The strength of present day cryptosystem lies mainly in the key used for encryption. The problem to remember, protect and manage private key is a major issue in case of asymmetric ciphers. By using proven one way math...
详细信息
ISBN:
(纸本)9781479960422
The strength of present day cryptosystem lies mainly in the key used for encryption. The problem to remember, protect and manage private key is a major issue in case of asymmetric ciphers. By using proven one way mathematical functions, multiplication of two large primes and securehash function, we propose a robust and stable fingerprint key generation scheme. This scheme enables the generation of secure and cancelable cryptographic key with a very small FAR. The key can be used as private key for elliptic curve or NTRU based cryptosystems.
Now a day's data is transmitted between users through internet in the form of multimedia. The data transmission requires less time complexity as well as security of data, security is the big issue during transmiss...
详细信息
ISBN:
(纸本)9781509006694
Now a day's data is transmitted between users through internet in the form of multimedia. The data transmission requires less time complexity as well as security of data, security is the big issue during transmission of data. Data integrity is one of the major parameter to ensure the security. There are many algorithms or methods have been developed for maintain the integrity of data during transmission. Numbers of algorithms have been proposed to provide integrity but almost all of them proved to be breakable or less secure in terms of execution time and bit difference. So to increase the security a novel SHA is introduced, that possess less execution time and better bit difference value.
The blockchain system has emerged as one of the focal points of research in recent years, particularly in applications and services such as cryptocurrencies and smart contracts. In this context, the hash value serves ...
详细信息
Cloud computing has transformed data storage, processing, and access. However, as cloud-based services grow more popular, protecting sensitive data is crucial. Cryptographic algorithms provide strong encryption, safe ...
详细信息
Based on TMS320C5402 DSPs, this paper implemented and promoted four repres + entative encryption algorithms, including DES (data encryption standard) algorithm, SHA-1 (securehash standard algorithm), MD5 (message-dig...
详细信息
Based on TMS320C5402 DSPs, this paper implemented and promoted four repres + entative encryption algorithms, including DES (data encryption standard) algorithm, SHA-1 (securehash standard algorithm), MD5 (message-digest) algorithm and RSA public key algorithm. The main goal is to provide a general platform for decryption to meet the real-time requirement in certain occasions.
A block color image encryption algorithm based on chaotic system, elementary cellular automata (ECA), and deoxyribonucleic acid (DNA) sequence operations is proposed. The architecture is comprised of forward-diffusion...
详细信息
A block color image encryption algorithm based on chaotic system, elementary cellular automata (ECA), and deoxyribonucleic acid (DNA) sequence operations is proposed. The architecture is comprised of forward-diffusion, permutation, and backward-diffusion. First, the red, green, and blue components of a color image are converted into three DNA matrices by DNA encoding rule. Exclusive OR (XOR) operation is applied between the DNA coding chaotic sequence generated by the improved Henon map and three DNA matrices. Second, the large DNA matrix, composed of three DNA matrices, is divided into several small blocks with unequal sizes. ECA is employed to scramble the positions of these blocks. Finally, DNA com-putations are introduced to diffuse three permutated DNA matrices. In addition, initial values and system parameters of the chaotic system are calculated from the secure hash algorithm (SHA-256) hash value of the plain image and the given parameters. Both DNA encoding and ECA order rules rely on plaintext information. Therefore, the proposed algorithm is highly sensitive to plain image. Simulation results and security analyses demonstrate that our algorithm achieves excellent security performance and acceptable running time. (c) 2021 SPIE and IS&T [DOI: 10.1117/ ***.30.4.043025]
Human biometric images are utilized for cell phone authentication, airport security, and biometric passports. To improve the biometric identification process, this should be protected from cyber attackers because it i...
详细信息
Human biometric images are utilized for cell phone authentication, airport security, and biometric passports. To improve the biometric identification process, this should be protected from cyber attackers because it is sensitive to any minor changes. Thus, security is a major concern in biometric images. Traditional encryption and compression methods are ineffective for encrypting biometric images due to their high execution time and algorithm complexity. In this paper, a novel 2D chaotic sine map is proposed for generating encryption keys and improving security for biometric identification systems. The proposed scheme uses the 2D chaotic map to generate the private key and diffusion process. Here, the Henon-Sine Map (HSM-512), secure hash algorithm (SHA-256), and DNA computing are also used in the key generation process. The pixel values of the original images in the proposed schemes are shuffled using Mersenne Twister (MT) to improve the security of biometric images. Moreover, the Differential Huffman Compression (DHC) method is used for lossless compression while performing the XOR-based encryption process. The proposed model has been tested on different RGB biometric images, namely the SOCOFing dataset and the COVID-19 chest X-ray dataset. The experiment results have been evaluated using many performance metrics, such as entropy, key space, histogram analysis, key sensitivity, robustness analysis, correlation, and similarity analysis. The outcomes demonstrate that the proposed scheme is more effective than the state-of-the-art schemes.
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastruc...
详细信息
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we implemented symmetric-key and secure hash algorithm-based hardware security modules in the key elements of the sensing device. A preliminary test was conducted prior to a field trial to verify the performance of the developed sensing device. The accuracy and stability of the sensing device were then verified for 1 month in a field test at facilities for energy storage systems and photovoltaic converters in sewage treatment plants.
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd...
详细信息
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.
For modern society,The concealment and completeness of data is particularly *** solve this problem,developed a mixed DES and SHA-1 encryption system based on VC++*** system on the one hand by Triple DES and RSA algori...
详细信息
For modern society,The concealment and completeness of data is particularly *** solve this problem,developed a mixed DES and SHA-1 encryption system based on VC++*** system on the one hand by Triple DES and RSA algorithms for data encryption to hide,on the other hand,by the SHA-1 algorithm to validate the integrity of data,it has a wide range of practicality.
暂无评论