The abstract Data security is of most importance, in the present day- the introduction of high-level wireless communication channels has led to generation and transfer of massive amounts of data. Data security must ke...
详细信息
Vigenère encryption algorithm is a classical cryptographic algorithm featuring a polyalphabetic stream cipher, which as numerous limitations pertaining to finding the size and length of the encryption key. This s...
详细信息
The exponential growth of Internet of Things (IoT) devices has brought about significant security challenges, particularly due to their limited computational resources and deployment in critical applications such as s...
详细信息
ISBN:
(纸本)9798331532420
The exponential growth of Internet of Things (IoT) devices has brought about significant security challenges, particularly due to their limited computational resources and deployment in critical applications such as smart cities, healthcare, and industrial automation. Traditional encryption methods, like AES, are often too resource-intensive for IoT devices, creating a pressing need for lightweight cryptographic solutions that effectively balance security and efficiency. The Tiny encryption Algorithm (TEA) has gained wide adoption for its simplicity and minimal resource requirements, making it a suitable choice for constrained IoT environments. However, TEA’s fixed key scheduling mechanism leaves it vulnerable to cryptanalytic attacks, especially known-plaintext attacks. To address these vulnerabilities, this project introduces an enhanced version of TEA that incorporates a dynamic round key scheduling mechanism, improving its resilience against evolving security threats while preserving its lightweight characteristics. The enhanced TEA algorithm was rigorously evaluated against the original TEA in terms of speed, security effectiveness, and resource efficiency. The results demonstrate significant improvements in adaptability and robustness. Specifically, the enhanced TEA algorithm achieved a markedly stronger avalanche effect of 57.88%, compared to the original TEA’s 49%, highlighting its superior sensitivity to small changes in input. It also exhibited stronger resistance to differential cryptanalysis due to a more complex relationship between plaintext and ciphertext. Additionally, the entropy of the enhanced TEA was measured at 7.6265 bits per byte compared to 6.4380 bits per byte for Original TEA, reflecting a high level of randomness and unpredictability in its cipher text. In terms of overall security and performance, the enhanced TEA algorithm outperformed the original TEA. By offering a secure and efficient encryption solution tailored to the specific limit
With recent advancements in cloud services, the demand for data security during outsourced computations has been increasing. Fully Homomorphic encryption (FHE) offers a promising solution to this demand by enabling th...
详细信息
Data security and data privacy are two hot topics in the research world because they cause big damage and are against PDPA laws. Hacker always uses a sophisticated way to hack into the official database. The purpose o...
详细信息
In an attempt to reduce encryption time, we would want to compare the Chipper text-policy-attribute based encryption method with a new lightweight cryptography strategy for secure cloud data sharing. Tools and Methods...
详细信息
Recently, data-dependent permutations (DDP) that are very suitable for intelligent multimedia and ubiquitous computing systems have been introduced as a new cryptographic primitive for the design of fast encryption sy...
详细信息
Recently, data-dependent permutations (DDP) that are very suitable for intelligent multimedia and ubiquitous computing systems have been introduced as a new cryptographic primitive for the design of fast encryption systems. The CIKS-128 and CIKS-128H block ciphers are the typical examples of DDP-based encryption algorithms. In this paper. we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2(44), and 2(48) data/time complexities, respectively.
Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security issues, many advanced cryptographic algorithms have been proposed in the...
详细信息
Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security issues, many advanced cryptographic algorithms have been proposed in the literature. The efficiency of these encryption algorithms varies according to the application area in which they are deployed. Although there are many objective evaluation metrics available in the literature to measure the performance of the cryptographic algorithms, however, to the best of our knowledge, no survey or review addresses the quality of the metrics for cryptography algorithms. In this paper, we have presented and analyzed the cryptography algorithms and performance evaluation metrics such as resource utilization measure, quality measure, and security measures to evaluate the security performance of different encryption algorithms for multimedia data. Extensive experiments have been carried out to evaluate the performance of the cryptography algorithms for multimedia data such as images and videos. We have also discussed and analyzed in detail the performance of evaluation measures used to validate the cryptography algorithms. Our findings highlight the strength of different cryptography algorithms and performance evaluation metrics. The analysis is expected to contribute to the design of a new and efficient model for multimedia applications. A detailed analysis of major attacks was also presented for each encryption scheme in tabular form.
Coronavirus disease (COVID 19) is the dangerous pandemic that scares the world from November 2019 affects more than 50% of the world population. Internet of things (IoT) is coming as a survivor to manage the pandemic ...
详细信息
Coronavirus disease (COVID 19) is the dangerous pandemic that scares the world from November 2019 affects more than 50% of the world population. Internet of things (IoT) is coming as a survivor to manage the pandemic situation because of its controlling and monitoring capability without human intervention. In this paper, Secure IoT integrated with wireless sensor network (WSN) for COVID 19 is implemented to monitor the infected patient's health condition. The sensor node's monitored data are encrypted using the different existing encryption algorithms to secure the health care data. Triad parallel advanced encryption standard (AES) algorithmis novel encryption algorithm proposed to encrypt the data in the internet server that improves the security of the stored data and the parallel processing reduces the execution time of the algorithm in insignificant amount. In this proposed work, the performance evaluation of the network in different encryption algorithms are carried out.
Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good...
详细信息
Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good (such as solving large resource allocation problems or finding improvised explosive devices) or for evil (to allow criminals to gain unauthorized access to a system or break encryption algorithms). Surreptitious processing networks differ from botnets in that no rouge processing elements are present on the user side; instead, the computational payload is outsourced to humans who unknowingly provide partial solutions as they play the game. This approach makes the solution of large computational problems and the recruitment and exploitation of participants easy. This department is part of a special issue on social networking.
暂无评论