Volume 4 , Issue 1 , PP: 26-35, 2020 | Cite this article as | XML | Html | PDF | Full Length Article
Ibeneme-Sabinus Ifeoma Livina 1 * , Ekedebe Nnanna 2 , Nwokonkwo Obi 3 , Ibeneme Sabinus Ikechukwu 4 , Ajah Benjamin Ogonnaya 5 , Amadi Emmanuel Chukwudi 6
Doi: https://doi.org/10.54216/JCIM.040103
Cipher key, Cryptography, Data, Encryption, Information, Tertiary Institution
[1] Liddell Henry George, Scott Robert, Jones Henry Stuart, McKenzie Roderick (1984). A Greek-English Lexicon. Oxford University Press. page 827.
[2] Agrawal, Monika (2012). A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering. 4: pages 877–882. CiteSeerX 10.1.1.433.2037
[3] Jasim, O., Abbas, S., Horbaty, E. and Salem, A. (2015) Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. Journal of Information Security, 6: pages 82-91. doi: 10.4236/jis.2015.62009.
[4] Rohan Rayarikar, Sanket Upadhyay, Priyanka Pimpale, (2012). SMS Encryption using AES Algorithm on Android, IJCA, Volume 50- No.19, pages 12-17.
[5] Kirti Prakash Choudhury, Sangeeta Kakoty (2017). Comparative Analysis of Different Modified Advanced Encryption Standard Algorithms Over Conventional Advanced Encryption Standard Algorithm. International Journal of Current Research and Review vol. 9, issue 22: pages 31-34.
[6] Isaac Kofi Nti, Eric Gymfi and Owusu Nyarko (2017), Implementation of Advanced Encryption Standard Algorithm with KeyLength of 256 Bits for Preventing Data Loss in an Organization, Department of Electrical/Electronic Engineering, Sunyani Technical University, Ghana. International Journal of Science and Engineering Application, vol. 6 issue 03: pages 87-101.
[7] Kshyamasagar Mahanta, Hima Bindu Maringanti (2015). An Enhanced Advanced Encryption Standard Algorithm. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), Vol. 4 , No.4: pages 28 - 33.
[8] Vinodh Gopal, Jim Guilford, and Wajdi Feghali (2015). Application of Classical Encryption Techniques for Securing Data-A Threaded Approach. International Journal on Cybernetics and Informatics. vol.4, No.2: pages 125-132.
[9] Umalaxmi Sawant, Kishor Wane (2016). Analysis of the Effective Advanced Encryption Standard Algorithm. International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 3: pages 965-967.
[10] Luka Daoud, Fady Hussein, and Nader Rafla (2019). Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS). EPiC Series in Computing Volume 58: pages 36-44
[11] Vignesh (2020). Incremental Research on Cyber Security Metrics in Android Applications by Implementing the ML Algorithms in Malware Classification and Detection. Journal of Cybersecurity and Information Management (JCIM) Vol. 3, No. 1, pages 14-20.
[12] Karthikeyan S, Sairamn, Manikandan G,and Sivaguru J. (2012). The Use of Parallel Processing Enhances the Speed of System when Compared to the Traditional Crypto Systems. International Journal on Cybernetics & Information (IJCI) Vol. 4, No. 2: page 127.
[13] Gadicha (2020). Implicit Authentication Approach by Generating Strong Password through Visual Key Cryptography Journal of Cybersecurity and Information Management (JCIM) Vol. 1, No. 1, pages. 5-16.