Cryptography incorporates application and scientific examination of methodologies aimed at facilitating secure communication in the face of potentially threatening behavior. In a broader sense, cryptography refers to ...
详细信息
ISBN:
(纸本)9789819780501;9789819780518
Cryptography incorporates application and scientific examination of methodologies aimed at facilitating secure communication in the face of potentially threatening behavior. In a broader sense, cryptography refers to the development and examination of protocols with the goal of safeguarding private communications from unauthorized access by third parties. Modern cryptography is situated within a diverse range of academic disciplines, encompassing mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and other related topics. In this paper, we use the rsa algorithm along with the Moore-Penrose inverse of a matrix to establish an encryption method for the secure delivery of confidential messages.
This paper proposes a visually secure asymmetric image encryption scheme based on Rivest-Shamir-Adlemen (rsa) algorithm and hyperchaotic map. It combines the advantages of the rsa and chaos-based image encryption algo...
详细信息
This paper proposes a visually secure asymmetric image encryption scheme based on Rivest-Shamir-Adlemen (rsa) algorithm and hyperchaotic map. It combines the advantages of the rsa and chaos-based image encryption algorithms. First, to fully encrypt the image information, the plain image is encrypted into a cipher image by applying the row and column encryption algorithms. Second, the image secret key is converted into a ciphertext by utilizing the rsa algorithm to increase the security, and then the ciphertext is transformed into an image and permuted using the Arnold map to enhance the robustness of the embedded image. We then obtain the key cipher image. Finally, the cipher image and the key cipher image are embedded into a carrier image (CI) to obtain a visually secure image. It simultaneously achieves the image information security and image visually security. To further improve the security, the rsa keys management technique is applied and the initial conditions of the hyperchaotic map are updated in real time based on the plain image. In addition, the encryption scheme is suitable for multi-user image transmission with high security requirements and image transmission without the secure channel for key transmission. The simulation results and performance analysis validate the effectiveness, security and robustness of the proposed scheme.
High-speed, area-efficient, and low-power Montgomery modular multipliers for rsa algorithm have been developed for digital signature and user authentication in high-speed network systems and smart card LSIs. The multi...
详细信息
High-speed, area-efficient, and low-power Montgomery modular multipliers for rsa algorithm have been developed for digital signature and user authentication in high-speed network systems and smart card LSIs. The multiplier-accumulators (MAC) in the developed Montgomery modular multipliers have a non-identical multiplicand/multiplier word length organization. This organization can eliminate the bandwidth bottleneck associated with a data memory, and enables to use a single-port memory for area and power reductions. The developed MAC is faster than the conventional identical word length organization due to the shortened critical path. For smart card applications, an area-efficient architecture with 42 kgates can produce 1.2 digital signatures in a second for 2,048-bit key length with the power consumption of 6.8 mW.
With the implementation of the human genome project, computational intelligence has been widely used in computational biology and bioinformatics. The purpose of this study is to study the feature selection technique o...
详细信息
With the implementation of the human genome project, computational intelligence has been widely used in computational biology and bioinformatics. The purpose of this study is to study the feature selection technique of gene chip in bioinformatics. In this paper, a binary key scanning method is used to decompose the model power algorithm into a series of modular multiplication operations. At the same time, the combination of genetic algorithm and rsa algorithm is used to select the feature of high dimensional space. The problem of sample classification of two categories is solved. The method is used for the design of the sequencing chip and gene expression chip. The final research shows that the rsa algorithm is applied to the technology of gene chip selection, and a high-density gene chip design software system and experimental result analysis system can be developed.
Information security and confidentiality are burning issues in today's digitally connected world. Encryption is considered a fast-moving trend in this reference. Although we see rigorous enhancements in the develo...
详细信息
Information security and confidentiality are burning issues in today's digitally connected world. Encryption is considered a fast-moving trend in this reference. Although we see rigorous enhancements in the development of information security tools, storage and retrieval, enormous challenges still occur due to unsecured transmission channels, hacking tools and the ubiquity of the Internet. This paper proposes a new cryptography mechanism for secure data transmission and retrieval using a signed graph, its adjacency matrix and the rsa algorithm.
Most of the image encryption algorithms are the private-key cryptosystem, in which the encryption process and the decryption process employ the same keys. To enhance the security of image encryption system, an optical...
详细信息
Most of the image encryption algorithms are the private-key cryptosystem, in which the encryption process and the decryption process employ the same keys. To enhance the security of image encryption system, an optical image compression and encryption scheme based on compressive sensing and rsa public-key cryptographic algorithm is proposed, where the optical compressive imaging system is utilized to sample the original image. In the encryption process, the Walsh-Hadamard transform and a measurement matrix are adopted to simulate the optical compressive imaging system to measure the original image, which can effectively reduce the redundant information in the original image. Then the pixel positions of the resulting image are scrambled with pseudorandom sequence generated by one-dimensional (1D) cascade chaotic system. Furthermore, deoxyribonucleic acid (DNA) sequence operations are exploited to change the pixel values. The keys used in the scheme are generated based on the original image and are protected by the rsa algorithm. Experimental results demonstrate the effectiveness and reliability of the proposed optical image compression and encryption scheme with considerable compression and security performance.
The great advances in digital data communication have led to high desire for a secured and reliable transmission. Advances in satellite communication like packet radio technology and the development of high speed LAN&...
详细信息
The great advances in digital data communication have led to high desire for a secured and reliable transmission. Advances in satellite communication like packet radio technology and the development of high speed LAN's have created demand for secured applications. Security measures are needed to protect data during transmission. Previous work has characterized reliable cryptosystem for applications like interactive communication, multimedia and data transfer. In this paper, a modified technique for reliable image encryption method using Merkle-Hellman cryptosystem and rsa algorithm is being proposed. By performing block rotation based upon the certain angles achieves better diffusion, which further enhances the security of cipher.
In this paper, we have proposed and implemented a hardware-based security system, which executes rsa-based cryptography operations by using the PKCS#11 standard. It was implemented in C, VHDL and FPGAs and it is modul...
详细信息
In this paper, we have proposed and implemented a hardware-based security system, which executes rsa-based cryptography operations by using the PKCS#11 standard. It was implemented in C, VHDL and FPGAs and it is modular and easily adaptable to the future upgrades for the communication among machines and devices. Any cryptography algorithm can be used;however, in our project we only used the rsa as a case study. We did simulations and real tests that allowed verifying the correct behavior and execution of our project;we used the rsa with keys up to 512 bits. Real tests showed the transmission of ciphered data between our project (PKCS#11 and rsa) and a PC by using serial communication.
In the present paper we will show a system to realize an innovative cryptographic code that ensures a high level of security using Information Fusion (IF) techniques. In detail, we have decided to merge two codes resp...
详细信息
In the present paper we will show a system to realize an innovative cryptographic code that ensures a high level of security using Information Fusion (IF) techniques. In detail, we have decided to merge two codes respectively generated by an algorithm of Cryptographic Public-key and by fractals relations. A companion IF method has been presented with a different use in [1]. Indeed, in the previous paper it was created an identification access key, while here we wish to generate a highly randomized Cryptography key to be used for encrypting. The choice of using fractals to generate numbers to be fused with codes of Public-Key Cryptography, is due to the randomness of these structures. The idea is to use these features for cryptographic applications such as One-Time-Pad. The presented new modified fusion technique, with respect to [1], is called F&NIF (Fractal & Numerical Information Fusion).
An improved key expansion method is proposed to improve the security performance in AES key expansion. There is large difference of operation time between Mixcolumns and Inverse Mixcolumns, we propose the simplest for...
详细信息
ISBN:
(纸本)9783319638591;9783319638584
An improved key expansion method is proposed to improve the security performance in AES key expansion. There is large difference of operation time between Mixcolumns and Inverse Mixcolumns, we propose the simplest form of MixColumn and InvMixColumn operation on finite field GF(2(N)) which consumes same computing resources in the process of encryption and decryption. In terms of the defection of rsa operation efficiency, traditional double prime number is replaced by four prime number, Chinese remainder theorem combined with Montgomery modular multiplication is also presented to optimize modular exponentiation. On this basis, we adopt message digest, digital signature, digital envelope and other technologies to build a mixed encryption system which encompasses convenient key management and high-efficiency encryption and decryption, combined with the advantages of AES and rsa. The experimental results show that optimized algorithm has high speed and feasibility.
暂无评论