In the fuzzy identity-based encryption scheme, a trusted KGC (key generation center) is needed to generate the corresponding private key corresponding to the user's biometric public key. In order to deal with the ...
详细信息
ISBN:
(纸本)9781509055692
In the fuzzy identity-based encryption scheme, a trusted KGC (key generation center) is needed to generate the corresponding private key corresponding to the user's biometric public key. In order to deal with the decentralization problem and the verification problem of the users identity, we propose a public key encryption model based on transformed biometrics. In this model, the user uses the transformed biometrics as his public key and his inherent real biometrics as his private key. In order to protect the user's biometrics information from being leaked, we take some appropriate security measures such as biometric template protection technology and irreversible random conversion technology. These operations are performed locally by the user, and once the public key is generated, the random transformation matrix is deleted or destroyed. The user connects the device serial number in parallel with the modulus N as the input value of the SHA-256 function and uses the output message digest as the public information. The user uses the inner product encryption to complete the encryption process. In this model, the security parameter and the private keys do not require any trusted organization for their generation, and these sensitive information does not need to be transmitted over a public network. The communication parties do not need to know the public key information of the other party in advance. When the user needs to transmit the secret message, the user can query the corresponding public key and related information. We have effectively linked the biological identities with the digital identities. Our thorough analysis shows that the proposed encryption model is both secure and efficient for an encryption algorithm.
encryption algorithms are widely used to enhance the data confidentiality and integrity in software systems. Most of the conventional encryption algorithms are designed based on mathematical methods. Sometimes there a...
详细信息
ISBN:
(纸本)9781509035397
encryption algorithms are widely used to enhance the data confidentiality and integrity in software systems. Most of the conventional encryption algorithms are designed based on mathematical methods. Sometimes there are traces left behind, which can be possibly detected and utilised by attackers. Based on the ideas of knowledge combination derived from Creative Computing, in order to provide a safer user experience, this paper attempts to introduce a creative encryption approach based on Pataphysics. Pataphysics is widely known as the science of imaginary solutions and laws, governing exceptions. One of the most important advantages of Pataphysics is the novel or innovative methods to understand and explore the surrounding world. It is believed that based on the key concepts provided by Pataphysics, Clinamen, something new might be discovered for traditional encryption design. The creative approach aims to utilise the ambiguity in language to enhance the confidentiality of encryption algorithms. We hope the proposed approach could provide a promising direction for software and information security.
A smart grid is a modernized electrical grid that uses distribution networks to deliver electricity. It aims to gather and act on information, such as information about the behaviors of grid entities, in an automated ...
详细信息
ISBN:
(纸本)9781479999644
A smart grid is a modernized electrical grid that uses distribution networks to deliver electricity. It aims to gather and act on information, such as information about the behaviors of grid entities, in an automated fashion to improve the efficiency, security and reliability. It is important that the sensitive information should be shared securely among the grid entities. In smart grid, smart devices (e.g., smart meters) usually have limited computational capability. In this paper, we propose an online/offline attribute based encryption (ABE) scheme based ***'s ABE scheme with hidden policy. In our scheme, the advantages of ***'s scheme are kept. Thus, the data privacy and policy privacy are all preserved well. The computational overhead of encryptors are reduced by splitting the computation for encryption algorithm into two phases: online/offline. Most of the laborious decryption operations are delegated to the offline phase. The online phase can then rapidly assemble an ABE ciphertext when the message and the attribute control policy become known.
One of the major sources of information in recent times is the internet, which facilitates the exchange of information between thousands of people at any instant. The transmission of sensitive data such as passwords m...
详细信息
ISBN:
(纸本)9781467397810
One of the major sources of information in recent times is the internet, which facilitates the exchange of information between thousands of people at any instant. The transmission of sensitive data such as passwords must be accompanied by some form of robust protection to ensure prevention of unauthorized access. The requirement of strong encryption algorithms is of utmost importance. In this paper we present the Verilog description and hardware implementation on Altera DE2115 board of password encryption using Blake 256 cryptographic hash function coupled and parallel CRC for high performance, transmission error control.
In this paper we present an encryption module included in the Subsidiary Communication Channel (SCC) System we are developing for video-on-FM radio broadcasting. This module is aimed to encrypt by symmetric key the vi...
详细信息
ISBN:
(纸本)0819444898
In this paper we present an encryption module included in the Subsidiary Communication Channel (SCC) System we are developing for video-on-FM radio broadcasting. This module is aimed to encrypt by symmetric key the video image archive and real-time database of the broadcaster, and by asymmetric key the video broadcasting to final users. The module includes our proprietary Techniteia encryption Library (TEL), that is already successfully running and securing several e-commerce portals in Europe. TEL is written in C-ANSI language for its easy exportation onto all main platforms and it is optimized for real-time applications. It is based on the blowfish encryption algorithm and it is characterized by a physically separated sub-module for the automatic generation/recovering of the variable sub-keys of the blowfish algorithm. In this way, different parts of the database are encrypted by different keys, both in space and in time, for granting an optimal security.
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PR...
详细信息
ISBN:
(纸本)9781467325271
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PRESENT encryption algorithm. To minimize power consumption, subthreshold CMOS logic is adopted. To implement robust combinational logic (S-Boxes) in PRESENT at subthreshold, a multiplexor-tree architecture based on CMOS transmission gates is proposed. Our post-layout simulations show that our PRESENT core consumes around 50 nW at 0.35V supply voltage at 25 kHz clock frequency, proving the feasibility of ultra-low power encryption.
When cryptographic products chat employ different key recovery mechanisms need to interoperate with one another, one of che major obstacles is the inability of the decryptor product to recognize, and optionally valida...
详细信息
When cryptographic products chat employ different key recovery mechanisms need to interoperate with one another, one of che major obstacles is the inability of the decryptor product to recognize, and optionally validate, the key recovery information generated by the encryptor product. In this paper, a common Key Recovery Block (KRB) format is being proposed to facilitate interoperability between heterogeneous key recovery systems. The KRB serves as a container for mechanism-specific key recovery information, and supports techniques to identify and optionally validate the contained key recovery information. This specification provides an extensible set of KRB validation techniques - however, it makes no attempt to set a preference for one technique over the others. The choice of validation technique(s) used is determined by the policies (with respect to the use of cryptography and key recovery) that apply to the encryptor and decryptor produces. It may be noted chat the KRB format specification is independent of the encryption algorithm used to protect the confidentiality of the data, and independent of the communication or storage protocol used co carry the encrypted data. It should also be recognized that the KRB format proposed in this payer is of limited scope. It assumes that the key recovery information can be made available to interested parties along with the encrypted data. There are a number of open issues regarding the techniques that allow key recovery information to be associated with encrypted data (whether the key recovery information and the encrypted data are transmitted over the same channel or separate channels) - these issues are beyond the scope of this proposal.
A generic, parameterisable key scheduling core is presented, which can be utilised in pipelinable private-key encryption algorithms. The data encryption standard (DES) algorithm, which lends itself readily to pipelini...
详细信息
A generic, parameterisable key scheduling core is presented, which can be utilised in pipelinable private-key encryption algorithms. The data encryption standard (DES) algorithm, which lends itself readily to pipelining, is utilised to exemplify this novel key scheduling method and the broader applicability of the method to other encryption algorithms is illustrated. The DES design is implemented on Xilinx Virtex FPGA technology. Utilising the novel method, a 16-stage pipelined DES design is achieved, which can run at an encryption rate of 3.87 Gbit/s. This result is among the fastest hardware implementations and is a factor 28 times faster than software implementations.
The soft set theory offers a wide range of applications in a variety of domains. The soft set is more general and has more capabilities in controlling unpredictable data than other current apparatuses, such as fuzzy s...
详细信息
The soft set theory offers a wide range of applications in a variety of domains. The soft set is more general and has more capabilities in controlling unpredictable data than other current apparatuses, such as fuzzy set theory. On the other hand, at whatever point we come over the term cryptography, the primary thing and probably the only thing that comes to our intellect could be private communication. This paper's important reason is to present a new cryptosystem in which both the key and the plaintext are of a soft set environment. We have proposed the definitions of the soft cryptosystem. At that point, we introduced symmetric and asymmetric cryptosystem in a soft set environment. We have created two new theorems. Utilizing this concept, we have arranged two algorithms to encrypt the plaintext and decrypt the ciphertext. Besides, a numerical illustration to solve a banking problem with our proposed cryptosystem has been displayed.
encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and ba...
详细信息
encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and bandwidth-constrained channel, it is customary to compress the data first and then encrypt it. In this paper, a novel algorithm, the new compression with encryption and compression (CEC), is proposed to secure and compress the data. This algorithm compresses the data to reduce its length. The compressed data is encrypted and then further compressed using a new encryption algorithm without compromising the compression efficiency and the information security. This CEC algorithm provides a higher compression ratio and enhanced data security. The CEC provides more confidentiality and authentication between two communication systems.
暂无评论