Matches in SemOpenAlex for { <https://semopenalex.org/work/W4328118242> ?p ?o ?g. }
Showing items 1 to 84 of
84
with 100 items per page.
- W4328118242 endingPage "3287" @default.
- W4328118242 startingPage "3287" @default.
- W4328118242 abstract "Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to information security, they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about information security, this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient's medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document's authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s." @default.
- W4328118242 created "2023-03-22" @default.
- W4328118242 creator A5031564954 @default.
- W4328118242 creator A5032327669 @default.
- W4328118242 creator A5047077663 @default.
- W4328118242 creator A5077840045 @default.
- W4328118242 date "2023-03-20" @default.
- W4328118242 modified "2023-10-05" @default.
- W4328118242 title "A Novel Cipher-Based Data Encryption with Galois Field Theory" @default.
- W4328118242 cites W1982610373 @default.
- W4328118242 cites W2792000667 @default.
- W4328118242 cites W3195772876 @default.
- W4328118242 cites W3197239062 @default.
- W4328118242 cites W4282946563 @default.
- W4328118242 cites W4293386229 @default.
- W4328118242 cites W4295242471 @default.
- W4328118242 cites W4306318700 @default.
- W4328118242 cites W4307919123 @default.
- W4328118242 cites W4311628444 @default.
- W4328118242 cites W4312051207 @default.
- W4328118242 cites W4313529819 @default.
- W4328118242 cites W4313639193 @default.
- W4328118242 cites W4313829147 @default.
- W4328118242 cites W4317039783 @default.
- W4328118242 cites W4361794416 @default.
- W4328118242 doi "https://doi.org/10.3390/s23063287" @default.
- W4328118242 hasPubMedId "https://pubmed.ncbi.nlm.nih.gov/36991997" @default.
- W4328118242 hasPublicationYear "2023" @default.
- W4328118242 type Work @default.
- W4328118242 citedByCount "2" @default.
- W4328118242 countsByYear W43281182422023 @default.
- W4328118242 crossrefType "journal-article" @default.
- W4328118242 hasAuthorship W4328118242A5031564954 @default.
- W4328118242 hasAuthorship W4328118242A5032327669 @default.
- W4328118242 hasAuthorship W4328118242A5047077663 @default.
- W4328118242 hasAuthorship W4328118242A5077840045 @default.
- W4328118242 hasBestOaLocation W43281182421 @default.
- W4328118242 hasConcept C11413529 @default.
- W4328118242 hasConcept C118615104 @default.
- W4328118242 hasConcept C148730421 @default.
- W4328118242 hasConcept C178489894 @default.
- W4328118242 hasConcept C182548165 @default.
- W4328118242 hasConcept C33923547 @default.
- W4328118242 hasConcept C38652104 @default.
- W4328118242 hasConcept C41008148 @default.
- W4328118242 hasConcept C80444323 @default.
- W4328118242 hasConcept C93974786 @default.
- W4328118242 hasConcept C94375191 @default.
- W4328118242 hasConcept C94398972 @default.
- W4328118242 hasConceptScore W4328118242C11413529 @default.
- W4328118242 hasConceptScore W4328118242C118615104 @default.
- W4328118242 hasConceptScore W4328118242C148730421 @default.
- W4328118242 hasConceptScore W4328118242C178489894 @default.
- W4328118242 hasConceptScore W4328118242C182548165 @default.
- W4328118242 hasConceptScore W4328118242C33923547 @default.
- W4328118242 hasConceptScore W4328118242C38652104 @default.
- W4328118242 hasConceptScore W4328118242C41008148 @default.
- W4328118242 hasConceptScore W4328118242C80444323 @default.
- W4328118242 hasConceptScore W4328118242C93974786 @default.
- W4328118242 hasConceptScore W4328118242C94375191 @default.
- W4328118242 hasConceptScore W4328118242C94398972 @default.
- W4328118242 hasFunder F4320324433 @default.
- W4328118242 hasIssue "6" @default.
- W4328118242 hasLocation W43281182421 @default.
- W4328118242 hasLocation W43281182422 @default.
- W4328118242 hasLocation W43281182423 @default.
- W4328118242 hasOpenAccess W4328118242 @default.
- W4328118242 hasPrimaryLocation W43281182421 @default.
- W4328118242 hasRelatedWork W2113525950 @default.
- W4328118242 hasRelatedWork W2322282624 @default.
- W4328118242 hasRelatedWork W2742440882 @default.
- W4328118242 hasRelatedWork W2783161587 @default.
- W4328118242 hasRelatedWork W2969009469 @default.
- W4328118242 hasRelatedWork W3200873351 @default.
- W4328118242 hasRelatedWork W3202895032 @default.
- W4328118242 hasRelatedWork W4285343634 @default.
- W4328118242 hasRelatedWork W4362613145 @default.
- W4328118242 hasRelatedWork W4362709186 @default.
- W4328118242 hasVolume "23" @default.
- W4328118242 isParatext "false" @default.
- W4328118242 isRetracted "false" @default.
- W4328118242 workType "article" @default.