In this paper, we give efficient algorithms for solving the Diophantine equation f(x, y) = m for arbitrary definite binary quadratic form f, given the factorization of m. While Cornacchia’s algorithm to solve x2 + dy...
详细信息
Cryptographic primitives have been used for various non-cryptographic objectives, such as eliminating or reducing randomness and interaction. We show how to use cryptography to improve the time complexity of solving c...
详细信息
This article analyzes a key exchange protocol based on the triad tropical semiring, recently proposed by Jackson, J. and Perumal, R. We demonstrate that the triad tropical semiring is isomorphic to a circulant matrix ...
详细信息
In this work, we introduce a novel variant of the multivariate quadratic problem, which is at the core of one of the most promising post-quantum alternatives: multivariate cryptography. In this variant, the solution o...
详细信息
In (t, n)-threshold secret sharing, a secret S is distributed among n participants such that any subset of size t can recover S, while any subset of size t − 1 or fewer learns nothing about it. For information-theoret...
详细信息
Symmetric key block ciphers are the most widely used data encryption algorithm and is well known for its ability to protect against a wide range of attack. The effectiveness of a block cipher algorithm often depends o...
详细信息
This paper provides an explanation of NTRU, a post quantum encryption scheme, while also providing a gentle introduction to cryptography. NTRU is a very efficient lattice based cryptosystem that appears to be safe aga...
详细信息
The huge proliferation of mobile and handheld devices, such as tablets and Smartphone devices, has come with different threats to the sensitive data and personally identifiable information stored inside these devices....
详细信息
The huge proliferation of mobile and handheld devices, such as tablets and Smartphone devices, has come with different threats to the sensitive data and personally identifiable information stored inside these devices. The most efficient way to ensure data protection is through encryption;however, it comes with great impact on these small gadgets, which suffer from limited resources. Majority of recent mobile devices are equipped with increasingly powerful multi-core processors that researchers can leverage in order to enhance data protection while maintaining proper device performance. In this paper, we introduce a parallel implementation for data encryption inside the storage of Android-based mobile devices. This work implements a multi-core design of different encryption ciphers, making use of the commodity multi-core CPUs available currently in new smart gadget devices, in order to enhance the performance inside these resource-limited devices. Ciphers XTS-AES, XTS-Twofish, and XTS-RC6 are used during the experiments;however, the main focus is given to XTS-AES because it is developed specifically for storage encryption. Parallel encryption experiments are conducted on a mobile device, and performance comparisons are presented. The parallel XTS-AES has shown a maximum performance speedup of 1.71, with 86% efficiency, faster than the serial counterpart, with higher encryption throughput in the device up to 8290 and 11380KB/s when using XTS-AES and XTS-RC6 ciphers, respectively. In addition, we performed comparison between mobile device and desktop machine using similar experimental setup. It shows that the performance of storage encryption in mobile devices still lags by more than 10 folds when compared with desktop environment. (C) 2017 John Wiley & Sons, Ltd.
Two new encryption algorithms for secure video transmission are proposed in this paper. The two algorithms employ different types of chaotic maps to generate the keystream for encrypting the video frames. Both algorit...
详细信息
Two new encryption algorithms for secure video transmission are proposed in this paper. The two algorithms employ different types of chaotic maps to generate the keystream for encrypting the video frames. Both algorithms involve a substitution step and a permutation step to achieve confusion and diffusion requirements. For efficient transmission, the video file is compressed before being encrypted. In the basic implementation of both algorithms, MPEG-2 standard is used for compression. However, the algorithms are shown to be compliant with other compression techniques. In the permutation step, the effect of the block size used in the shuffling process is examined. Smaller blocks result in increasing the processing time, while reducing both the correlation between adjacent pixels and the peak-signal-to noise ratio of an encrypted frame. The use of a Feistel structure is investigated to enhance security and its negative impact on the encryption time is demonstrated. The experimental results of the two proposed schemes confirm that they represent different tradeoffs between security and computational efficiency. Both schemes are sensitive to slight variations in the encryption key as apparent from the obtained differential measures. The conducted comparative study shows the competitiveness of the proposed schemes to existing schemes in literature.
Mobile devices have been increased exceptionally in recent years, consequently data generation has also been raised exceptionally. Most of the data generated by mobile devices is transferred to servers for processing ...
详细信息
Mobile devices have been increased exceptionally in recent years, consequently data generation has also been raised exceptionally. Most of the data generated by mobile devices is transferred to servers for processing and storage. Managing security of mobile data is a necessary feature of every network and mostly encryption is used to avoid security breaches. The major challenge is that, mobile devices are very small with shortage of resources, on the other hand encryption of data requires extra energy. It is necessary to minimize energy requirements for encryption of data. For this experimental research, an android based application is developed, which optimize energy requirements for both single and double encryption techniques. AES and Blowfish encryption algorithms are used with different files sizes to test the energy requirements for single encryption, it is also examined that energy consumed by Blowfish is 119.311% more than AES. For double encryption methods, AES-Blowfish, Blowfish-AES and XTS-AES combinations of algorithms are used and energy usage is gathered. In double encryption XTS-AES consumed 13.26% less power consumption as compared to AES-Blowfish and 44.97% less then Blowfish-AES combination methods. Results of experiments revealed that AES is more energy efficient for single encryption and for double encryption XTS-AES combination requires less energy.
暂无评论