Scrambled Prime Key Encryption

Information security has become an important issue in the modern world as the popularity of internet commerce and communication technologies have emerged, making them a prospective medium to security threats. To surmount these threats, modern data communications uses cryptography - an effective, eff...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Haraty, Ramzi A. (author)
مؤلفون آخرون: Haidar, Imane (author), Haidar, Ali Massoud (author)
التنسيق: conferenceObject
منشور في: 2018
الموضوعات:
الوصول للمادة أونلاين:http://hdl.handle.net/10725/10232
https://doi.org/10.1145/3281375.3281376
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://dl.acm.org/citation.cfm?id=3281376
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513486217805824
author Haraty, Ramzi A.
author2 Haidar, Imane
Haidar, Ali Massoud
author2_role author
author
author_facet Haraty, Ramzi A.
Haidar, Imane
Haidar, Ali Massoud
author_role author
dc.creator.none.fl_str_mv Haraty, Ramzi A.
Haidar, Imane
Haidar, Ali Massoud
dc.date.none.fl_str_mv 2018
2019-03-20T13:39:32Z
2019-03-20T13:39:32Z
2019-03-20
dc.identifier.none.fl_str_mv 9781450356220
http://hdl.handle.net/10725/10232
https://doi.org/10.1145/3281375.3281376
Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, September). Scrambled prime key encryption. In Proceedings of the 10th International Conference on Management of Digital EcoSystems (pp. 94-99). ACM.
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://dl.acm.org/citation.cfm?id=3281376
dc.language.none.fl_str_mv en
dc.publisher.none.fl_str_mv The Association for Computing Machinery
dc.rights.*.fl_str_mv info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Software ecosystems -- Management -- Congresses
Database management -- Congresses
Computer systems -- Management -- Congresses
dc.title.none.fl_str_mv Scrambled Prime Key Encryption
dc.type.none.fl_str_mv Conference Paper / Proceeding
info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/conferenceObject
description Information security has become an important issue in the modern world as the popularity of internet commerce and communication technologies have emerged, making them a prospective medium to security threats. To surmount these threats, modern data communications uses cryptography - an effective, efficient and essential component for secure transmission of information. To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. This paper presents an innovative symmetric encryption, which we call Scrambled Prime Key Encryption or SPKE that tries to heighten the level of communication security. SPKE has two keys: the first substitutes the bits while the second scrambles them.
eu_rights_str_mv openAccess
format conferenceObject
id LAURepo_1dd259131a796de60ebef8d671408e3f
identifier_str_mv 9781450356220
Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, September). Scrambled prime key encryption. In Proceedings of the 10th International Conference on Management of Digital EcoSystems (pp. 94-99). ACM.
language_invalid_str_mv en
network_acronym_str LAURepo
network_name_str Lebanese American University repository
oai_identifier_str oai:laur.lau.edu.lb:10725/10232
publishDate 2018
publisher.none.fl_str_mv The Association for Computing Machinery
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling Scrambled Prime Key EncryptionHaraty, Ramzi A.Haidar, ImaneHaidar, Ali MassoudSoftware ecosystems -- Management -- CongressesDatabase management -- CongressesComputer systems -- Management -- CongressesInformation security has become an important issue in the modern world as the popularity of internet commerce and communication technologies have emerged, making them a prospective medium to security threats. To surmount these threats, modern data communications uses cryptography - an effective, efficient and essential component for secure transmission of information. To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. This paper presents an innovative symmetric encryption, which we call Scrambled Prime Key Encryption or SPKE that tries to heighten the level of communication security. SPKE has two keys: the first substitutes the bits while the second scrambles them.Tokyo Metropolitan UniversitySIGAPP. France ChapterN/A253 pages : illustrationsIncludes bibliographical references.The Association for Computing Machinery2019-03-20T13:39:32Z2019-03-20T13:39:32Z20182019-03-20Conference Paper / Proceedinginfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/conferenceObject9781450356220http://hdl.handle.net/10725/10232https://doi.org/10.1145/3281375.3281376Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, September). Scrambled prime key encryption. In Proceedings of the 10th International Conference on Management of Digital EcoSystems (pp. 94-99). ACM.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttps://dl.acm.org/citation.cfm?id=3281376eninfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/102322021-03-19T10:45:31Z
spellingShingle Scrambled Prime Key Encryption
Haraty, Ramzi A.
Software ecosystems -- Management -- Congresses
Database management -- Congresses
Computer systems -- Management -- Congresses
status_str publishedVersion
title Scrambled Prime Key Encryption
title_full Scrambled Prime Key Encryption
title_fullStr Scrambled Prime Key Encryption
title_full_unstemmed Scrambled Prime Key Encryption
title_short Scrambled Prime Key Encryption
title_sort Scrambled Prime Key Encryption
topic Software ecosystems -- Management -- Congresses
Database management -- Congresses
Computer systems -- Management -- Congresses
url http://hdl.handle.net/10725/10232
https://doi.org/10.1145/3281375.3281376
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://dl.acm.org/citation.cfm?id=3281376