Steganography is a method of transmitting a secret message from a sender to a recipient in such a way that a potential intruder is unaware of its presence. The basic goal of image steganography is to make the message ...
详细信息
ISBN:
(纸本)9780738146379
Steganography is a method of transmitting a secret message from a sender to a recipient in such a way that a potential intruder is unaware of its presence. The basic goal of image steganography is to make the message invisible to the viewers' sight, removing any suspicion of a hidden message. Whereas cryptography's goal is to convert readable data into unreadable data, this is done to make decryption more difficult rather than invisible. We present information on security enhanced image steganography in this paper. To improve security, the message is encrypted into cipher text and vice versa using the cryptographic technique rsa in its asymmetric version. The sender will encrypt the message with a key, embed the cipher text in an image, and send this image object along with the key to the receiver via any transmission medium, such as the internet, so that the receiver can extract the cipher text from the image and decrypt using the key that the sender has sent. The result was satisfactory and fulfilled the purpose but was limited to grayscale images only.
Optical image encryption is one of the most promising technologies being investigated in the field of data communication, information technology and cloud computing. In this paper, a novel image encryption system base...
详细信息
ISBN:
(纸本)9781538609330
Optical image encryption is one of the most promising technologies being investigated in the field of data communication, information technology and cloud computing. In this paper, a novel image encryption system based on virtual optical technique, phase shifted digital holography and rsa public key exchange is proposed. In the system, the encryption keys include the wavelength of the laser beam, focal length of the test lens, defocusing distance and scaling factor. The plain text image is encrypted to a cipher by using a phase shifted hologram function. The decryption process involves the phase calculation using phase shifting and sequential line scan algorithms. The keys are exchanged between sender and receiver by using rsa key exchange algorithm. To determine accuracy of the information retrieved by the proposed technique;the mean square error is calculated between the original image and retrieved image.
Considering the security of message exchange between service robot and cloud, we propose to authenticate the message integrity based on rsa algorithm and digital signature. In the process of message transmission, rsa ...
详细信息
ISBN:
(纸本)9781728124858
Considering the security of message exchange between service robot and cloud, we propose to authenticate the message integrity based on rsa algorithm and digital signature. In the process of message transmission, rsa algorithm is used to encrypt message for service robot and decrypt message for cloud. The digital signature algorithm is used to authenticate the source of the message. The results of experiment have proved that the proposed scheme can guarantee the security of message transmission.
Nowadays Mobile Ad Hoc Networks has become a popular research subject due to its characteristics. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices. With this problem there are m...
详细信息
ISBN:
(纸本)9781509047994
Nowadays Mobile Ad Hoc Networks has become a popular research subject due to its characteristics. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices. With this problem there are many chances that the intruders may attack the nodes over the function. Using Intrusion Detection Techniques we can find the intruders before it may attack the nodes. Intrusion Detection System (IDS) is considered as the first line of defence for security in MANET. In this paper we discuss intrusion detection system using public rsa algorithm.
In this paper, a novel ASIC implementation of rsa algorithm is presented, By utilizing Yang's modified Montgomery algorithm, the over-large residue problem is eliminated. The multiplication and Montgomery modular ...
详细信息
ISBN:
(纸本)078037889X
In this paper, a novel ASIC implementation of rsa algorithm is presented, By utilizing Yang's modified Montgomery algorithm, the over-large residue problem is eliminated. The multiplication and Montgomery modular reduction in modular multiplication are handled identically to minimize hardware cost. Microprogrammed control makes the architecture very flexible to support variable key lengths. These features make the chip very suitable for smart card applications. A rsa coprocessor based on the new architecture has been fabricated with 0.5 mu m CMOS cell library. The coprocessor has 14 K gate counts and 3 mm(2) die size with a maximum clock frequency of 40 MHz, which takes about 325 ms to encrypt/decrypt 1024-bit data.
This article deals with the rsa encryption algorithm. Its safety is analyzed using the number field sieve method The algorithm work results allow to define a define a secret key in a simple way.
ISBN:
(纸本)0780381386
This article deals with the rsa encryption algorithm. Its safety is analyzed using the number field sieve method The algorithm work results allow to define a define a secret key in a simple way.
The software realization of rsa public key encryption algorithm using CryptoAPI on .NET platform has been analyzed. The processing performance of the software implementation has been tested. The present paper shows, t...
详细信息
ISBN:
(纸本)9789665335870
The software realization of rsa public key encryption algorithm using CryptoAPI on .NET platform has been analyzed. The processing performance of the software implementation has been tested. The present paper shows, that the encryption rate is 306.4 +/- 0.6 kbytes/sec, while the coefficient of encryption time increasing with file size increasing is 3.299. It is concluded that the development environment is a flexible architecture independent tool and meets all the requirements to the secure implementation of cryptographic software.
The paper describes MS EXCEL-based application implementing the processes of encryption and decryption of texts in English and/or Bulgarian using the rsa algorithm. The processes of encryption and decryption are illus...
详细信息
ISBN:
(纸本)9781509028832
The paper describes MS EXCEL-based application implementing the processes of encryption and decryption of texts in English and/or Bulgarian using the rsa algorithm. The processes of encryption and decryption are illustrated. The material is used in the educational process in the course "Telecommunication Security" but it can be applied in other disciplines involving issues of cryptographic information protection.
The model of the internet of things (IoT) based single-phase grid-connected inverter using rsa (Rivest-Shamir-Adleman) algorithm is presented here. The inverter is developed by H-bridge architecture and sinusoidal pul...
详细信息
ISBN:
(纸本)9781665434515
The model of the internet of things (IoT) based single-phase grid-connected inverter using rsa (Rivest-Shamir-Adleman) algorithm is presented here. The inverter is developed by H-bridge architecture and sinusoidal pulse width modulation technology (SPWM). The grid connectivity of this inverter is built by the phase control technique. The inverter has fewer harmonics and a simplistic structure than conventional available technologies. Because this IoT-enabled inverter is continually connected to the network, cybersecurity concerns and obstacles are developing. The paper explores how the rsa method could be used to assure the IoT-enabled inverter's connectivity and data security. The inverter simulation is performed in MATLAB / SIMULINK to validate the final output, and the rsa technique is performed in Python.
In this work, possible optimization techniques of the rsa algorithm realization on assembler of Texas Instruments TMS320C54x family of signal processors are considered. Obtained results justify the use of the proposed...
详细信息
ISBN:
(纸本)078037228X
In this work, possible optimization techniques of the rsa algorithm realization on assembler of Texas Instruments TMS320C54x family of signal processors are considered. Obtained results justify the use of the proposed optimization methods and also show that the TMS32OC54x family of signal processors is suitable for rsa algorithm realization. Therefore, they are proposed for realization of some coprocessor module in computer networks with "client-server" architecture requiring some public-key cryptographic applications.
暂无评论