PhpBB forum is one of the widely applied network forums. In this paper, we investigate the security of this kind of forum. We analyze the whole process of security mechanism related to user's password, including p...
详细信息
ISBN:
(纸本)9781510802704
PhpBB forum is one of the widely applied network forums. In this paper, we investigate the security of this kind of forum. We analyze the whole process of security mechanism related to user's password, including password checking in registration, password storage in database and password identification when users log in. Our research indicates that security of the earlier version is weak, and subsequent 3.0 version provides more secure cryptographic algorithm. However, in order to acquire the compatibility, the forum software retains the weak algorithm which brings the potential security threat. According to this vulnerability, we design the corresponding attack while we also propose the countermeasures.
Masking is one of the major countermeasures against side-channel attacks to cryptographic modules. Nassar et al. recently proposed a highly efficient masking method, called Rotating S-boxes Masking (RSM), which can be...
详细信息
ISBN:
(纸本)9783981537024
Masking is one of the major countermeasures against side-channel attacks to cryptographic modules. Nassar et al. recently proposed a highly efficient masking method, called Rotating S-boxes Masking (RSM), which can be applied to a block cipher based on Substitution-Permutation Network. It arranges multiple masked S-boxes in parallel, which are rotated in each round. This rotation requires remasking process for each round to adjust current masks to those of the S-boxes. In this paper, we propose a method for reducing the complexity of RSM further by omitting the remasking process when the linear diffusion layer of the encryption algorithm has a certain algebraic property. Our method can be applied to AES with a reduced complexity from RSM, while keeping the equivalent security level.
Watermarking encryption is an effective technique in the copyright protection of digital media. This paper focuses on the watermarking encryption and proposes a digital watermarking encryption algorithm which is based...
详细信息
ISBN:
(纸本)9781510804289
Watermarking encryption is an effective technique in the copyright protection of digital media. This paper focuses on the watermarking encryption and proposes a digital watermarking encryption algorithm which is based on Haar wavelet transform. In the algorithm, the watermark is pretreated with Arnold image transform according to the characteristic of the human vision system. It improves the security and the invisibility of watermark. Simulation results show that the algorithm is an effective encryption method and easy to be achieved.
In this paper, compressive sensing is combined with a chaotic key based generation of measurement matrix to provide an effective encryption algorithm for multimedia security. Block-based compressive sensing provides a...
详细信息
ISBN:
(纸本)9781479921775
In this paper, compressive sensing is combined with a chaotic key based generation of measurement matrix to provide an effective encryption algorithm for multimedia security. Block-based compressive sensing provides a better way in the field of image and video transmission by reducing the memory requirements and complexity, where as multiple hypothesis prediction provides a competent way in improving PSNR during reconstruction of block based compressive sensed images and videos. The measurement matrix F place a crucial role in this compressive sensing and as well as in the reconstruction process. A possibility to generate secure measurement matrix using piecewise linear chaotic map (PWLCM) as the seed and then hiding initial condition, system parameter, number of iterations of PWLCM as the key enable the sender to incorporate room for encryption along with the compression in a single step. The above mentioned scheme provides high level of data security, reduced complexity, compression with a good reconstruction quality and beside all it reduce the burden of sending the measurement matrix along with the data which further reduces the complexity in over all compressive sensing framework.
encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and ba...
详细信息
encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and bandwidth-constrained channel, it is customary to compress the data first and then encrypt it. In this paper, a novel algorithm, the new compression with encryption and compression (CEC), is proposed to secure and compress the data. This algorithm compresses the data to reduce its length. The compressed data is encrypted and then further compressed using a new encryption algorithm without compromising the compression efficiency and the information security. This CEC algorithm provides a higher compression ratio and enhanced data security. The CEC provides more confidentiality and authentication between two communication systems.
The efficiency of cryptographic algorithms when implemented in reconfigurable hardware is mainly determined by the fact of how the underlying finite field arithmetic operations are realized. Especially the field multi...
详细信息
ISBN:
(纸本)9788026101666
The efficiency of cryptographic algorithms when implemented in reconfigurable hardware is mainly determined by the fact of how the underlying finite field arithmetic operations are realized. Especially the field multiplication operation is crucial to the efficiency of a design, since it is the core operation of many cryptographic algorithms. This paper deals with the FPGA implementation of a Montgomery Multiplier architecture which operates on multiple words. The design scales up very easily and can be utilized as a unified architecture which can operate in different types of finite fields. The main focus of this ongoing research work is the conceptual design, development and implementation of a reconfigurable FPGA-based hardware security module.
Conduct and sponsor research to provide information assurance for national security systems. Enabling safe operation in risky or compromised environments. Research into cryptographic algorithms and protocols, system a...
详细信息
Conduct and sponsor research to provide information assurance for national security systems. Enabling safe operation in risky or compromised environments. Research into cryptographic algorithms and protocols, system analysis and design methods, trust mechanisms, and systems behavior. Creators of SE Linux, Xen Security Modules, Linux Kernel Integrity Monitor, and SE Android.
The gyrator transform has been proposed in optics a few years ago. By using the theory of quaternion numbers, this paper presents the quaternion gyrator transform (QGT). It is shown that the QGT can be computed via th...
详细信息
ISBN:
(纸本)9781479923427
The gyrator transform has been proposed in optics a few years ago. By using the theory of quaternion numbers, this paper presents the quaternion gyrator transform (QGT). It is shown that the QGT can be computed via the left-side type of quaternion Fourier transforms. The new transform is applied to color image encryption for validation, where the rotation angles are used as encryption keys making it more secure compared to a recent method using discrete quaternion Fourier transforms (DQFTs). Experimental results show that the proposed encryption algorithm for color image performs as well as the DQFTs method in terms of noise robustness, so that it could be a useful tool for color image encryption.
The cloud is an emerging field in the IT. It is a way of delivering IT-enabled services in the form of software, platform and infrastructure. Cloud computing in recent times has become a trend among all walks of life ...
详细信息
ISBN:
(纸本)9781467362429
The cloud is an emerging field in the IT. It is a way of delivering IT-enabled services in the form of software, platform and infrastructure. Cloud computing in recent times has become a trend among all walks of life to store and retrieve data from anywhere around the globe. With the rising cost for the data storage devices and data retrieval process;enterprises have moved to centralized storage for cost efficiency. This proves a greater task to the service providers in terms of security and consistency. As shared systems are prone to be attacked, various counter measures have been proposed by experts to secure the stored data. Here the data is being encrypted by the advanced encryption algorithm which is considered to be the most competent in the present security scenario. A symmetric key is generated to the stored file. To further enhance the trust of the service provider the trust certificate of the company is being sent along with the keys to the client. All the communication process is taken place using the Key Exchange protocol. These techniques are performed to ensure the client that the stored data is being secured, integrated and a total control over the route in which the data is being communicated. In this paper, a new efficient technique is proposed which indicates the effectiveness, flexibility of the storage and retrieval process by a generic framework. This framework fills the gap between the security needs and challenges.
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PR...
详细信息
ISBN:
(纸本)9781467325271
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PRESENT encryption algorithm. To minimize power consumption, subthreshold CMOS logic is adopted. To implement robust combinational logic (S-Boxes) in PRESENT at subthreshold, a multiplexor-tree architecture based on CMOS transmission gates is proposed. Our post-layout simulations show that our PRESENT core consumes around 50 nW at 0.35V supply voltage at 25 kHz clock frequency, proving the feasibility of ultra-low power encryption.
暂无评论