2016
DOI: 10.1016/j.procs.2016.05.221
|View full text |Cite
|
Sign up to set email alerts
|

The Reverse Engineering of Reverse Encryption Algorithm and a Systematic Comparison to DES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Each side display has three transposition orientations where each orientation can be positive and negative, so there will be a 3 Γ— 2 number of transposition orientations. If all transposition orientations are arranged sequentially ((π‘Œ β†’ 𝑋), (𝑋 β†’ π‘Œ), (𝑍 β†’ π‘Œ), (π‘Œ β†’ 𝑍), (𝑍 β†’ 𝑋), (𝑋 β†’ 𝑍)), then this arrangement is considered as the key seed (1,2,3,4,5,6). Each side view has S blocks, so there will be several orientation transpositions 𝑛 = 2 Γ— 3 Γ— 𝑆.…”
Section: Transposition the Magic Cubementioning
confidence: 99%
See 2 more Smart Citations
“…Each side display has three transposition orientations where each orientation can be positive and negative, so there will be a 3 Γ— 2 number of transposition orientations. If all transposition orientations are arranged sequentially ((π‘Œ β†’ 𝑋), (𝑋 β†’ π‘Œ), (𝑍 β†’ π‘Œ), (π‘Œ β†’ 𝑍), (𝑍 β†’ 𝑋), (𝑋 β†’ 𝑍)), then this arrangement is considered as the key seed (1,2,3,4,5,6). Each side view has S blocks, so there will be several orientation transpositions 𝑛 = 2 Γ— 3 Γ— 𝑆.…”
Section: Transposition the Magic Cubementioning
confidence: 99%
“…Confidentiality (encrypted data can only be recovered by those who have a passkey); (3). Data integrity (only authorized parties can access the consistency and correctness of original data); (4). Non-repudiation (preventing part or one of the parties denying the process of sending data); (5).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Encrypting transmitted data is a common way to improve data transmission security [3]. In order to ensure the security of users' private data during transmission, on the one hand, a more secure transmission method can be chosen from the physical layer, such as wired transmission or improved wireless channels; on the other hand, the transmission content can be encrypted to protect the private information even if it is stolen by criminals [4]. Usually, these two methods are applied together, but this paper focuses on the encryption algorithm of data.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, DSSS code can be easily cracked, which leads to its limitations in the application of covert communication. Mixed spread spectrum communication usually adopts a combination of one or several spread spectrum communication modes, which has higher anti-interference and concealment performance than conventional spread spectrum communication [6], [7]. Joint Tactical Information Distribution System (JTIDS) signal is a typical application combining DS, FH and TH technology [8].…”
Section: Introductionmentioning
confidence: 99%