TY - GEN
T1 - Veri Şifreleme Algoritmalarinin Dalgacik Dönüşümü Kullanilarak Tasarlanmasi
AU - Küçük, Firat
AU - Küçük, Murat
AU - Şeker, Serhat
PY - 2004
Y1 - 2004
N2 - Since II. World War, IT security and cryptology systems are getting important day by day. Beside DES and Triple DES of IBM Inc., RCX series of symmetric algorithms and MD5 variant HASH algorithms of RSA Inc. have widely used in cryptology research area. However, recent technology concepts such as faster microprocessors, nano-technology and quantum computers make the change inevitable. In the present study, Wavelet Transform method, preferring signal processing and image compression areas, is used as data scrambling procedure. The results were compared by parameters such as reliability, algorithm speed.
AB - Since II. World War, IT security and cryptology systems are getting important day by day. Beside DES and Triple DES of IBM Inc., RCX series of symmetric algorithms and MD5 variant HASH algorithms of RSA Inc. have widely used in cryptology research area. However, recent technology concepts such as faster microprocessors, nano-technology and quantum computers make the change inevitable. In the present study, Wavelet Transform method, preferring signal processing and image compression areas, is used as data scrambling procedure. The results were compared by parameters such as reliability, algorithm speed.
UR - http://www.scopus.com/inward/record.url?scp=18844428888&partnerID=8YFLogxK
M3 - Konferans katkısı
AN - SCOPUS:18844428888
SN - 0780383184
SN - 9780780383180
T3 - Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, SIU 2004
SP - 485
EP - 488
BT - Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, SIU 2004
A2 - Gunsel, B.
T2 - Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, SIU 2004
Y2 - 28 April 2004 through 30 April 2004
ER -