A hardware design model for cryptographic algorithms

Author(s):  
Joan Daemen ◽  
René Govaerts ◽  
Joos Vandewalle
2018 ◽  
Vol 2 (1) ◽  
pp. 1
Author(s):  
Dafirius Lombu ◽  
Siska Dame Tarihoran ◽  
Irwan Gulo

Generally, the database access of a website lies in the user login. When the login data is not accompanied by security techniques, it is very easily accessible by other parties. One effort that can be done to solve the problem is to encode the login data of website users based on cryptographic technique algorithm. Triangle Chain Cipher (TCC) is one of the classic cryptographic algorithms that encode data doubly and generate keys randomly along the plain. The process of encryption and decryption are interdependent to be one of the advantages of this algorithm. This algorithm will be more effective when combined with the Cipher Block Chaining (CBC) operation mode that is widely used in modern cryptographic algorithms today. The feedback mechanism between the blocks in this mode of operation is the operating advantage. This study describes how to combine the mode of operation of block chaining cipher with triangle chain cipher algorithm so that cipher data login website generated more random and difficult to find its original meaning.


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


2020 ◽  
Vol 91 (5) ◽  
pp. 70-76
Author(s):  
E.V. LEONTIEV ◽  
◽  

The paper considers the system "beam - elastic foundation", in which a beam with free edges was at first on a solid elastic foundation, but when a defect suddenly forms in the foundation under the right side of the beam, part of foundation was removed from design model. As a result of calculations performed by the method of initial parameters, the displacements and internal forces for the static problem are determined. The dynamic problem of determining the forces and displacements was solved, taking into account the three vibration loads F (t) = F sinγt applied at arbitrary points d when the conditions for supporting the right side of the beam on an elastic foundation were changed, the values of the dynamics coefficients were determined. Conditions are formulated that must be taken into account when analyzing the dynamic behavior of a structure under the influence of vibration loads in the case of a change in the conditions of bearing on an elastic foundation.


Sign in / Sign up

Export Citation Format

Share Document