In this article, we do the cryptanalysis of the Enhanced and Secured rsa Key Generation Scheme (ESRKGS) given in Thangavel et al. (2015). The authors claimed that ESRKGS is a highly secure and not easily breakable sch...
详细信息
In this article, we do the cryptanalysis of the Enhanced and Secured rsa Key Generation Scheme (ESRKGS) given in Thangavel et al. (2015). The authors claimed that ESRKGS is a highly secure and not easily breakable scheme compared to the traditional rsa scheme. In their scheme, the public key n is a product of two large prime numbers, but the values of Encryption E and Decryption D keys are based on the product of four large prime numbers, N, which is a multiple of n. They claimed that even if someone factorizes n, in order to obtain the private key D, brute force must be used to obtain the other two primes. We prove that we can use an alternative private key D-1 to break the system. Someone does not need to employ brute force to break the system when n is factored. Hence, ESRKGS has the same security level as the traditional rsa. (C) 2016 Elsevier Ltd. All rights reserved.
Secure communication and authentication are two very important factors when it comes to applications such as payments. Since payments involve critical information such as user account number, pin, balance, etc., it be...
详细信息
ISBN:
(纸本)9781509014897
Secure communication and authentication are two very important factors when it comes to applications such as payments. Since payments involve critical information such as user account number, pin, balance, etc., it becomes very vulnerable to fraudulent elements that want to gain access to this information illegally. Thus, this hardware and algorithm aims at creating a mobile payment terminal through which transactions can be carried out securely using the Transport Layer Security (TLS) protocol through a Raspberry Pi module.
Voting is a process that should be do in terms of leadership. In case, voting still use conventional methods which are less effective in terms of cost, governance, and working time. The possibility of calculation erro...
详细信息
ISBN:
(纸本)9781509015672
Voting is a process that should be do in terms of leadership. In case, voting still use conventional methods which are less effective in terms of cost, governance, and working time. The possibility of calculation errors and fraud in the calculation process can also occur. STMIK Atma Luhur still using the conventional voting method in the election of the chairman of BEM. With the development of today's technology, we can make electronic voting system based on Android to solve the problems of conventional voting. E-voting security becomes fundamental things that must be considered. rsa cryptographic methods can be a solution to ensure the security. rsa choses because it has the advantage of difficulty level in factoring numbers into prime numbers. More difficult factoring the numbers, it will be more difficult to break the encryption. Another advantage is the form of higher security than symmetric algorithm. This algorithm is also resistant to various forms of attack, such as brute force. The security testing are using Wireshark and Eclipse LogCat. The result is the establishment of an e-voting system based on Android that is safe and confidential, so the students can do the voting quickly, whenever and wherever.
Today we are enjoying the benefits of technology, particularly in the field of communication, in the form of anywhere and anytime communication. One of the causes for this achievement is building global computer netwo...
详细信息
ISBN:
(纸本)9781509006120
Today we are enjoying the benefits of technology, particularly in the field of communication, in the form of anywhere and anytime communication. One of the causes for this achievement is building global computer networks. The technological growth in the field of wireless technologies provides communication between mobile users. Any invention is to say success, only if it is useful in a meaningful manner. Wireless technology is the one that will help an emergency needy like in any natural disaster, emergency rescue operations, military battle-field etc. With the advent of Mobile Ad-Hoc Networks, an immediate self-configuring network can be created. Being an open network, security is the main concern for MANETs. In such situations to protect the confidentiality of the message to be transmitted, cryptography is the one of the solution. The process of converting the original data into a secret form is known as cryptography. It hides the actual information and sends the encrypted message. At the destination end, the message can be recovered by using decryption. Here we are proposing a new encryption technique named as Letter-Shape Encryption. This method exchanges different shapes for letters in a message to be transmitted. This approach is safe against man in middle attacks.
In the global networked world, there is a phenomenal growth in data transfer and sharing. Security plays a vital role in transmitting the private data over the communication medium which tends to be open and insecure....
详细信息
ISBN:
(纸本)9781509012770
In the global networked world, there is a phenomenal growth in data transfer and sharing. Security plays a vital role in transmitting the private data over the communication medium which tends to be open and insecure. The threat posed by an intruder in accessing the "not to be disclosed data" has been a genuine apprehension for the communication specialists. In this paper we propose a new approach for security enhancement. Before the encryption process the data to be transferred is rearranged which results in a modified data. The modified data is given as input for the encryption algorithm. For experimental purpose we use rsa algorithm for encryption and decryption.
Visual cryptography is proposed in 1994 by Naor and Shamir who introduced a simple but perfectly secure way that allows secret sharing without any complex cryptographic computation, which they termed as Visual Cryptog...
详细信息
ISBN:
(纸本)9781509032471
Visual cryptography is proposed in 1994 by Naor and Shamir who introduced a simple but perfectly secure way that allows secret sharing without any complex cryptographic computation, which they termed as Visual Cryptography Scheme. This proposal shows a new visual cryptography for color image by proposing special table for both IP and IP-1 in a way to increase the diffusion then putting the plain image into blocks each block represent share after applying encryption algorithm on it, The outcome of these operations nine shares, some of blocks encrypted by using rsa algorithm so other blocks encrypted by AlGamal algorithm, producing multiple shares in order to increase security for image during transferring it over the network. This proposed system can be used in medical imaging, financial and military fields
The increasing usage and dependency on Internet has made security of data a priority and a reason of concern. Data on cloud contains all kinds of personal and professional information, and cloud communication opens th...
详细信息
ISBN:
(纸本)9781467369848
The increasing usage and dependency on Internet has made security of data a priority and a reason of concern. Data on cloud contains all kinds of personal and professional information, and cloud communication opens the doors to interceptions wherein secret information can be extracted by undesirable people with an intention of malicious usage to any extent. Hence certain measures can be taken in order to ensure the security of data on cloud, so that communications cannot be intercepted and if they are then it is difficult to crack the code. Steganography and encryption combined enhance cloud security by providing dual layer protection to the data, as steganography aims at hiding the existence of the data itself and encryption prevents the correct interpretation of the data. We have taken into consideration rsa algorithm for encryption and image steganography for data hiding using LSB technique.
Visual cryptography is proposed in 1994 by Naor and Shamir who introduced a simple but perfectly secure way that allows secret sharing without any complex cryptographic computation, which they termed as Visual Cryptog...
详细信息
ISBN:
(纸本)9781509032488
Visual cryptography is proposed in 1994 by Naor and Shamir who introduced a simple but perfectly secure way that allows secret sharing without any complex cryptographic computation, which they termed as Visual Cryptography Scheme. This proposal shows a new visual cryptography for color image by proposing special table for both IP and IP~(-1) in a way to increase the diffusion then putting the plain image into blocks each block represent share after applying encryption algorithm on it, The outcome of these operations nine shares, some of blocks encrypted by using rsa algorithm so other blocks encrypted by AlGamal algorithm, producing multiple shares in order to increase security for image during transferring it over the network. This proposed system can be used in medical imaging, financial and military fields.
Public-key cryptography can be claimed as the greatest and an excellent revolution in the field of cryptography. A public-key cryptosystem is used for both confidentiality and authentication. One such public-key crypt...
详细信息
Public-key cryptography can be claimed as the greatest and an excellent revolution in the field of cryptography. A public-key cryptosystem is used for both confidentiality and authentication. One such public-key cryptosystem is the rsa cryptosystem. In this paper, a modified and an enhanced scheme based on rsa public-key cryptosystem is developed. The proposed algorithm makes use of four large prime numbers which increases the complexity of the system as compared to traditional rsa algorithm which is based on only two large prime numbers. In the proposed Enhanced and Secured rsa Key Generation Scheme (ESRKGS), the public component n is the product of two large prime numbers but the values of Encryption (E) and Decryption (D) keys are based on the product of four large prime numbers (N) making the system highly secured. With the existing factorization techniques, it is possible only to find the primes p and q. The knowledge of n alone is not sufficient to find E and D as they are based on N. The time required for cryptanalysis of ESRKGS is higher than traditional rsa cryptosystem. Thus the system is highly secure and not easily breakable. A comparison is done between the traditional rsa scheme, a recent rsa modified scheme and our scheme to show that the proposed technique is efficient. (C) 2014 Elsevier Ltd. All rights reserved.
暂无评论