2020
DOI: 10.1016/j.procs.2020.04.113
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Optimization and Secured Triple Data Encryption Standard Using Enhanced Key Scheduling Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…To prevent these attacks, the DES cipher was reconfirmed as the triple data encryption standard (3DES), using the DES cipher three times, i.e., enciphering -decryption-enciphering to encipher the 64-bit plain text into a 64-bit cipher text. This can be done using a 192-bit key composed of Key 1, Key 2, and Key 3 of 64-bit each for enciphering, deciphering, and enciphering, respectively, as depicted in Figure 3 [11]. [11].…”
Section: 23triple Data Encryption Standard (Triple-des)mentioning
confidence: 99%
“…To prevent these attacks, the DES cipher was reconfirmed as the triple data encryption standard (3DES), using the DES cipher three times, i.e., enciphering -decryption-enciphering to encipher the 64-bit plain text into a 64-bit cipher text. This can be done using a 192-bit key composed of Key 1, Key 2, and Key 3 of 64-bit each for enciphering, deciphering, and enciphering, respectively, as depicted in Figure 3 [11]. [11].…”
Section: 23triple Data Encryption Standard (Triple-des)mentioning
confidence: 99%
“…Rivest-Shamir-Adleman (RSA) is used in conjunction with Advanced Encryption Standard (AES) and Triple Data Encryption Standard (TDES) to improve the security of stored data (TDES). Vuppala et al [Vuppala, et al (2020)] presented the FORTIS algorithm for sub-key generation and investigated its strength against side-channel power attacks using the Chip Whisperer R -Lite and Artix FPGA as target boards. The number of glitches that represent leakage power has been reduced by about 53.3 percent, and the power traces of the key schedule algorithm show that all of the instructions are similar, making it difficult to determine which operation is being performed, and the probability of guessing entropy has been reduced in 86.6 percent of cases.…”
Section: Triple Data Encryption Standardmentioning
confidence: 99%
“…Generative adversarial network can effectively distinguish the distribution of high-dimensional and complex data, and it applies adversarial method to mine the generative algorithm of data distribution [11]. In generative adversarial network, there are two main structures: generative module S and discriminant module P .…”
Section: Adversarial Neural Networkmentioning
confidence: 99%