In this paper we introduce a biologically inspired distributed computing model called networks of evolutionary processors with parallel string rewriting rules (NEPPS), which is a variation of the hybrid networks of ev...
详细信息
In this paper we introduce a biologically inspired distributed computing model called networks of evolutionary processors with parallel string rewriting rules (NEPPS), which is a variation of the hybrid networks of evolutionary processors introduced by Martin-Vide et al. Such a network contains simple processors that are located in the nodes of a virtual graph. Each processor has strings (each string having multiple copies) and string rewriting rules. The rules are applied parallely on the strings. After the strings have been rewritten, they are communicated among the processors through filters. We show that we can theoretically break the DES (data encryption standard), which is the most widely used cryptosystem, using NEPPS. We prove that, given an arbitrary plain-text, cipher-text pair, one can recover the DES key in a constant number of steps.
The strength of any block cipher depends on the key size, total number of rounds and the strength of confusion component against differential cryptanalysis. data encryption standard (DES) as a block cipher has enjoyed...
详细信息
The strength of any block cipher depends on the key size, total number of rounds and the strength of confusion component against differential cryptanalysis. data encryption standard (DES) as a block cipher has enjoyed a worldwide acceptance for more than three decades. It is a symmetric block cipher and considered to be very strong against all known attacks at that time. It uses 64-bit key size and block size, but the advancement in technology results in increasing the speed of the computers and thus makes DES not secure any more. The shorter key size is the weak area of DES. In this article, we have increased the block size as well as the key size from 64 to 128 bits. The internal structure of our proposed mechanism ultimately changed all other components of DES accordingly. By this improvement, our anticipated scheme is more secure due to its robust due to its confusion and diffusion components. The algorithm is applied on the plain text and on images. We have performed the standard benchmarks statistical analyses on our suggested encryption scheme in order to authenticate the anticipated mechanism.
encryption is becoming a vital process to ensure security over the wireless channel. However, using well-known encryption algorithms to encrypt data in wireless communication results in a catastrophic error because of...
详细信息
encryption is becoming a vital process to ensure security over the wireless channel. However, using well-known encryption algorithms to encrypt data in wireless communication results in a catastrophic error because of the avalanche effect, which is an inherited criterion to ensure security. Although this criterion is desirable, these algorithms do not take into account the error characteristics of the wireless channel. Therefore, if an error occurs in the encrypted data over the channel, the decryption process at the receiver results in half the original bits to be in error because of this criterion. Hence, the need for a new secure encryption algorithm that takes into account the error characteristics of the wireless channel becomes necessary. In this paper, we propose a modification to the data encryption standard (DES) to make it secure and immune to errors caused by the wireless channel. We observe that using the modified algorithm in wireless channels improves the bit error rate performance as well as security compared with DES. We consider an additive white Gaussian noise with fading and evaluate the performance of the proposed algorithm in terms of bit error rate. We also show that the proposed algorithm is secure as compared with DES. Copyright (c) 2014 John Wiley & Sons, Ltd.
Securing various data types such as text, image, and video is needed in real-time communications. The transmission of data over an insecure channel is a permanent challenge, especially in mass Internet applications. P...
详细信息
ISBN:
(纸本)9781728167190
Securing various data types such as text, image, and video is needed in real-time communications. The transmission of data over an insecure channel is a permanent challenge, especially in mass Internet applications. Preserving confidentiality and integrity of data toward malicious attacks, accidental devastation, change during transfer, or while in storage must he improved. data encryption standard (DES) is considered as a symmetric-key algorithm that is most widely used for various security purposes. In this work, a Key-based Enhancement of the DES (KE-DES) technique for securing text is proposed. The KE-DES is implemented by the application of IOU steps: the first is merging the Odd/Even hit transformation of every key hit in the DES algorithm. The second step is replacing the right-side expansion of the original DES by using key-Distribution (K-D) function. The K-D allocation consists of 8-bits from Permutation Choice-1 (PC-1) key outcome. The next 32-bits outcomes from the right-side of data, there is also 8-bits outcome from Permutation Choice-2 (PC-2) in each round. The key and data created randomly, in this case, provide adequate security and the KE-DES model is considered more efficient for text encryption.
Along with the society relies on more and more greatly to the computer, people also attach more and more importance to the security problem in the application. The cryptography is continuously safeguarding the safe ef...
详细信息
ISBN:
(纸本)9781424411351
Along with the society relies on more and more greatly to the computer, people also attach more and more importance to the security problem in the application. The cryptography is continuously safeguarding the safe effectively protective screen of system. Owing to the fact that to break the key using mathematics technology is very difficult, people put forward the side-channel attack method in recent years. The major content of this paper is the research of differential power analysis.
We study the vulnerability of two implementations of the data encryption standard (DES) cryptosystem under a timing attack. A timing attack is a method, recently proposed by Paul Kocher, that is designed to break cryp...
详细信息
There are a lot of information and network security threats along with the rapid development of Internet of things(Io T). This paper according to the environmental features of the IOT node limited hardware resource an...
详细信息
There are a lot of information and network security threats along with the rapid development of Internet of things(Io T). This paper according to the environmental features of the IOT node limited hardware resource and its requirements, and takes aim at the privacy information security issues for the Io T, an encryption method of lightweight dataencryption is designed based on data encryption standard(DES). In order to reduce the complexity of the algorithm but ensuring the security, this algorithm simplified the data packet and the iterative rounds;at the same time added the random selection of S boxes, and improved sub key generation scheme to achieve some degree of "different keys in each encryption". Experiments show that, the algorithm reduces the computational complexity and resource cost, improve operation efficiency. It is a suitable method of privacy data protection in the Io T.
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. Ho...
详细信息
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of big data has become an emerging issue that restricts the organization to utilize Cloud services. The existing privacy preserving approaches showed several drawbacks such as a lack of data privacy and accurate data analysis, a lack of efficiency of performance, and completely rely on third party. In order to overcome such an issue, the Triple data encryption standard (TDES) methodology is proposed to provide security for big data in the Cloud environment. The proposed TDES methodology provides a relatively simpler technique by increasing the sizes of keys in data encryption standard (DES) to protect against attacks and defend the privacy of data. The experimental results showed that the proposed TDES method is effective in providing security and privacy to big healthcare data in the Cloud environment. The proposed TDES methodology showed less encryption and decryption time compared to the existing Intelligent Framework for Healthcare data Security (IFHDS) method.
Along with the society relies on more and more greatly to the computer,people also attach more and more importance to the security problem in the *** cryptography is continuously safeguarding the safe effectively prot...
详细信息
Along with the society relies on more and more greatly to the computer,people also attach more and more importance to the security problem in the *** cryptography is continuously safeguarding the safe effectively protective screen of *** to the fact that to break the key using mathematics technology is very difficult,people put forward the side-channel attack method in recent *** major content of this paper is the research of differential power analysis.
In this paper we describe a method of teaching the data encryption standard algorithm in an undergraduate cryptology course. We present a simplified version of the data encryption standard algorithm with all parameter...
详细信息
暂无评论