Method and apparatus for cryptographically processing data

M Watanabe - US Patent 8,983,061, 2015 - Google Patents
(57) ABSTRACT A method and apparatus cryptographically process data including a
plurality of data segments. The cryptographic process includes (a) receiving a plurality of …

Implementation of non-pipelined and pipelined data encryption standard (des) using xilinx virtex-6 fpga technology

S Taherkhani, E Ever… - 2010 10th IEEE …, 2010 - ieeexplore.ieee.org
Data encryption process can easily be quite complicated and usually requires significant
computation time and power despite significant simplifications. This paper discusses about …

Image Security Using Triple DES and DES Algorithms

S Sakthipriya, R Naresh - 2023 3rd Asian Conference on …, 2023 - ieeexplore.ieee.org
Data is always the source of all information and must be more secured at all cost.
Cryptography helps in preventing data from outer malicious attacks while it is transferred …

A simplified FPGA implementation based on an Improved DES algorithm

L Fu, M Pan - 2009 Third International Conference on Genetic …, 2009 - ieeexplore.ieee.org
Recently, DES has been the most widely used symmetric block cipher for information
security. But many powerful attacks, such as differential attack and linear attack had been …

[HTML][HTML] High-throughput and area-efficient FPGA implementations of data encryption standard (DES)

R Bani-Hani, S Harb, K Mhaidat, E Taqieddin - Circuits and systems, 2014 - scirp.org
One of the most popular standards for protecting confidential information is the Data
Encryption Standard (DES). Although it has been replaced by the Advanced Encryption …

Risk Assessment of the 3Des in ERTMS

F Pépin, MG Vigliotti - International Conference on Reliability, Safety and …, 2016 - Springer
Abstract The three-key Triple Data Encryption Algorithm (Triple Data Encryption Algorithm is
also known in the literature as Triple-Des, or Triple DEA or TDEA)(3Des) is a symmetric …

[PDF][PDF] A technique for data encryption and decryption

P Srinivasarao, PV Lakshmipriya, PCS Azad… - International journal of …, 2014 - Citeseer
A day-to-day use of cryptography in our life is increasing tremendously; this is because of
necessity of our multimedia documents to be protected from unauthorized person. As the …

The improved public key encryption algorithm of Kerberos protocol based on braid groups

K Jia, X Chen, G Xu - 2008 4th International Conference on …, 2008 - ieeexplore.ieee.org
Since the limitations of Kerberos authentication protocol for symmetric algorithm, there are
many improved Kerberos protocol of RSA public key encryptions. However, the existing …

Design of High Performance Pipelined Data Encryption Standard (DES) Using **linx Virtex-6 FPGA Technology

SB Sridevi, BA Himabindu - The International Journal of …, 2014 - search.proquest.com
This paper describes the design of high performance data encryption process is a
predominant symmetric-key algorithm for the encryption of electronic data. It was highly …

[PDF][PDF] Analysis and Implementation of DES Using FPGA

G Sharma, AG Kakkar - 2012 - Citeseer
Secure communication is the prime requirement of every organization. In today's world the
security has became the major aspect of life. It can be achieved by various techniques such …