Chaotic theory has been applied to image encryption as an effective and robust technique due to its unique properties. In this paper, we introduce a new combined chaotic system, which shows better chaotic behaviors th...
详细信息
ISBN:
(纸本)9781467317139
Chaotic theory has been applied to image encryption as an effective and robust technique due to its unique properties. In this paper, we introduce a new combined chaotic system, which shows better chaotic behaviors than the traditional ones. Applying this chaotic system to image processing, a new image encryption algorithm is introduced based on the confusion and diffusion in encryption procedure. Experimental results show that the proposed algorithm has a higher security level and excellent performance in image encryption.
In this paper, a cryptographic algorithm design called Tiny encryption algorithm (TEA) is proposed in order to minimize the memory footprint and maximize the speed. The design was targeted for embedded and mobile syst...
详细信息
ISBN:
(纸本)9781467321624
In this paper, a cryptographic algorithm design called Tiny encryption algorithm (TEA) is proposed in order to minimize the memory footprint and maximize the speed. The design was targeted for embedded and mobile systems which concern more on speed and space. In TEA, the plaintext is encrypted and decrypted using the operations from mixed (orthogonal) algebraic groups and a huge number of rounds to achieve security with simplicity. At sixty-four (64) Feistel rounds, a total of 2,883 gates are used in the TEA encryption process with 16.72ns delay time while 2,805 gates are consumed in the decryption process with 14.78ns delay time. With these outcomes, the design is possible to be implemented on mobile devices which require considerable extent of security.
Image encryption is an effective approach to protect privacy and security of images. This paper introduces a novel image encryption algorithm using the Truncated P-Fibonacci Bit-planes as security key images to encryp...
详细信息
ISBN:
(纸本)9781467317139
Image encryption is an effective approach to protect privacy and security of images. This paper introduces a novel image encryption algorithm using the Truncated P-Fibonacci Bit-planes as security key images to encrypt images. Simulation results and security analysis are provided to show the encryption performance of the proposed algorithm.
Now-a-days there is fast evolution of internet and network applications so information security is very much important for secure transmission of data over an electronic way. Cryptography plays a very important role i...
详细信息
ISBN:
(数字)9781538624401
ISBN:
(纸本)9781538624418
Now-a-days there is fast evolution of internet and network applications so information security is very much important for secure transmission of data over an electronic way. Cryptography plays a very important role in providing information security and protecting system from malicious attacks. It has many encryption algorithms to scramble the data and convert it to an unreadable format. Each algorithm differs based on few characteristics such as ability to protect from attacks, performance and speed, memory usage, power consumption. The main aim of designing a cryptographic algorithm is to accomplish security. Each algorithm differs by simulation time, memory usage and power consumption. In this work we evaluate two most commonly used symmetric algorithms namely DES (Data encryption Standard), AES (Advanced encryption Standard). A comparative analysis has been done using performance evaluation metrics of each algorithm based on input size. The metrics are encryption/decryption time, throughput, power consumption, memory consumption, simulation time.
Electric power information system is related with the safe operation of power grid. To ensure the data of electric power information will not be eavesdropped or deciphered, we need a strict way of encryption. With the...
详细信息
ISBN:
(纸本)9788996865094
Electric power information system is related with the safe operation of power grid. To ensure the data of electric power information will not be eavesdropped or deciphered, we need a strict way of encryption. With the improvement of computing capacity, traditional encryption algorithms are at high risk of crack. Quantum communication technology is an absolute security encryption mode, which can significantly improve the safety of electric power information system. For the particularity of electric power production and management data by analysing the principle of quantum communication technology, we have put forward implementation plan of electric power information system data encryption scheme and quantum communication network.
The asymmetric cryptosystem, which is based on phase-truncated Fourier transforms (PTFTs), can break the linearity of conventional systems. However, it has been proven to be vulnerable to a specific attack based on it...
详细信息
The asymmetric cryptosystem, which is based on phase-truncated Fourier transforms (PTFTs), can break the linearity of conventional systems. However, it has been proven to be vulnerable to a specific attack based on iterative Fourier transforms when the two random phase masks are used as public keys to encrypt different plaintexts. An improvement from the asymmetric cryptosystem may be taken by relocating the amplitude values in the output plane. In this paper, two different methods are adopted to realize the amplitude modulation of the output image. The first one is to extend the PTFT-based asymmetrical cryptosystem into the anamorphic fractional Fourier transform domain directly, and the second is to add an amplitude mask in the Fourier plane of the encryption scheme. Some numerical simulations are presented to prove the good performance of the proposed cryptosystems. (C) 2011 Optical Society of America
A novel implementation of encryption algorithms based on FPGA gates is described in this paper. The encryption algorithm is focused on different FPGA devices with the same number of cascaded NOT gates but have differe...
详细信息
A novel implementation of encryption algorithms based on FPGA gates is described in this paper. The encryption algorithm is focused on different FPGA devices with the same number of cascaded NOT gates but have different time delays to signals. The cascaded NOT gates are achieved by programming. These different time delays are the theoretical basis of the encryption algorithm. In this paper, we will firstly introduce the core idea of the algorithm. And then, the implementation of the encryption algorithm, IC design and Embedded Software will be explained in detail. At the end of the paper, the factors which affect the encryption will be analyzed.
In order to improve the efficiency of the existing homomorphic encryption method, based on the DGHV scheme, an improved fully homomorphic scheme over the integer is proposed. Under the premise of ensuring data owner a...
详细信息
ISBN:
(纸本)9781450353526
In order to improve the efficiency of the existing homomorphic encryption method, based on the DGHV scheme, an improved fully homomorphic scheme over the integer is proposed. Under the premise of ensuring data owner and user data security, the scheme supports the addition and multiplication operations of ciphertext, and ensures faster execution efficiency and meets the security requirements of cloud computing. Security analysis shows that our scheme is safe. Performance assessment demonstrates that our scheme can more efficiently implement data than DGHV scheme.
This study proposes a chaos-based image encryption scheme using Henon map and Lorenz equation with multiple levels of diffusion. The Henon map is used for confusion and the Lorenz equation for diffusion. Apart from th...
详细信息
This study proposes a chaos-based image encryption scheme using Henon map and Lorenz equation with multiple levels of diffusion. The Henon map is used for confusion and the Lorenz equation for diffusion. Apart from the Lorenz equation, another matrix with the same size as the original image is generated which is a complex function of the original image. This matrix which is configured as a diffusion matrix permits two stages of diffusion. Due to this step, there is a strong sensitivity to input image. This encryption algorithm has high key space, entropy very close to eight (for grey images) and very less correlation among adjacent pixels. The highlight of this method is the ideal number of pixels change rate and unified average changing intensity it offers. These ideal values indicate that the encrypted images produced by this proposed scheme are random-like. Further, a cryptanalysis study has been carried out to prove that the proposed algorithm is resistant to known attacks.
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th...
详细信息
ISBN:
(纸本)9781538652589;9781538652572
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of the facility it provided. In this, user pays only for the services it uses. Now a days, vast amount of information gets stored over cloud, which include personal file, images, pdf, text, multimedia data etc. So security becomes one of the important issue. Everyone just want to upload, store its data without worrying about the security. IT organization should look after to provide security to the document. Documents content get altered by some outsider attacker, so it is necessary to verify the integrity. This data get duplicated and unnecessary much of the space will get waste. So to avoid this, data must be de-duplicated and uploaded over the cloud server. For this secure hash algorithm is used. It calculates the hash value for chunk of data and store over cloud. Only reducing unnecessary wastage of space is not the solution administrator should look toward the security issue. TPA is used for verification of integrity of the document. This system is proposed for achieving this both issues.
暂无评论