Explore chapters and articles related to this topic
The Impact of Enterprise Architecture
Published in Kirk Hausman, Sustainable Enterprise Architecture, 2011
The requirement for using open standards may sound daunting, but it is not; for example, almost all word processing applications can store and access documents in text format, whether in ASCII, EBCDIC, or Unicode (formats used by different computer types to store character data). Plain text, while perhaps not as visually appealing as other formats, is an open standard by which these applications can share information— even between commercial (Lotus, Microsoft Office) and open-source ( OpenOffice, Star Office) word processors.
Ensemble-based cryptography for soldiers’ health monitoring using mobile ad hoc networks
Published in Automatika, 2023
B. V. V. Siva Prasad, Sridhar Mandapati, Lakshmana Kumar Ramasamy, Rajasekhar Boddu, Pranayanath Reddy, B. Suresh Kumar
In symmetric-key encryption, the same key is used for both the encryption and the decryption process. The source wants to send the packet to the destination. Therefore, the source wants to encrypt the packet using symmetric key encryption against unauthorized access. So first, it wants to create a secret key based on the key generation phase. This secret key is utilized for both encryptions with decryption. A key represents any code that provides plain text when applied to ciphertext—both the sender and the recipient share this key. If the key is revealed, the confidentiality of the data is compromised. The key is known to the sender and the receiver; hence, it does not protect the sender from the receiver forging a message and claiming the sender sends it. Longer keys are used to increase security and reduce the chances of recognizing the key by brute force. It is relatively fast because it utilizes a similar key for encryption also decryption. The proposed cryptographic ensemble approach used the RC4 algorithm for symmetric key encryption.
SEEDDUP: A Three-Tier SEcurE Data DedUPlication Architecture-Based Storage and Retrieval for Cross-Domains Over Cloud
Published in IETE Journal of Research, 2023
Initially key pairs are generated by . Nieterreiter Cryptography Algorithm provides strong security. It utilizes a syndrome as ciphertext instead of the code word and the plain text is an error pattern. Niederreiter encryption is ten times faster than other public cryptosystems. It can be also used to construct a digital signature algorithm. Encryption and decryption time complexity is minimum compared to traditional asymmetric algorithms such as RSA, ECC, and ECDSA. The computation of syndrome requires the parity check matrix as a public key instead of the generator matrix. When systematic matrices are used, then there is no effect on the size of keys. This paper presents the modern Niederreiter Cryptographic Algorithm for key generation. The procedure for key generation using Goppa polynomial is depicted in algorithm 1.
Hybrid Elliptic Curve Cryptographic Approach for Data Privacy and Authentication in Secured Map Reduce Layer (SMR) for Optimized CPU Utilization
Published in IETE Journal of Research, 2023
Arogya Presskila Xavier, Ramesh Kesavan
Another essential factor is the encryption and decryption of data privacy in secure records. Which, cryptography is used to provide data integrity by hidden printing. It consists of two steps, Encrypting and Decrypting [11]. The plain text is converted into Cipher text's by the term called encryption; vice versa, the Ciphertext is converted into a plain text called decryption. Symmetric and asymmetric approaches are typical types of cryptographic algorithms that were used. In symmetric-key cryptography, only one key is used for encryption of plain text and decryption of chipper text [12]. Some features do not require special properties, k-length strings, which are automatically chosen. The encryption process is using a public key in asymmetric key cryptography and the private key is used in the receiver position for decryption of chipper text is called Public Key cryptography [13]. We provide two keys Public Key and Private Key for this methodology. Elliptic curve cryptography (ECC) is an important protection aspect of current science. Compared to all cryptography approaches, it offers comprehensive protection [14,15].