A competitive study of cryptography techniques over block cipher

The complexity of cryptography does not allow many people to actually understand the motivations and therefore available for practicing security cryptography. Cryptography process seeks to distribute an estimation of basic cryptographic primitives across a number of confluences in order to reduce se...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Abiachi, Ashwak M., Ahmad, Faudziah, Ku-Mahamud, Ku Ruhana
Format: Conference or Workshop Item
Language:English
Published: 2011
Subjects:
Online Access:http://repo.uum.edu.my/4007/1/As.pdf
http://repo.uum.edu.my/4007/
http://dx.doi.org/10.1109/UKSIM.2011.85
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.repo.4007
record_format eprints
spelling my.uum.repo.40072013-01-21T01:56:53Z http://repo.uum.edu.my/4007/ A competitive study of cryptography techniques over block cipher Al-Abiachi, Ashwak M. Ahmad, Faudziah Ku-Mahamud, Ku Ruhana QA76 Computer software The complexity of cryptography does not allow many people to actually understand the motivations and therefore available for practicing security cryptography. Cryptography process seeks to distribute an estimation of basic cryptographic primitives across a number of confluences in order to reduce security assumptions on individual nodes, which establish a level of fault-tolerance opposing to the node alteration. In a progressively networked and distributed communications environment, there are more and more useful situations where the ability to distribute a computation between a number of unlike network intersections is needed. The reason back to the efficiency (separate nodes perform distinct tasks), fault-tolerance (if some nodes are unavailable then others can perform the task) and security (the trust required to perform the task is shared between nodes) that order differently. Hence, this paper aims to describe and review the different research that has done toward text encryption and description in the block cipher. Moreover, this paper suggests a cryptography model in the block cipher. 2011 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/4007/1/As.pdf Al-Abiachi, Ashwak M. and Ahmad, Faudziah and Ku-Mahamud, Ku Ruhana (2011) A competitive study of cryptography techniques over block cipher. In: 2011 UkSim 13th International Conference on Computer Modelling and Simulation (UKSim), March 30 2011-April 1 2011 , Cambridge . http://dx.doi.org/10.1109/UKSIM.2011.85 doi:10.1109/UKSIM.2011.85
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Al-Abiachi, Ashwak M.
Ahmad, Faudziah
Ku-Mahamud, Ku Ruhana
A competitive study of cryptography techniques over block cipher
description The complexity of cryptography does not allow many people to actually understand the motivations and therefore available for practicing security cryptography. Cryptography process seeks to distribute an estimation of basic cryptographic primitives across a number of confluences in order to reduce security assumptions on individual nodes, which establish a level of fault-tolerance opposing to the node alteration. In a progressively networked and distributed communications environment, there are more and more useful situations where the ability to distribute a computation between a number of unlike network intersections is needed. The reason back to the efficiency (separate nodes perform distinct tasks), fault-tolerance (if some nodes are unavailable then others can perform the task) and security (the trust required to perform the task is shared between nodes) that order differently. Hence, this paper aims to describe and review the different research that has done toward text encryption and description in the block cipher. Moreover, this paper suggests a cryptography model in the block cipher.
format Conference or Workshop Item
author Al-Abiachi, Ashwak M.
Ahmad, Faudziah
Ku-Mahamud, Ku Ruhana
author_facet Al-Abiachi, Ashwak M.
Ahmad, Faudziah
Ku-Mahamud, Ku Ruhana
author_sort Al-Abiachi, Ashwak M.
title A competitive study of cryptography techniques over block cipher
title_short A competitive study of cryptography techniques over block cipher
title_full A competitive study of cryptography techniques over block cipher
title_fullStr A competitive study of cryptography techniques over block cipher
title_full_unstemmed A competitive study of cryptography techniques over block cipher
title_sort competitive study of cryptography techniques over block cipher
publishDate 2011
url http://repo.uum.edu.my/4007/1/As.pdf
http://repo.uum.edu.my/4007/
http://dx.doi.org/10.1109/UKSIM.2011.85
_version_ 1644278649214468096
score 13.211869