cryptography algorithm is an important means to achieve identity authentication, and it is also a key technology to achieve identity authentication. In recent years, cryptography algorithms have been widely used in th...
详细信息
cryptography algorithm is an important means to achieve identity authentication, and it is also a key technology to achieve identity authentication. In recent years, cryptography algorithms have been widely used in the field of identity authentication, and some major breakthroughs have been made. However, in specific applications, there are still some security vulnerabilities and hidden dangers. The article first introduced various identity authentication algorithms, analyzed several typical security vulnerabilities that currently exist, and proposed corresponding security suggestions and improvement measures to address these vulnerabilities, so as to provide reference for the design and implementation of identity authentication schemes. The final results showed that the cryptography algorithm improved by digital identity authentication could improve the regularity of run distribution to an average of 86.95%.
Internet of Things (IoT) applications are popularly involved in day-to-day life. The increase in utilization leads to an increase in network traffic. The incoming users have different intentions in the network and hen...
详细信息
Internet of Things (IoT) applications are popularly involved in day-to-day life. The increase in utilization leads to an increase in network traffic. The incoming users have different intentions in the network and hence security is essential. The data user accesses the data in the cloud that is collected from IoT devices. A large-scale IoT environment has challenges in the provisioning of security as well as the management of access control mechanisms. The problem is a generation of policies and authenticating devices with minimum credentials. In this paper, Blockchain-based decentralized authentication and access control systems are designed. The process of authentication is conducted for the data owner and data user by considering identity, device type, IP address and signature, PUF, and biometric respectively. PUF stands for Physical Unclonable Function, which is a hardware-based security feature that generates a unique identifier for a device based on its physical properties, SALSA20 and PRESENT are encryption algorithms used in the proposed system to encrypt data chunks. SALSA20 is a stream cipher that generates a keystream to encrypt data, while PRESENT is a block cipher that encrypts data in fixed-size blocks These authentication credentials are managed in the blockchain. The credentials are stored in encrypted form using the Key schedule PRESENT algorithm. In the authentication of data users, the number of credentials is selected using fuzzy logic that improves security. To assure data storage security, the data is split into two chunks, and it is encrypted using SALSA20 and PRESENT algorithm. The proposed model is developed in an ifogsim simulator, and the performance metrics are evaluated in terms of authentication time, storage efficiency, running time, throughput, latency, and blocksize.
With the growing technological trends in VLSI domain, quantum dot cellular automata (QCA) technology is slowly replacing CMOS technology due to its smaller feature size, high operating frequency and reduced power cons...
详细信息
With the growing technological trends in VLSI domain, quantum dot cellular automata (QCA) technology is slowly replacing CMOS technology due to its smaller feature size, high operating frequency and reduced power consumption. In the initial research phase, QCA has been used to implement various combinatorial and sequential circuits models, which are the fundamental blocks in various applications. Nowadays, researchers focus on the implementation of application-based designs using QCA. This motivated to implement the Galois field (GF) functions for SBox module in the most secure cryptography encryption standard AES with QCA. In AES, SBOX is the predominant power consumption modules. Hence, a research has been carried out to implement a compact QCA-based AES-SBOX with GF. This paper describes the implementation of our proposed QCA-based AES-SBOX with Galois field and analysis of various GF functional modules in terms of area, performance, energy and QCA cells used. The functional verification is performed using the simulated waveforms.
Cryptographic algorithms are fundamental to secure software development, but security vulnerabilities can arise during implementation, usage, and when calling third-party libraries. As security standards continue to e...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Cryptographic algorithms are fundamental to secure software development, but security vulnerabilities can arise during implementation, usage, and when calling third-party libraries. As security standards continue to evolve, software updates have become an inevitable trend, and detecting cryptographic algorithm misuse is crucial to ensure compliance with these standards during the update process. However, closed-source software presents challenges in detecting cryptographic algorithm misuse. To enhance the security ecosystem of software, we designed a hybrid detection approach for detecting misuses in closed-source software related to weak cryptographic algorithms, short keys, insecure working modes, and insecure padding modes. Our hybrid detection tool uses both static and dynamic detection methods to collect log information through a logging mechanism in binary executable files. The collected data is cleaned using a data cleaning strategy and analyzed to extract key features, generating test reports to help developers and experts identify cryptographic algorithm security issues. We tested 24 software applications from app stores and found that 62.5% had weak algorithm implementations or usage, 83.3% supported short keys, and 50% supported insecure padding modes. Finally, we provided actionable recommendations to mitigate identified issues.
Internet of Things (IoT) is a new concept in Information and Communications Technology and its structure is based on smart objects communications. It contributes to controlling, managing, and administrating devices th...
详细信息
Internet of Things (IoT) is a new concept in Information and Communications Technology and its structure is based on smart objects communications. It contributes to controlling, managing, and administrating devices through the Internet. IoT is emerging as a key component of the Internet and a vital infrastructure for millions of interconnected objects. Thus, the security of IoT is highly important. Scalable applications and services are vulnerable to various attacks and information leakage, demanding greater levels of security and privacy. For instance, hacking personal information is a challenge in this regard. The present study is an investigation of symmetric, asymmetric and hybrid encryption algorithms for IoT security. Asymmetric key encryption to ensure secure communication between multiple users and thereby avoiding distributing key on an insecure channel. All algorithms are compared based on security factors. Results indicate that Elliptic Curve cryptography (ECC) has a better performance than other algorithms in the study. ECC to generate smaller, faster and reliable cryptography keys. Also, ECC decreases the memory requirements and the execution encryption/decryption time. This study helps to understand the importance of several security factors in IoT and advancements in cryptography algorithms.
Transmission pipelines are vulnerable to various accidents and acts of ***,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network consisting of dist...
详细信息
Transmission pipelines are vulnerable to various accidents and acts of ***,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances,which monitors the physical and environmental conditions using *** sensor networks have many uses,including the built-in sensor on the outside of the pipeline or installed to support bridge structures,robotics,healthcare,environmental monitoring,*** Sensor networks could be used to monitor the temperature,pressure,leak detection and sabotage of transmission *** sensor networks are vulnerable to various *** algorithms have a good role in information security for wireless sensor ***,various types of cryptographic algorithms provide security in networks,but there are still some *** this research,to improve the power of these algorithms,a new hybrid encryption algorithm for monitoring energy transmission lines and increasing the security of wireless sensor networks is *** proposed hybrid encryption algorithm provides the security and timely transmission of data in wireless sensor networks to monitor the transmission *** proposed algorithm fulfills three principles of cryptography:integrity,confidentiality and *** details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational.
Data privacy and security is a primary concern for any government/non-government organizations. This organizational data primarily exists in the form of textual documents. These documents aids an organization for exec...
详细信息
ISBN:
(纸本)9781728146850
Data privacy and security is a primary concern for any government/non-government organizations. This organizational data primarily exists in the form of textual documents. These documents aids an organization for executing their day-to-day operations. Further these documents may contain some sensitive information which needs additional security. For the purpose of storing the documents, local file systems pose a restriction in terms of storage capacity moreover they are vulnerable to physical damage. Large organizations need hefty amount of data to be stored hence cloud storage is preferred. The proposed methodology incorporates the use of finding the the context of the given document using a Recurrent Neural Network algorithm. Depending on the context a severity score is obtained which acts as a deciding factor for the selection of an appropriate encryption algorithm. A suite of high level encryption algorithm such as AES is used depending on the sensitivity of the document.
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Sta...
详细信息
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
Public key infrastructure (PKI) offers essential services for managing digital certificates and encryption keys for people, programs, and systems;moreover, the PKI helps to provide security services such as confidenti...
详细信息
ISBN:
(纸本)9781467366182
Public key infrastructure (PKI) offers essential services for managing digital certificates and encryption keys for people, programs, and systems;moreover, the PKI helps to provide security services such as confidentiality, integrity, non-repudiation, and authentication. The certificate Authority (CA) is significant component in PKI;hence, this paper proposes to implement CA by NTRU public key cryptosystem algorithm, in term of key generation, signing X.509 certificates and verification of signature. Implementation has been developed using java language. Furthermore, the results have been compared with RSA in the same environment. As result of this work, NTRU can generate CA more efficiently comparing with RSA.
Phishing is one of the most common attacks on the networks today and a primary enabler for fraud and identity theft, and the increasing sophistication of the phishers makes it very difficult for users to distinguish b...
详细信息
ISBN:
(纸本)9781479964802
Phishing is one of the most common attacks on the networks today and a primary enabler for fraud and identity theft, and the increasing sophistication of the phishers makes it very difficult for users to distinguish between genuine and fake. Thus, it is important to mutually authenticate each other. The mutual authentication between two entities is essential to establish a secure link over public/closed insecure networks. This paper gives an overview of proposed secure authentication system which includes the authentication server, one-time password generator, and database server. The system achieves mutual authentication by exchanging two one-time password ( OTP) where OTP is a security mechanism, will be expired after single use/some period of time and provides several advantages with respect to most of the available solutions at the state of the art. First, it enables transparent mutual authentication between two entities. Moreover, it guarantees authenticity of both entities within the same session. Finally, the proposed system ensures secure data transmission and protected access between two entities as well as to prevent from known attacks.
暂无评论