Scrambled Prime Key Encryption
Information security has become an important issue in the modern world as the popularity of internet commerce and communication technologies have emerged, making them a prospective medium to security threats. To surmount these threats, modern data communications uses cryptography - an effective, eff...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , |
| التنسيق: | conferenceObject |
| منشور في: |
2018
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | http://hdl.handle.net/10725/10232 https://doi.org/10.1145/3281375.3281376 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php https://dl.acm.org/citation.cfm?id=3281376 |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513486217805824 |
|---|---|
| author | Haraty, Ramzi A. |
| author2 | Haidar, Imane Haidar, Ali Massoud |
| author2_role | author author |
| author_facet | Haraty, Ramzi A. Haidar, Imane Haidar, Ali Massoud |
| author_role | author |
| dc.creator.none.fl_str_mv | Haraty, Ramzi A. Haidar, Imane Haidar, Ali Massoud |
| dc.date.none.fl_str_mv | 2018 2019-03-20T13:39:32Z 2019-03-20T13:39:32Z 2019-03-20 |
| dc.identifier.none.fl_str_mv | 9781450356220 http://hdl.handle.net/10725/10232 https://doi.org/10.1145/3281375.3281376 Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, September). Scrambled prime key encryption. In Proceedings of the 10th International Conference on Management of Digital EcoSystems (pp. 94-99). ACM. http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php https://dl.acm.org/citation.cfm?id=3281376 |
| dc.language.none.fl_str_mv | en |
| dc.publisher.none.fl_str_mv | The Association for Computing Machinery |
| dc.rights.*.fl_str_mv | info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Software ecosystems -- Management -- Congresses Database management -- Congresses Computer systems -- Management -- Congresses |
| dc.title.none.fl_str_mv | Scrambled Prime Key Encryption |
| dc.type.none.fl_str_mv | Conference Paper / Proceeding info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/conferenceObject |
| description | Information security has become an important issue in the modern world as the popularity of internet commerce and communication technologies have emerged, making them a prospective medium to security threats. To surmount these threats, modern data communications uses cryptography - an effective, efficient and essential component for secure transmission of information. To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. This paper presents an innovative symmetric encryption, which we call Scrambled Prime Key Encryption or SPKE that tries to heighten the level of communication security. SPKE has two keys: the first substitutes the bits while the second scrambles them. |
| eu_rights_str_mv | openAccess |
| format | conferenceObject |
| id | LAURepo_1dd259131a796de60ebef8d671408e3f |
| identifier_str_mv | 9781450356220 Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, September). Scrambled prime key encryption. In Proceedings of the 10th International Conference on Management of Digital EcoSystems (pp. 94-99). ACM. |
| language_invalid_str_mv | en |
| network_acronym_str | LAURepo |
| network_name_str | Lebanese American University repository |
| oai_identifier_str | oai:laur.lau.edu.lb:10725/10232 |
| publishDate | 2018 |
| publisher.none.fl_str_mv | The Association for Computing Machinery |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| spelling | Scrambled Prime Key EncryptionHaraty, Ramzi A.Haidar, ImaneHaidar, Ali MassoudSoftware ecosystems -- Management -- CongressesDatabase management -- CongressesComputer systems -- Management -- CongressesInformation security has become an important issue in the modern world as the popularity of internet commerce and communication technologies have emerged, making them a prospective medium to security threats. To surmount these threats, modern data communications uses cryptography - an effective, efficient and essential component for secure transmission of information. To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. This paper presents an innovative symmetric encryption, which we call Scrambled Prime Key Encryption or SPKE that tries to heighten the level of communication security. SPKE has two keys: the first substitutes the bits while the second scrambles them.Tokyo Metropolitan UniversitySIGAPP. France ChapterN/A253 pages : illustrationsIncludes bibliographical references.The Association for Computing Machinery2019-03-20T13:39:32Z2019-03-20T13:39:32Z20182019-03-20Conference Paper / Proceedinginfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/conferenceObject9781450356220http://hdl.handle.net/10725/10232https://doi.org/10.1145/3281375.3281376Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, September). Scrambled prime key encryption. In Proceedings of the 10th International Conference on Management of Digital EcoSystems (pp. 94-99). ACM.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttps://dl.acm.org/citation.cfm?id=3281376eninfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/102322021-03-19T10:45:31Z |
| spellingShingle | Scrambled Prime Key Encryption Haraty, Ramzi A. Software ecosystems -- Management -- Congresses Database management -- Congresses Computer systems -- Management -- Congresses |
| status_str | publishedVersion |
| title | Scrambled Prime Key Encryption |
| title_full | Scrambled Prime Key Encryption |
| title_fullStr | Scrambled Prime Key Encryption |
| title_full_unstemmed | Scrambled Prime Key Encryption |
| title_short | Scrambled Prime Key Encryption |
| title_sort | Scrambled Prime Key Encryption |
| topic | Software ecosystems -- Management -- Congresses Database management -- Congresses Computer systems -- Management -- Congresses |
| url | http://hdl.handle.net/10725/10232 https://doi.org/10.1145/3281375.3281376 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php https://dl.acm.org/citation.cfm?id=3281376 |