Network security by merging two robust tools from the mathematical firmament

A Andreas, CX Mavromoustakis… - … on Mobility, Sensing …, 2021 - ieeexplore.ieee.org
Significant advances in wireless detection, networking, and IoT technologies presuppose
network security and confidentiality demand. Therefore, we develop a novel text encryption …

Three Layer Encryption Protocol: an Approach of Super Encryption Algorithm

M Fadlan - … 3rd International Conference on Cybernetics and …, 2021 - ieeexplore.ieee.org
Data security is one of the critical things that must be considered along with the ease of the
data distribution process in Era Society 5.0. Maintaining data security is not an easy thing to …

Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment

QW Ahmed, S Garg - Journal of Grid Computing, 2022 - Springer
The ever-increasing use of cloud computing and services has raised questions of securely
accessing data. Security concernsare a significant hurdle to storing large-scale data in the …

An Encrypted QR Code Using Layered Numeral Calculation for Low Powered Devices

RD Ainul, S Wibowo, I Zaini - 4th International Conference on …, 2023 - atlantis-press.com
Providing security system for every electronic data exchange through internet as the
unsecured medium has become an essential regulation. Conventional Caesar Cipher had …

Rancang Bangun Aplikasi Penyembunyian Pesan QRCode Dengan Menggunakan Metode Caesar Cipher Berbasis Android

L Kartika - 2019 - repository.potensi-utama.ac.id
Kriptografi adalah ilmu dan seni untuk menjaga keamanan pesan ketika pesan dikirim dari
suatu tempat ke tempat yang lain. Dalam perkembangannya, kriptografi juga digunakan …

[PDF][PDF] A review of encryption methods for secure data communication

JA Sarumi - Proceedings of the 30th iSTEAMS Multidisciplinary & …, 2022 - academia.edu
We are living in the new era of information, and information is an important aspect of our
living. So, the need of security is to ensure that our information remains confidential and only …

Rancang Bangun Aplikasi Keamanan Data Teks Menggunakan Algoritma Stream Cipher

A Munandar - 2019 - repository.potensi-utama.ac.id
Banyak data penting yang disimpan kedalam sebuah file teks. Hal ini tentunya
membutuhkan keamanan terhadap datanya agar tidak dapat dibaca oleh orang yang tidak …

Optimization of the gronsfeld cipher key using okamoto-uchiyama public-key cryptosystem for data security

A Ridho, S Efendi - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
All aspects of life requires security, including in computer. Cryptography is one of the
methods continually developed in computer security. Combining ciphers is an effort to …

A New Hybrid Diffie-Hellman and Caesar Cipher Algorithm for Cryptography.

M NR, LKN Kumar Mehtha… - Journal of …, 2023 - search.ebscohost.com
Caesar cipher algorithm is one of the ancient algorithms. However, due to advances in
technology the algorithm is now much simple to breach. This is because; each letter in the …

[PDF][PDF] Frequency Attack Immunity: Flat Distribution Substitution Encryption System

LF Hasan, AAEA Ibrahim, SZBS Idrus - International Journal of …, 2021 - academia.edu
Substitution encryption techniques is still used today in modern encryption systems, and the
main problem of this type of encryption system is its security weakness, which is caused by …