Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security issues, many advanced cryptographic algorithms have been proposed in the...
详细信息
Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security issues, many advanced cryptographic algorithms have been proposed in the literature. The efficiency of these encryption algorithms varies according to the application area in which they are deployed. Although there are many objective evaluation metrics available in the literature to measure the performance of the cryptographic algorithms, however, to the best of our knowledge, no survey or review addresses the quality of the metrics for cryptography algorithms. In this paper, we have presented and analyzed the cryptography algorithms and performance evaluation metrics such as resource utilization measure, quality measure, and security measures to evaluate the security performance of different encryption algorithms for multimedia data. Extensive experiments have been carried out to evaluate the performance of the cryptography algorithms for multimedia data such as images and videos. We have also discussed and analyzed in detail the performance of evaluation measures used to validate the cryptography algorithms. Our findings highlight the strength of different cryptography algorithms and performance evaluation metrics. The analysis is expected to contribute to the design of a new and efficient model for multimedia applications. A detailed analysis of major attacks was also presented for each encryption scheme in tabular form.
A fast public-key cryptosystem is proposed which is based on congruent polynomial equations. This scheme is much faster than the RSA scheme. Moreover, the encryption and decyption algorithms for this scheme are very s...
详细信息
A fast public-key cryptosystem is proposed which is based on congruent polynomial equations. This scheme is much faster than the RSA scheme. Moreover, the encryption and decyption algorithms for this scheme are very simple. The task of breaking this scheme appears to be as difficult as that of factoring a large composite integer, although this has not yet been proven.
Cloud Computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. Cloud computing is most interesting and enticing technology ...
详细信息
ISBN:
(纸本)9781467366182
Cloud Computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. Cloud computing is most interesting and enticing technology which is offering the services to its users on demand over the internet. Since Cloud Computing stores the data and disseminated resources in the open environment, security has become the main obstacle which is hampering the deployment of Cloud environments. Even though the Cloud Computing is promising and efficient, there are many challenges for data security as there is no vicinity of the data for the Cloud user. The main scope of this paper is to solve the security issues in both cloud providers and cloud consumers. The outcome of the research paper is securing cloud data storage by using modulo 37, but existing hill cipher working with modulo 26.
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The cybersecurity practice, also known as cryptology, combines various disciplines like computer science, computer engineering, and mathem...
详细信息
ISBN:
(纸本)9798350367607;9798350367591
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The cybersecurity practice, also known as cryptology, combines various disciplines like computer science, computer engineering, and mathematics to create complex algorithms. In our work, we combine cryptology with the field of genetics algorithms to develop new encryption algorithms. Firstly, we introduced the fundamental theories of these two fields. It aims to teach basic knowledge of using genetic algorithms to select specific parts of encryption algorithms (chromosomes) and combine them to produce new encryption algorithms (offspring). The standard flow of the genetic algorithm is divided into the initial population's creation process, evaluation, fitness score assignments, selection, crossover, and mutation. We will take a deeper look at the process of assignments of fitness score and crossover. These processes ' new design, implementation, and testing allow us to reach the results presented.
暂无评论