Al-Abiachi, Ashwak M. and Ahmad, Faudziah and Ku-Mahamud, Ku Ruhana (2011) A competitive study of cryptography techniques over block cipher. In: 2011 UkSim 13th International Conference on Computer Modelling and Simulation (UKSim), March 30 2011-April 1 2011 , Cambridge .
![]() |
PDF
Restricted to Repository staff only Download (604kB) |
Abstract
The complexity of cryptography does not allow many people to actually understand the motivations and therefore available for practicing security cryptography. Cryptography process seeks to distribute an estimation of basic cryptographic primitives across a number of confluences in order to reduce security assumptions on individual nodes, which establish a level of fault-tolerance opposing to the node alteration. In a progressively networked and distributed communications environment, there are more and more useful situations where the ability to distribute a computation between a number of unlike network intersections is needed. The reason back to the efficiency (separate nodes perform distinct tasks), fault-tolerance (if some nodes are unavailable then others can perform the task) and security (the trust required to perform the task is shared between nodes) that order differently. Hence, this paper aims to describe and review the different research that has done toward text encryption and description in the block cipher. Moreover, this paper suggests a cryptography model in the block cipher.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Additional Information: | Print ISBN: 978-1-61284-705-4 |
Subjects: | Q Science > QA Mathematics > QA76 Computer software |
Divisions: | College of Arts and Sciences |
Depositing User: | Mrs. Norazmilah Yaakub |
Date Deposited: | 21 Dec 2011 04:11 |
Last Modified: | 21 Jan 2013 01:56 |
URI: | https://repo.uum.edu.my/id/eprint/4007 |
Actions (login required)
![]() |
View Item |