Smart Card is something that is used for data transactions quickly and practically. The definition of ”smart” is when a card has a chip implanted. The card is very helpful in the authentication and administration pr...
详细信息
ISBN:
(数字)9781728154237
ISBN:
(纸本)9781728154244
Smart Card is something that is used for data transactions quickly and practically. The definition of ”smart” is when a card has a chip implanted. The card is very helpful in the authentication and administration process even during emergencies, such as a patient healthcare record at the hospital. In this case study, patient data should only be accessed and known by people who have rights. So it is necessary for the security of data storage such as cryptography algorithms. The algorithm needed for patient cards is an algorithm that has fast processing capability and a high level of security. So the aim of this study is to implement the Tiny encryption algorithm on Smart Cards. Based on the results of testing in this study the time of encrypting patient data with a total of 600 lines of patient history measuring 30.6 Kb produces an average encryption time of 20.17 ms. While the decryption for the same data takes 17.21 ms which shows very little processing time and the tolerance for waiting time for accessing data. Furthermore, the Avalanche Effect test carried out in the TEA encryption process results 77%, where these results indicate that encrypted data has very random cipher-text results so that the data contents are kept confidential with a high level of security. The results of testing the processing time and AE can be concluded that TEA is an algorithm that has a fast data security process with high security and time that can be tolerated by users.
In this paper, a novel image encryption algorithm based on coarse-grained chaotic signals in which scrambling and diffusion are both covered. First, the chaotic signals are handled with unfixed coarse-grained key inst...
详细信息
ISBN:
(纸本)9781728123264
In this paper, a novel image encryption algorithm based on coarse-grained chaotic signals in which scrambling and diffusion are both covered. First, the chaotic signals are handled with unfixed coarse-grained key instead of been utilized directly. Second, both original image and derived chaotic signals are divided into bit signals form pixel values. In addition, high bits and low bits are also separated. Third, the high bits and low bits are scrambled with different methods at the same time and combined bit signals after scrambling are used to get the final results by global diffusion. At last, the image is encrypted and a corresponding decryption is designed to recover the encrypt image. In the simulation, properties including key space, information entropy, correlation analysis, key sensitivity and resistance to differential attack are provided to show the effectiveness and robustness of the high secure image encryption algorithm.
iOS devices are steadily obtaining popularity of the majority of users because of its some unique advantages in recent *** can do many things that have been done on a desktop computer or laptop
ISBN:
(纸本)9781467389808
iOS devices are steadily obtaining popularity of the majority of users because of its some unique advantages in recent *** can do many things that have been done on a desktop computer or laptop
Nowadays, many algorithms in cryptography area has been developed. Choosing the appropriate algorithm and dealing with its tradeoff, require a specific analysis. One of the examples is calculating the optimum encrypti...
详细信息
ISBN:
(纸本)9781509051700
Nowadays, many algorithms in cryptography area has been developed. Choosing the appropriate algorithm and dealing with its tradeoff, require a specific analysis. One of the examples is calculating the optimum encryption algorithm in video encryption. There are various ways to encrypt the video, depend on encryption algorithms (DES, Triple DES, Blowfish, AES, etc), modes of operation (ECB, CBC, CFB, OFB, CTR, etc), and padding modes (ISO10126, PKCS5, or without padding). The purpose of this paper is to calculate the best combination of encryption method regarding to processing time, performance, security, dynamism of system and impact from error propagation using two layer of AHP. The first AHP is to determine encryption algorithm and the second AHP is to determine modes of operation. The conclusion of this paper is the author suggest to use combination of AES/CTR/PKCS5Padding as the optimum method to encrypt the video. In this paper, also include the sample of video before and after encryption method.
In this paper, we propose a new DES variant named Hashed Data encryption Standard (or HDES for short), with an objective to enhance the limitation of static S-boxes arrangement in DES. The proposed HDES combines sever...
详细信息
ISBN:
(纸本)9781467386142
In this paper, we propose a new DES variant named Hashed Data encryption Standard (or HDES for short), with an objective to enhance the limitation of static S-boxes arrangement in DES. The proposed HDES combines several techniques and components into one new algorithm to enhance the original DES. The HDES uses a hash function at the beginning of each block encryption process to produce a fingerprint for the plaintext, which will be used later to produce a seed that will coordinate the generation of the S-boxes during the sixteen rounds of the encryption process. The performance of the HDES has been evaluated and compared against DES and DESX. The evaluation has been conducted using the cipher data randomness and the encryption time.
In view of the present chaotic image encryption algorithm based on scrambling (diffusion is vulnerable to choosing plaintext (ciphertext) attack in the process of pixel position scrambling), we put forward a image enc...
详细信息
In view of the present chaotic image encryption algorithm based on scrambling (diffusion is vulnerable to choosing plaintext (ciphertext) attack in the process of pixel position scrambling), we put forward a image encryption algorithm based on genetic super chaotic system. The algorithm, by introducing clear feedback to the process of scrambling, makes the scrambling effect related to the initial chaos sequence and the clear text itself;it has realized the image features and the organic fusion of encryption algorithm. By introduction in the process of diffusion to encrypt plaintext feedback mechanism, it improves sensitivity of plaintext, algorithm selection plaintext, and ciphertext attack resistance. At the same time, it also makes full use of the characteristics of image information. Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man...
详细信息
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man-in-The-Middle (MITM) attack is one of the threats that could impact medical organizations. It happens when unapproved outsiders break into the traffic between two parties that think they are conversing directly. At the same time, the adversary can access, read, and change secret information. Because of that, medical organizations lose confidentiality, integrity, and availability. Data encryption is a solution that changes vital information to unreadable by unauthorized and unintended parties. It could involve protecting data with cryptography, usually by leveraging a scrambled code. Only the individuals with the decoding key can read the information. There is no full protection due to the variety of MITM attacks. Each encryption algorithm has its advantages and disadvantages, like the speed of encryption and decryption, strength of the algorithm, and the cipher type. This research investigates the MITM attacks and comprehensively compares the Rivest Shamir Adleman algorithm and the Elliptic Curve Cryptography algorithm.
The need of keeping medical information safe and secure stems from the fact that doctors rely on it to make accurate diagnoses. If this information is altered in any way, no matter how minor, there is a risk of an ina...
详细信息
The need of keeping medical information safe and secure stems from the fact that doctors rely on it to make accurate diagnoses. If this information is altered in any way, no matter how minor, there is a risk of an inaccurate diagnosis, which could result in severe medical issues and death. The transition from paper to electronic health records (EHRs) has considerably improved patient care quality and efficiency. However, for many healthcare service providers, it has extended the attack surface. Because of the value of a patient's medical information, this has posed a threat to both patients and healthcare providers. When security is not taken into account in healthcare systems, patients' privacy is jeopardized. The intended solution to this challenge is to create a modified AES algorithm to secure patient medical information. Although, the AES algorithm is secure, however, there is always a need for improvement on any cryptographic algorithms in terms of computational cost. This study implements AES and modified the last round of the AES and their performance has been measured by scrambling input datasets of various contents and volumes. The experimental results show that modified AES outperforms AES algorithms in terms of encryption time while AES outperform modified AES in terms of decryption time. Also, the Avalanche effect results revealed that modified AES has a higher avalanche effect for small-size files while a smaller avalanche effect for larger file sizes. This signifies that modified AES security is stronger for a small size file while conventional AES has higher security for larger file sizes. The average encryption time of the AES algorithm for text files is 1513.3ms while the modified AES average encryption time gives 1293.837ms. The average decryption time for conventional AES is 1289.627ms while the average decryption time for modified AES give 1400.136ms. Modified AES uses lesser time complexity during the encryption of all categories of data files
An image encryption algorithm based on Zigzag transformation and 3-Dimension Logistic chaotic map by making use of the permutation-diffusion encryption structure is proposed. The algorithm consists of two parts: first...
详细信息
ISBN:
(纸本)9783662486832;9783662486825
An image encryption algorithm based on Zigzag transformation and 3-Dimension Logistic chaotic map by making use of the permutation-diffusion encryption structure is proposed. The algorithm consists of two parts: firstly, Zigzag transformation is used to scramble pixel position of the color image through three channels;then, 3-Dimension Logistic chaotic map is utilized to diffuse pixel values through three channels. To solve the problem of large computation and space overhead of color image encryption algorithm, the iterative chaotic sequences are used several times in the diffusion process to improve encryption efficiency. The key space of the algorithm is large enough to resist brute-force attack and simulation results show that it also has high key sensitivity, high encryption speed and the strong ability to resist exhaustive attack and statistical attack.
With the high-speed development of mobile terminal device, the mobile information application solution has been more and more common. According to the processing and manufacturing industry MES (Manufacturing Execution...
详细信息
ISBN:
(纸本)9781479987306
With the high-speed development of mobile terminal device, the mobile information application solution has been more and more common. According to the processing and manufacturing industry MES (Manufacturing Execution System) data security and the power consumption for mobile application, this paper studies a kind of lightweight mobile security encryption algorithm, and applies this method in a mobile application of MES in aluminum electrolytic industry. This paper will discuss the key process of the algorithm in detail, and compared with existing algorithms, by comparing the test and analysis, this algorithm has the advantages of high security and low power consumption.
暂无评论