2018 11th International Conference on Developments in eSystems Engineering (DeSE) 2018
DOI: 10.1109/dese.2018.00026
|View full text |Cite
|
Sign up to set email alerts
|

Design Large Symmetric Algorithm for Securing Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…The algorithm was evaluated using medical-based multimedia big data and compared to existing standard encryption algorithms in terms of runtime and avalanche effect with promising results. Dawood et al [26] proposed a new symmetric block cipher model for securing big data. It uses a 512-bit block size and a key length of 128 bits, which can be expanded to up to 512 bits.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The algorithm was evaluated using medical-based multimedia big data and compared to existing standard encryption algorithms in terms of runtime and avalanche effect with promising results. Dawood et al [26] proposed a new symmetric block cipher model for securing big data. It uses a 512-bit block size and a key length of 128 bits, which can be expanded to up to 512 bits.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Most of the lightweight ciphers' design ignores the S-Box part or builds it with no S-Box like the (SIMON) algorithm. Some lightweight ciphers are designed with small S-Boxes of 4*4 or 4*8 similar to the design of (PRESENT) cipher [12,34].…”
Section: Memory Reservation For Look-up Table (S-box)mentioning
confidence: 99%
“…The ciphering key is built with an intractable manner of one-time pad computational notation. The security concerns about the related key attacks should be taken into account in addition to the key agility scheme [34].…”
Section: The Fixed Ciphering Sub-keys Generatormentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore; the world become in urgent need for an extended cipher algorithm with larger block and key size to satisfy the applications that require an extra processing speed. The Big Data field, Cloud computing, Cryptocurrencies applications and several of other modern applications that require a bulk of encrypted data have been emerged recently (David and Chuen, 2015;Dawood et al, 2018).…”
Section: Fig 1: Bitcoin Scenario Overviewmentioning
confidence: 99%