable resource for understanding modern cryptographic protocols.

Securely Obfuscating Re-encryption

Securely Obfuscating Re-encryption

Extension: PDF | 20 pages

Securely Obfuscating Re-encryption por Susan Hohenberger, Guy N. Rothblum, Abhi shelat and Vinod Vaikuntanathan introduces the first positive obfuscation result for a traditional cryptographic functionality: re-encryption. This work presents an efficient program obfuscator for a family of circuits implementing re-encryption.

Secure Integration of Asymmetric and Symmetric Encryption Schemes

Secure Integration of Asymmetric and Symmetric Encryption Schemes

Extension: PDF | 18 pages

Secure Integration of Asymmetric and Symmetric Encryption Schemes por Eiichiro Fujisaki and Tatsuaki Okamoto presents a method to combine weak encryption schemes into a stronger one, achieving indistinguishability against adaptive chosen-ciphertext attacks. This conversion is efficient and can be applied to encryption schemes like ElGamal, offering improved security.

Hybrid Cryptography for Cloud Security: Methodologies and Designs

Hybrid Cryptography for Cloud Security: Methodologies and Designs

Extension: PDF | 13 pages

Hybrid Cryptography for Cloud Security: Methodologies and Designs by Sherief H. Murad and Kamel Hussein Rahouma explores hybrid cryptography for cloud security, surveying models between 2013-2020. This paper presents design methodologies and implementation, highlighting limitations and applications, making it a valuable resource for understanding cloud security.