Almost every living species has a motive to communicate electronically with one another and preserve data for immediate or future use. These data are becoming too large to be maintained on personal storage devices. Te...
详细信息
Almost every living species has a motive to communicate electronically with one another and preserve data for immediate or future use. These data are becoming too large to be maintained on personal storage devices. Technological innovation has cleared the path for vast, remote storage known as the cloud. This innovation is being provided as a service to people and organizations due to the high cost of investment and the high-tech skills needed for its maintenance. Despite the many benefits of cloud computing, data privacy, integrity, and access control are issues that require immediate attention. Many studies have been conducted in order to find solutions to these challenges. In this review, the authors look at the numerous methods that have been proposed to address these security challenges. The research revealed that elliptic curve cryptography and the advance encryption system (AES) were the techniques that were most frequently used to address security issues in the digital world.
Message-Digest algorithm 5, a hash function which is widely used in the field of computer security, can provide the message integrity protection. But to the field following certain rules, for example, by date of birth...
详细信息
ISBN:
(数字)9783642340383
ISBN:
(纸本)9783642340376
Message-Digest algorithm 5, a hash function which is widely used in the field of computer security, can provide the message integrity protection. But to the field following certain rules, for example, by date of birth as a password, using the MD5 encryption algorithm, can still quickly decipher by MD5 decoding procedures of list form. In view of this situation, on the basis of MD5, putting forward a improved algorithm which has greatly security in data safety, and the improved algorithm is applied to the online shopping system based on ajax framework, for digital signature function of users on the system provides powerful safety security.
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and ba...
详细信息
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and backup. In cloud computing, protection of data in server and while in media is a challenging issue. Our proposed encryption algorithm Hybrid DESCAST has been designed to provide the security of huge volume of data sent through the media and the same will remain encrypted in the cloud sever. This cipher text will be decrypted only when the same is required to be used by the authenticated user. Problems of individual DES and CAST Block Cipher algorithm have been tackled by our proposed encryption algorithm. Complexity and Computation time for encryption and decryption for our proposed algorithm is higher than the individual DES and CAST algorithm. This paper is focused to provide security of data in cloud server, as well as for the data while transferring from client to cloud server and vice versa. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://***/licenses/by-nc-nd/4.0/).
Quantum cryptography is an area of intense interest, as quantum computers contain the potential to break many classical encryption algorithms. With so much on the line, it is imperative to find a new quantum encryptio...
详细信息
ISBN:
(纸本)9783030325206;9783030325190
Quantum cryptography is an area of intense interest, as quantum computers contain the potential to break many classical encryption algorithms. With so much on the line, it is imperative to find a new quantum encryption method before quantum technology catches up with current cryptography. This study examines one of the very few experiments on encryption that has already been conducted and analyzes the results of the tests run on the IBM Cloud Server. It attempts to recreate the sample experiment and make comprehensive adjustments for a real-world environment. This study also looks at the possible application of quantum public key encryption and the theoretical importance of quantum key distribution.
Side-channel attacks are currently among the most serious threats for embedded systems. Popular countermeasures to mitigate the impact of such attacks are masking schemes, where secret intermediate values are split in...
详细信息
ISBN:
(纸本)9781467380355
Side-channel attacks are currently among the most serious threats for embedded systems. Popular countermeasures to mitigate the impact of such attacks are masking schemes, where secret intermediate values are split in two or more values by virtue of secret sharing. Processing the secret happens on separate execution paths, which are executed on the same central processing unit (CPU). In case of unwanted correlations between different registers inside the CPU the shared secret may leak out through a side-channel. This problem is particularly evident on low cost embedded systems, such as nodes for the Internet of Things (IoT), where cryptographic algorithms are often implemented in pure software on a reduced instruction set computer (RISC). On such an architecture, all data manipulation operations are carried out on the contents of the CPU's register file. This means that all intermediate values of the cryptographic algorithm at some stage pass through the register file. Towards avoiding unwanted correlations and leakages thereof, special care has to be taken in the mapping of the registers to intermediate values of the algorithm. In this work, we describe an empirical study that reveals effects of unintended unmasking of masked intermediate values and thus leaking secret values. The observed phenomena are related to the leakage of masked hardware implementations caused by glitches in the combinatorial path of the circuit but the effects are abstracted to the level of the instruction set architecture on a RISC CPU. Furthermore, we discuss countermeasures to have the compiler thwart such leakages.
In the realm of Internet of Things (IoT) systems, the interconnectivity of physical hardware devices is a fundamental aspect, and as a result, data exchange assumes a critical role in the network. Given the sensitivit...
详细信息
In the realm of Internet of Things (IoT) systems, the interconnectivity of physical hardware devices is a fundamental aspect, and as a result, data exchange assumes a critical role in the network. Given the sensitivity of such information, it is imperative to adopt appropriate measures to encrypt the data to safeguard it from unauthorized access. It is, therefore, paramount to prove novel encryption algorithms at an experimental level. To overcome that, a potential solution is fractional-order multi-scroll chaotic systems, which provide an extra degree of freedom to enhance ergodicity and random-like behaviors, which can help to improve encryption keyspace to get robust ciphers. However, the numerical algorithms to obtain a fractional chaotic series increase the computational cost because they demand extensive simulation time to model the memory of the standard fractional derivatives, limiting highspeed encryption. In this framework, a fast encryption scheme using a 5D fractional-order (FO) hyper-chaotic multi-scroll (HCMS) system is proposed and verified experimentally. Based on multiprocessing strategies and the Numba just -in -time (JIT) compiler, the Python code that describes the FO-HCMS system is optimized, which enables image encryption in real -time. The physical implementation of the encryption scheme is performed on an Advance RISC Machine (ARM) processor, and it is applied for image encryption on a machine-to-machine (M2M) communication using the message queuing telemetry transport (MQTT) protocol. The obtained results indicate that the proposed encryption scheme can reach encryption throughputs of up to 19.891 Mbps on an ARM with a 1.4 GHz CPU and 77.864 Mbps on a PC with a 3.1 GHz CPU.
With the continuous development of information technology, online shopping has become a preferred way of shopping by its convenience and rapidity. However, online shopping also brings some hidden dangers to consumers ...
详细信息
With the continuous development of information technology, online shopping has become a preferred way of shopping by its convenience and rapidity. However, online shopping also brings some hidden dangers to consumers while serving them. The personal information provided by consumers in shopping becomes a commodity and is used by businesses, which seriously threatens the balance of consumers' rights and interests and the market. At present, for many large enterprises, most online shopping data are processed in batches in a unified encryption mode, which leads to an imbalance between efficiency and security. Therefore, this paper proposes a layered encryption model. By adopting different encryption algorithms for various types of data generated in the online shopping process, it can not only improve the efficiency and security of encryption on the premise of ensuring security, but also can guarantee the interests of enterprises and protect the personal information of consumers to the greatest extent. The experiment shows that the simulation results of the model achieve high accuracy under the premise of ensuring data encryption.
Oblivious RAM is known as a secure protocol for hiding client's access pattern from an untrusted server. However, the current ORAM algorithms still incur large computation, storage and communication overheads. For...
详细信息
ISBN:
(纸本)9781479999422
Oblivious RAM is known as a secure protocol for hiding client's access pattern from an untrusted server. However, the current ORAM algorithms still incur large computation, storage and communication overheads. For this reason, investigation of the ORAM limitations and methods to improve efficiency in real-world environments is necessary. In this paper we focus on one of the leading algorithms, Path ORAM, and propose an efficient implementation. Specifically we analyse the selection of encryption algorithms, concluding the use of AES-GCM to avoid duplication of blocks on the server. Also we propose extending Path ORM by using local caching on the client to reduce communication overhead. Experimental results from our Python implementation show key tradeoffs for ORAM design.
This paper describes a high performance, low power, and highly flexible cryptographic processor, Cryptoraptor, which is designed to support both today's and tomorrow's symmetric-key cryptography algorithms and...
详细信息
ISBN:
(纸本)9781479962785
This paper describes a high performance, low power, and highly flexible cryptographic processor, Cryptoraptor, which is designed to support both today's and tomorrow's symmetric-key cryptography algorithms and standards. To the best of our knowledge, the proposed cryptographic processor supports the widest range of cryptographic algorithms compared to other solutions in the literature and is the only crypto-specific processor targeting future standards as well. Our 1GHz design achieves a peak throughput of 128Gbps for AES-128 which is competitive with ASIC designs and has 25X and 160X higher throughputs per area than CPU and GPU solutions, respectively.
The paper presents a novel chaotic encryption algorithm which can be used to improve the communication security. An uncomplicated process of chaotic substitution permutation network (SPN) with variable control paramet...
详细信息
ISBN:
(纸本)9781467353250;9781908320087
The paper presents a novel chaotic encryption algorithm which can be used to improve the communication security. An uncomplicated process of chaotic substitution permutation network (SPN) with variable control parameters is proposed to form a robust chaotic cryptosystem. A new chaotic generator, firstly proposed by Lozi, is used for this purpose. For the new cryptosystem, the results of the statistical NIST tests for pseudo-randomness showed to be successful. The system performances are significantly improved after a chaotic under-sampling of the output signal.
暂无评论