-
1
-
2
Perancangan Enkripsi Pada Citra Bitmap Dengan Algoritma Des, Triple Des, dan Idea
Published 2010-12-01Subjects: “…image, encryption, DES, triple DES, IDEA…”
Get full text
Article -
3
Algoritma Kriptografi Triple Des dan Steganografi LSB sebagai Metode Gabungan dalam Keamanan Data
Published 2020-08-01“…The advantage of the Triple DES algorithm is because this algorithm performs the encryption process three times. …”
Get full text
Article -
4
-
5
Design and Implementation of A Software Protection System Against Software Piracy By Using Cryptographic Techniques
Published 2010-01-01Subjects: Get full text
Article -
6
A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense
Published 2018-01-01“…Now it has been gradually replaced by the triple DES or advanced encryption standard (AES) so that the encoder has a larger key space. …”
Get full text
Article -
7
-
8
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Published 2020-06-01“…Finally, we describe a sound approach to estimate actual 3-key triple-DES security levels from empirical single DES results and find that the impact on the security of 3-key triple-DES is limited, i.e. 96.1 bit mean and 0.24 % of key-triples < 80 bit for the same security controller.…”
Get full text
Article -
9
DATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM
Published 2010-06-01“…It operates at high data rate in comparison with The Data Encryption Standard (DES), Triple DES (TDES), Advanced Encryption Standard (AES-256), and RC6 algorithms. …”
Get full text
Article -
10
USAGE OF BIOINFORMATIC DATA FOR REMOTE AUTHENTICATION IN WIRELESS NETWORKS
Published 2018-08-01“…Experimental results are stated that the proposed method would turnout security virtue and robustness. Triple DES technique is used in the proposed work. This is the technique that is used to encrypt the biometric data into a scrambled format which is difficult to understand by the attackers. …”
Get full text
Article -
11
Encryption in TECB mode: modeling, simulation and synthesis
Published 2007“…This project used single core module to implement encryption in Triple DES Electronic Code Book (TECB) mode, which was modeled using hardware description language VHDL. …”
Get full text
Proceeding Paper -
12
Image encryption algorithm based on chaotic mapping
Published 2003“…Unlike other popular encryption algorithms such as Triple-DES and IDEA, SIP manipulates pixels rather than bits. …”
Get full text
Article -
13
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
Published 2023-01-01“…The observed speed of this technique, which uses a key of 256 bits and a block size of 128 bits, is comparable to three-key triple-DES.…”
Get full text
Article -
14
Single core hardware module to implement encryption in TECB mode
Published 2007“…This project used single core module to implement encryption in Triple DES Electronic Code Book (TECB) mode, which was modeled using hardware description language VHDL. …”
Get full text
Article -
15
Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography
Published 2022-01-01“…The proposed method will be compared with other standard methods of message cryptography, such as Data Encryption Standard (DES), Triple-DES (3DES), Advanced Encryption Standard (AES), and Blow Fish (BF). …”
Get full text
Article -
16
Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset
Published 2021-10-01“…Consequently, researchers utilize software or hardware disk encryption, data backup, Data Encryption Standard (DES), TripleDES, Advanced Encryption Standard (AES), Rivest Cipher 4 (RC4), and others. …”
Get full text
Article -
17
РЕАЛІЗАЦІЯ СТАНДАРТУ СИМЕТРИЧНОГО ШИФРУВАННЯ DES МОВОЮ ПРОГРАМУВАННЯ С ТА ПОРІВНЯННЯ ЧАСУ ЙОГО РОБОТИ З ВІДОМИМИ УТИЛІТАМИ...
Published 2021-12-01“…Тому для збільшення криптостійкості було розроблено інші версії цього алгоритму: double DES (2DES), triple DES (3DES), DESX, G-DES. У перспективі планується розробити на основі запропонованої нами реалізації алгоритму DES утиліти і для демонстрації роботи його модифікацій.…”
Get full text
Article