Search Results

Results (11)

Search Parameters:

Keyword: Decryption
Order results
Results per page
Open AccessArticle
8 Pages, 1,553 KB Download PDF

Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 84–91, 2024; DOI: 10.25046/aj090308
Abstract:

Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 848 KB Download PDF

Node-Node Data Exchange in IoT Devices Using Twofish and DHE

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 622–628, 2021; DOI: 10.25046/aj060271
Abstract:

Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,549 KB Download PDF

Chaos-Based Image Encryption Using Arnold’s Cat Map Confusion and Henon Map Diffusion

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 316–326, 2021; DOI: 10.25046/aj060136
Abstract:

This research designed an image encryption system that focused on securing teledermatology data in the form of skin disease images. The encryption and decryption process of this system is done on the client side using chaos-based encryption with confusion and diffusion techniques. Arnold’s cat map is the chaotic map model used for confusion, while the…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
6 Pages, 451 KB Download PDF

Fast Stream Cipher based Chaos Neural Network for Data Security in CAN Bus

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 63–68, 2020; DOI: 10.25046/aj050509
Abstract:

Vehicle systems are controlled by embedded electronic devices called electronic control units (ECUs). These ECUs are connected together with network protocols. The Controller Area Network (CAN) protocol is widely implemented due to its high fault tolerance. However, the CAN is a serial broadcast bus, and it has no protection against security threats. In this paper,…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 319 KB Download PDF

Stream Cipher by Reed-Solomon Codes

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 26–32, 2018; DOI: 10.25046/aj030404
Abstract:

Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 881 KB Download PDF

EAES: Extended Advanced Encryption Standard with Extended Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 51–56, 2018; DOI: 10.25046/aj030307
Abstract:

Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 421 KB Download PDF

Short CCA-Secure Attribute-Based Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 261–273, 2018; DOI: 10.25046/aj030132
Abstract:

Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 757 KB Download PDF

An Efficient Authentication Method For Smart Card Verification In Online

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 133–138, 2017; DOI: 10.25046/aj020418
Abstract:

The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
4 Pages, 566 KB Download PDF

Combination of Caesar Cipher Modification with Transposition Cipher

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 22–25, 2017; DOI: 10.25046/aj020504
Abstract:

The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the result from transposition will be encrypted again with the second caesar modification, similarly at the decryption but…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,303 KB Download PDF

Collaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 13–21, 2017; DOI: 10.25046/aj020503
Abstract:

Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 234 KB Download PDF

Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 1–5, 2017; DOI: 10.25046/aj020501
Abstract:

Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026