Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
2 result(s) for "sdex method"
Sort by:
Statistical analysis of enhanced SDEx encryption method based on BLAKE3 hash function
This paper presents a statistical analysis of the enhanced SDEx (Secure Data Exchange) encryption method, using a version that incorporates two session keys. This method has not previously been combined with the BLAKE3 hash function. The statistical analysis was conducted using the NIST Statistical Test Suite. Several real-world sample files were encrypted using the proposed method and then subjected to statistical analysis through selected tests from the NIST suite. These tests aimed to determine whether the resulting ciphertexts meet the criteria for pseudorandomness. Additionally, compression tests were performed using WinRAR, which confirmed that the ciphertexts are not compressible.
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA- 512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.