Veri Şifreleme Algoritmalarinin Dalgacik Dönüşümü Kullanilarak Tasarlanmasi

Translated title of the contribution: Developing a cryptology algorithm by using Wavelet Transform

Firat Küçük, Murat Küçük, Serhat Şeker

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Since II. World War, IT security and cryptology systems are getting important day by day. Beside DES and Triple DES of IBM Inc., RCX series of symmetric algorithms and MD5 variant HASH algorithms of RSA Inc. have widely used in cryptology research area. However, recent technology concepts such as faster microprocessors, nano-technology and quantum computers make the change inevitable. In the present study, Wavelet Transform method, preferring signal processing and image compression areas, is used as data scrambling procedure. The results were compared by parameters such as reliability, algorithm speed.

Translated title of the contributionDeveloping a cryptology algorithm by using Wavelet Transform
Original languageTurkish
Title of host publicationProceedings of the IEEE 12th Signal Processing and Communications Applications Conference, SIU 2004
EditorsB. Gunsel
Pages485-488
Number of pages4
Publication statusPublished - 2004
EventProceedings of the IEEE 12th Signal Processing and Communications Applications Conference, SIU 2004 - Kusadasi, Turkey
Duration: 28 Apr 200430 Apr 2004

Publication series

NameProceedings of the IEEE 12th Signal Processing and Communications Applications Conference, SIU 2004

Conference

ConferenceProceedings of the IEEE 12th Signal Processing and Communications Applications Conference, SIU 2004
Country/TerritoryTurkey
CityKusadasi
Period28/04/0430/04/04

Fingerprint

Dive into the research topics of 'Developing a cryptology algorithm by using Wavelet Transform'. Together they form a unique fingerprint.

Cite this