Aiming at the application of a class of image encryptionalgorithm based on chaotic system,a chaotic image encryptionalgorithm based on Kent mapping and aes(Advanced encryption Standard) encryptionalgorithm is ***,a...
详细信息
ISBN:
(纸本)9781510871076
Aiming at the application of a class of image encryptionalgorithm based on chaotic system,a chaotic image encryptionalgorithm based on Kent mapping and aes(Advanced encryption Standard) encryptionalgorithm is ***,an initial condition is defined and a parameter related to plaintext pixel value is extracted as a *** chaotic sequence generated by Kent is used as the target key of the aesencryption ***,the plaintext and the target key are XOR-processed Finally,the target key is substituted into the algorithm to perform several aes encryption algorithms to obtain the *** experimental results show that the proposed algorithm can resist the differential attacks and analyze the statistical characteristics well,but also can effectively resist the plaintext attack and the encryption effect is better.
PRIME protocol is a narrowband power line communication protocol whose security is based on Advanced encryption Standard. However, the key expansion process of aesalgorithm is not unidirectional, and each round of ke...
详细信息
ISBN:
(纸本)9781728133980
PRIME protocol is a narrowband power line communication protocol whose security is based on Advanced encryption Standard. However, the key expansion process of aesalgorithm is not unidirectional, and each round of keys are linearly related to each other, it is less difficult for eavesdroppers to crack aes encryption algorithm, leading to threats to the security of PRIME protocol. To solve this problem, this paper proposes an improvement of PRIME protocol based on chaotic cryptography. The core of this method is to use Chebyshev chaotic mapping and Logistic chaotic mapping to generate each round of key in the key expansion process of aesalgorithm, In this way, the linear correlation between the key rounds can be reduced, making the key expansion process unidirectional, increasing the crack difficulty of aes encryption algorithm, and improving the security of PRIME protocol.
With the popularization of the network in recent years, the application of video broadcast system, video conference system, video Surveillance System and other aspects of the application have put forward higher requir...
详细信息
ISBN:
(纸本)9781509030255
With the popularization of the network in recent years, the application of video broadcast system, video conference system, video Surveillance System and other aspects of the application have put forward higher requirements on the security of video information. Especially, if it is related to the military, economic and political sensitivity of the video data, studying the encryption of video data is more important. However, the traditional centralized data encryption offers only a single form of service and its encryption speed is slow. In order to improve the speed of encryption, we take advantage of the characteristics of cloud computing to improve the encryption speed. At the same time, we use aes (Advanced encryption Standard) algorithm with high security to encrypt the video. Therefore, this paper builds a Hadoop cluster and uses the MapReduce framework to design the encryption service system. Additionally, we provide a complete encryption scheme, a selective encryption scheme, and a partial encryption scheme to encrypt the video data. As a result, not only improves the speed of video encryption, but also optimizes the video encryption strategy. Furthermore, the user can select the encryption scheme according to their requirements. The experimental results show that the video encryption service that we provide can meet the requirements of high-speed, security and so on.
作者:
He FeiGao DahengUESTC
Res Inst Elect Sci & Technol Chengdu Sichuan Peoples R China
With the development of IC technology, many electronic devices are used the encryption module which is implemented by embedded system to protect sensitive data to ensure communication security. In this paper, we focus...
详细信息
ISBN:
(纸本)9781467390262
With the development of IC technology, many electronic devices are used the encryption module which is implemented by embedded system to protect sensitive data to ensure communication security. In this paper, we focus on using differential power attack (DPA) of the two kinds of correlation analysis methods to attack Advanced encryption Standard (aes) encryptionalgorithm achieved by STC89C52 microprocessor. The two correlation analysis methods are Mean difference method and Pearson correlation coefficient method. Through test and analysis, both of these two method can crack the correct key, the difference is those two kinds of methods to analyze the data of different time.
In a traditional template attack,during the template building phase,a large amount of calculation is usually needed,or,what is worse,some impossible calculation might be occurred to get the covariance *** a deep resea...
详细信息
ISBN:
(纸本)9781509001668
In a traditional template attack,during the template building phase,a large amount of calculation is usually needed,or,what is worse,some impossible calculation might be occurred to get the covariance *** a deep researching of template attack techniques,this paper has improved the template building method and proposed a new way which greatly simplified the template structure to avoid these ***,we independently completed the development of a side channel power data acquisition platform and compiled the supporting side channel attack *** at the aes encryption algorithm implemented on a Mage16 single-chip board,we carried out a DPA attack based on template built by our method,the experimental results show that this method can effectively avoid the numerical problems that may be occurred in the traditional template attack,and compared to the ordinary DPA attacks the number of energy traces required by the attacks reduced *** is strongly proved that the DPA attack based on our template is effective and practical.
The sensitive data are patient record details, organization record which are handled only administrative member. Preservation of privacy is a major feature of data mining and individual's privacy without losing of...
详细信息
ISBN:
(纸本)9781467384377
The sensitive data are patient record details, organization record which are handled only administrative member. Preservation of privacy is a major feature of data mining and individual's privacy without losing of confidential data. The objective of privacy preserving data mining is to mine significant information from large amounts of dataset. To prevent the misuse of sensitive information such as patient record by the system administrator. The database administrator collects patient's data which are maintained in secured manner. The sensitive information has patient's name, Address, Disease, Date of Visit. The privacy preservation mechanism can be carried out through anonymization techniques. In order to preserve the sensitive data, the system administrator modifying the patient details. Privacy preserving techniques used to handle the sensitive information from unsanctioned users. The proposal system is original patient record should be transformed into Anonymized table which is identified only by administrative. To keep anonymized table in cluster form using k-means clustering algorithm. To keep anonymized table in cluster form using k-means clustering algorithm. To partition anonymized table into cluster, and each cluster has similar data object which is based on anonymized data attribute. After that the grouped similar data to be protected using aes encryption algorithm. The aim of this paper is to provide more accuracy and better level of privacy of sensitive attribute.
Online banking (or Internet baking or E-banking) makes people capable to do financial transactions on a secured website. It allows users to manage their money without going to their respective banks. Today, the users ...
详细信息
ISBN:
(纸本)9783662449653
Online banking (or Internet baking or E-banking) makes people capable to do financial transactions on a secured website. It allows users to manage their money without going to their respective banks. Today, the users can do the financial transactions of their daily life like bill payments, shopping, booking movie, train, air and various other event tickets through online banking. Since the online banking involves circulation of money so it should be secured but as the use of online banking is increasing, the security threats to the banking applications are also increasing. In this paper, we have designed a Java based tool to show the exploitation of Injection (OWASP Top 10-2013 A1 Vulnerability) using SQL Injection attack and Broken Authentication(part of OWASP Top 10-2013 A2 Vulnerability) using Brute Force Attack and Dictionary Attack and the prevention of all these attack by storing the data in our database in encrypted form using aesalgorithm.
Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of t...
详细信息
ISBN:
(纸本)9781612848570
Cryptographic systems are vulnerable to Differential Power Analysis (DPA) attacks. Making the time instant of executing certain operation unpredictable is an efficient way to counteract DPA attacks. The variation of the execution time instant is called temporal jitter. In principle, the more the temporal jitter appears, the less probability the attack succeeds. In this paper, we propose specific pipeline structures which have variable latency and variable number of cascaded registers inserted in between two adjacent functional blocks. Temporal-jitter can be exploited to counteract DPA attacks in such pipelines. We will analyze their effectiveness to resist attacks. The proposed approaches can be realized in both ASIC and FPGA implementations because their structures can be easily and quickly changed without using reconfiguration facility. To show the applicability, the aes encryption algorithm was implemented and the function was successfully verified.
暂无评论