2015 International Conference on Science and Technology (TICST) 2015
DOI: 10.1109/ticst.2015.7369364
|View full text |Cite
|
Sign up to set email alerts
|

Jumbling-Salting: An improvised approach for password encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 3 publications
0
22
0
Order By: Relevance
“…The main idea behind securing data is encrypting it so that attackers cannot access the sensitive data for unauthorized use. Some algorithms that are used for encrypting the user details are JS (Jumbling and Salting) [2,12], DES (Data Encryption Standard) [1,6], AES (Advanced Encryption Standard), etc. These algorithms use symmetric key encryptions [1,5,6] i.e.…”
Section: Working Of Payment Gatewaymentioning
confidence: 99%
See 3 more Smart Citations
“…The main idea behind securing data is encrypting it so that attackers cannot access the sensitive data for unauthorized use. Some algorithms that are used for encrypting the user details are JS (Jumbling and Salting) [2,12], DES (Data Encryption Standard) [1,6], AES (Advanced Encryption Standard), etc. These algorithms use symmetric key encryptions [1,5,6] i.e.…”
Section: Working Of Payment Gatewaymentioning
confidence: 99%
“…An overview and comparison of these algorithms is presented in this paper. We have compared the algorithms based on the following parameters: Cipher text Size, Encryption Time, Decryption Time and Throughput [2].…”
Section: Working Of Payment Gatewaymentioning
confidence: 99%
See 2 more Smart Citations
“…The Image in Jumbling block should pass through "addition" "selection" and "reverse" sub block. [9,10] In the addition block, the number of characters which are to be added to the native block are created .Selecting characters from the given character set and adding it to the binary matrix is been done in selection block .Character set is been provided with n different character .In reverse block, by running a predefined condition the result generated is been reverse.…”
Section: Introductionmentioning
confidence: 99%