As quantum computing technology advances, our traditional methods of securing information are becoming vulnerable to new types of attacks. To counter these threats, Quantum Key Distribution (QKD) methods like the BB84...
详细信息
When it comes to delivering IT services to businesses or consumers, the cloud provides a scalable, reliable, and cost-effective option. However, there is an increased risk associated with cloud computing due to the fa...
详细信息
ISBN:
(纸本)9798350305708
When it comes to delivering IT services to businesses or consumers, the cloud provides a scalable, reliable, and cost-effective option. However, there is an increased risk associated with cloud computing due to the fact that critical operations frequently go to another organization, making it more difficult to preserve privacy and security of data, sustain data and availability, and prove compliance. It is a difficult issue in cloud computing to ensure the security of outsourced data. Data integrity should be verified by the client or an external auditor before being outsourced. Many methods using various techniques, including Proof of Retrievability, proved data ownership, privacy preservation, etc., have been developed for this goal. Various security strategies to address the current security vulnerabilities have been offered in the literature by researchers and impacted companies. Security and privacy concerns in cloud computing are also well reviewed in the literature. Unfortunately, the literature presented works lack the adaptability to counter diverse attacks without undermining cloud security goals. As a corollary, the literature has highlighted security and privacy vulnerabilities without giving suitable technological techniques to alleviate both security and privacy risks. However, studies that provide technological responses to security issues have not provided enough reasoning for the existence of these dangers. The purpose of this article is to discuss potential cloud security and privacy challenges that might arise and need a flexible approach to finding a workable solution. This study provides a comprehensive review of the relevant literature, discussing how safe cloud conflicts have made the suggested models from prior works obsolete while also taking into consideration the works' adaptability to handle future threats. The STRIDE methodology is then used to convey, from the user's point of view, the security concerns associated with cloud computing.
In the digital age, securing data and ensuring communication confidentiality are paramount, highlighting the crucial role of public key cryptography. Traditional algorithms like RSA, while secure, have limitations due...
详细信息
In order to improve the security and privacy of data sharing, this project intends to study a data sharing security algorithm based on blockchain in a cross-cloud computing environment. The security algorithm that int...
详细信息
The low level regulation of cryptocurrency market as well as crucial role of trust and digital market specificity makes it a good environment for anonymous transactions without identity verification, therefore fraudul...
详细信息
Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to ensure security increases. This is a potential problem for the Department of Defense, which requires smar...
详细信息
Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to ensure security increases. This is a potential problem for the Department of Defense, which requires smart card usage for its employees. This paper defines, compares, and contrasts two algorithms: Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC), and then provides test data for encryption algorithms tested on particular certification key processes in an attempt to show that the ECC encryption algorithm provides the security necessary for smart card operations at a fast enough speed to benefit smart card users. It describes the Open Protocol for Access Control Identification and Ticketing with privacY (OPACITY) pilot project that took place over 2014 in relation to the card testing, and hypothesizes the risks and mitigation factors for the Department of Defense to permanently switch to the ECC algorithm for smart card use.
Tato práce se zabývá návrhem a implementací šifrovacích algoritmů AES a DES pro vestavěné systémy. Architektury jsou implementovány v jazyce VHDL a navrženy pro umíst...
详细信息
Tato práce se zabývá návrhem a implementací šifrovacích algoritmů AES a DES pro vestavěné systémy. Architektury jsou implementovány v jazyce VHDL a navrženy pro umístění do programovatelných logických polí FPGA. Výsledná řešení jsou určena pro obvody Xilinx Spartan 3. Obě architektury pracují v režimu ECB (Electronic Codebook) s použitím vyrovnávacích pamětí. Maximální propustnost navržené architektury DES je 370 Mb/s při pracovní frekvenci 104 MHz. Pro šifrování algoritmem AES je propustnost na maximální frekvenci 118 MHz až 228 Mb/s. Při porovnání se softwarovými implementacemi, určenými pro vestavěné systémy, dosáhly obě architektury podstatně vyšších propustností.
The BlockChain (BC) is considered as one of the most exciting developments in information and communication technology in the past decade and is widely known as a crypto intensive phenomenon. Achieving an efficient so...
详细信息
The BlockChain (BC) is considered as one of the most exciting developments in information and communication technology in the past decade and is widely known as a crypto intensive phenomenon. Achieving an efficient solution (e.g., decentralization, immutability, security, and transparency) using BC requires a considerable range of factors, such as: scalability, security, and privacy, which have a profound role in determining an overall solution's performance. Meanwhile, digital auctioning is one of the cornerstones of the modem Internet economy. Many of the existing auctions are open-bid auction systems where all bids are made open to either party. E-auctions rely on human resources, and often require the services of a third-party intermediary, which leads to a high cost in terms of money and time, and there is no guarantee that the third party is trustworthy. Moreover, BC's efficiency is a big challenge for large databases, particularly when the bidding system encompasses multiple options with geographically dispersed users. To address these issues, this paper proposes a BC-based framework for an open-bid auction system, for which privacy and security constraints are considered with different cryptographic primitives. The novelty of this framework derives from an enhanced approach for integrating BC structures by replacing the original chain structure with a tree structure. Throughout the online world, user privacy is a primary concern, because the electronic environment enables the collection of personal data. Hence this paper proposes a suitable cryptographic protocol for an open-bid auction atop BC. Here, the primary aim is to achieve security and privacy with greater efficiency, which largely depends on the effectiveness of the encryption algorithms used by BC. Essentially this paper considers Elliptic Curve Cryptography (ECC) and a dynamic cryptographic accumulator encryption algorithm to enhance security between auctioneer and bidder. The proposed e-bidding s
For many block encryption algorithms, confusion properties are only related to the substitution box (S-box). The S-box is a crucial component of cryptography. The security of the whole system is affected by the Sbox. ...
详细信息
For many block encryption algorithms, confusion properties are only related to the substitution box (S-box). The S-box is a crucial component of cryptography. The security of the whole system is affected by the Sbox. Consequently, alternative S-box designs and construction methods have been explored in various studies. In this paper, based on the chaotic Rabinovich-Fabrikant fractional order (FO) system, a new method for constructing a strong initial S-box is proposed. To comply with the objective, the numerical results of the FO chaotic Rabinovich-Fabrikant system are provided by using the four-step Runge Kutta method/Adams-Bashforth-Moulton method for a= 0.87,b= 1.1, and alpha= 0.99. A novel key-based permutation technique is also presented to enhance the functionality of the initial S-box and construct the final S-box. A comparison is made between the performance of the substitution boxes (S-boxes) proposed and that of some other existing chaotic S-box designs. It is perceived that the S-boxes obtained by our proposed methods are stronger. The results of the analysis of the initial and final S-box yield favorable statistics, which make sure of its importance in the use of secure communications. Furthermore, the proposed final S-box's effectiveness in image encryption applications is evaluated through the majority logic criterion (MLC), resulting in exceptional outcomes.
S rychlostí jakou se vyvíjejí technologie je potenciální hrozbou vývoj kvantových počítačů, které mají ohrozit veškerou dnešní bezpečnou komunikaci a je potřeba h...
详细信息
S rychlostí jakou se vyvíjejí technologie je potenciální hrozbou vývoj kvantových počítačů, které mají ohrozit veškerou dnešní bezpečnou komunikaci a je potřeba hledat způsoby jak této hrozbě čelit. Tato práce se zabývá rozborem kryptografických schémat odolných vůči dnešním známým kvantovým útokům jako je například Shorův algoritmus. Dále práce obsahuje měření a vyhodnocení rychlosti a paměťové náročnosti. Na základě měření pak vybírá vhodné postkvantové schéma pro implementaci na čipovou kartu, na které poté tuto implementaci realizuje.
暂无评论