Aunando e Investigando Métodos De Encriptación DES y 3DES
Main Article Content
Abstract
Downloads
Article Details
DECLARATION OF ORGINIALITY OF SUBMITTED ARTICLE
With this document, I/We certify that the article submitted for possible publication in the institutional journal INGENIO MAGNO of the Research Center Alberto Magno CIIAM of the University Santo Tomás, Tunja campus, is entirely of my(our) own writing, and is a product of my(our) direct intellectual contribution to knowledge.
All data and references to completed publications are duly identified with their respective bibliographical entries and in the citations thus highlighted. If any adjustment or correction is needed, I(we) will contact the journal authorities in advance.
Due to that stated above, I(we) declare that the entirety of the submitted material is in accordance with applicable laws regarding intellectual and industrial property, and therefore, I(we) hold myself(ourselves) responsible for any complaint related to it.
If the submitted article is published, I(we) declare that I(we) fully relinquish publishing rights of the article to the University Santo Tomás, Tunja campus. As remuneration for this relinquishment of rights, I(we) declare my(our) agreement to receive two (2) copies of the edition of the journal in which my(our) article appears.
References
H.O.A., B.B.Z., A.A.Z., H.A.J., M.S., &Y.A.-N. (2016). New Comparative Study Between DES, 3DES and AES within Nine Factors. JOURNAL OF COMPUTING, 2(3), 1-6. Recuperado de https://arxiv. org/ftp/arxiv/papers/1003/1003.4085. pdf
R. Pramono Adhie, Y. Hutama, A. Ahmar and M. Setiawan, “ShieldSquare Captcha”, Iopscience.iop.org, 2020. [Online]. Available: https://iopscience. iop.org/article/10.1088/1742-6596/954/1/012009/pdf. [Accedido: 08- Nov- 2020].
Pizzuti, D., Spolon, R., Lobato, R. S., & Manecero, A. (2017, 1 enero). Vista do Desempenho dos Algoritmos 3DES e AES Usando Cuda. Recuperado 1 de febrero de 2021, de https://sol.sbc.org.br/index.php/eradsp/artic le/ view/4351/4277
PAl-Azzeh, J. (2019, 10 enero). A Novel Based On Image Blocking Method To Encrypt-Decrypt Color | Al-Azzeh| JOIV : International Journal on Informatics Visualization. Recuperado 17 de enero de 2021, de http://joiv. org/index.php/joiv/article/view/2 10
H. Tang, Q. T. Sun, X. Yang and K. Long, “A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense,” in IEEE Access, vol. 6, pp. 26059-26068, 2018, doi: 10.1109/ACCESS.2018.2832854.
Ferreira A.C., Silva N.B.F. Comparison of secure communication with 3DES between embedded system and general purpose computer Proceedings - IEEE Symposium on Computers and Communications, Volumes 2016-July, 2016. https://www. sciencedirect.com/science/arti cle/ abs/pii/1084804515002283
Nash Andrew, Infraestructura de Claves públicas, Ed. McGraw Hill, México 2004. De Jemas. NET Framework Ed. McGraw Hill, México 2004. https://www.redalyc.org/ pdf/5055/5055548 06007.pdf
O. Salcedo, L. F. Pedraza y C. A. Hernández, “Modelo de Semaforización Inteligente para la Ciudad de Bogotá”, Revista Ingeniería Universidad Distrital, vol. 11, no. 2, pp. 61-69, 2006. https://revistas.udistrital.edu.co/index.php/T ecnura/article/ view/7236
O. Salcedo, L. F. Pedraza y C.A. Hernández, “Modelo de Semaforización Inteligente para la Ciudad de Bogotá”. Revista Ingeniería Universidad Distrital, vol. 11, no 2, pp. 61-69, 2006. https://revistas.udistrital. edu.co/index.php/T ecnura/article/ view/7236
SANTOS, Daniel F.; AMAYA BARRERA, Isabel and SUÁREZ PARRA, César Augusto. Algoritmo de Encriptación para Imágenes a Color Basado en Sistemas Caóticos. ing. [online]. 2020, vol. 25, n. 2, pp.144-161. ISSN 0121-750X. http://dx.doi. org/10.14483/23448393.15530.
CORTÉS-MARTÍNEZ, Luis Miguel; ALVARADO-NIETO, Luz Deicy and AMAYA-BARRERA, Isabel. Composite cellular automata based encryption method applied to surveillance videos. Dyna rev.fac.nac.minas [online]. 2020, vol.87, n.213, pp.212- 221 ISSN 0012-7353. http://dx.doi. org/10.15446/dyna.v87n213.81 859.
Universidad de la Costa, Navarro Núñez, W., & Bareño Gutiérrez, R. (2013, junio). Revisión de la Seguridad en la Implementación de Servicios sobre IPv6. INGE CUC. https://repositorio.cuc. edu.co/bitstream/handle/11323/2550/Revisi%C3%B3n%20de%20la%20segu ridad%20en%20la%20implementaci%C3%B3n%20de%20servicios%20sobre %20IPv6.pdf?sequence=1&isAllowed=y
Restrepo, C., Universidad Católica de Oriente, & Castrillón Osorio, L. (2019, julio). Diseño y desarrollo de un sistema de cifrado de datos basado en curvas elípticas (No 43). Revista Universidad Católica de Oriente. http://200.9.158.34/index.php/uco/ article/vie w/156/190
Revista Espacios. (2019, septiembre). Red óptica pasiva para proveer de Internet a la ciudad de Riobamba - Ecuador. Autor.
Bart, M., and Bart, P. (2016). Triple and Quadruple Encryption: Bridging the Gaps. [Archivo PDF]. Asociación Internacional para la Investigación Criptológica. https://eprint.iacr.org/20 14/016.pdf
Sohal, M. Sharma, S. (2018). BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. Revista de la Universidad King Saud - Ciencias de la Información y la Computación. https://www- sciencedirect- com. bdigital.udistrital.edu.co/science/ article/ pii/S1319157818303999
Zong, R., Dong, X. (2016). Meet-in- the- Middle Attack on QARMA Block Cipher. ShandongUniversity. https:// eprint.iacr.org/2016/1160.pdf