Cloud computing has transformed data storage, processing, and access. However, as cloud-based services grow more popular, protecting sensitive data is crucial. Cryptographic algorithms provide strong encryption, safe ...
详细信息
A block color image encryption algorithm based on chaotic system, elementary cellular automata (ECA), and deoxyribonucleic acid (DNA) sequence operations is proposed. The architecture is comprised of forward-diffusion...
详细信息
A block color image encryption algorithm based on chaotic system, elementary cellular automata (ECA), and deoxyribonucleic acid (DNA) sequence operations is proposed. The architecture is comprised of forward-diffusion, permutation, and backward-diffusion. First, the red, green, and blue components of a color image are converted into three DNA matrices by DNA encoding rule. Exclusive OR (XOR) operation is applied between the DNA coding chaotic sequence generated by the improved Henon map and three DNA matrices. Second, the large DNA matrix, composed of three DNA matrices, is divided into several small blocks with unequal sizes. ECA is employed to scramble the positions of these blocks. Finally, DNA com-putations are introduced to diffuse three permutated DNA matrices. In addition, initial values and system parameters of the chaotic system are calculated from the secure hash algorithm (SHA-256) hash value of the plain image and the given parameters. Both DNA encoding and ECA order rules rely on plaintext information. Therefore, the proposed algorithm is highly sensitive to plain image. Simulation results and security analyses demonstrate that our algorithm achieves excellent security performance and acceptable running time. (c) 2021 SPIE and IS&T [DOI: 10.1117/ ***.30.4.043025]
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd...
详细信息
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.
A number of techniques for securing plaintext, images and video frames have been developed in cryptography using jointly DNA computing and Chaos Theory. With the advancement of DNA/quantum computing, the threats of se...
详细信息
A number of techniques for securing plaintext, images and video frames have been developed in cryptography using jointly DNA computing and Chaos Theory. With the advancement of DNA/quantum computing, the threats of security breaches to information have an increasing possibility. In this paper, we propose a symmetric encryption algorithm for color images by extending the current encryption/decryption techniques. Our encryption algorithm is based on three chaotic systems (PWLCM, Lorenz and 4D Lorenz-type), a secure hash algorithm, a scrambler, a chaotic generator and DNA sequence based Linear Feedback Shift Register. We introduce multilevel security to increase the degree of diffusion and confusion. Through experiments, we present security analysis for key irreproducibility and sensitivity, Gray Level Co-occurrence Matrix based analysis, maximum deviation, irregular deviation, entropy, histogram, variance and correlation, number of pixel change rate, unified average cipher intensity, known/chosen-plaintext attacks, mean absolute error, robustness against noises of various types using PSNR and occlusion attacks. It is demonstrated that mostly our proposed encryption algorithm has enhanced performance as compared to contemporary works in information security, while comparable in other cases.
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastruc...
详细信息
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we implemented symmetric-key and secure hash algorithm-based hardware security modules in the key elements of the sensing device. A preliminary test was conducted prior to a field trial to verify the performance of the developed sensing device. The accuracy and stability of the sensing device were then verified for 1 month in a field test at facilities for energy storage systems and photovoltaic converters in sewage treatment plants.
In this paper, we propose a homogenized Chebyshev-Arnold map (HCAM) by homogenizing the linear coupling of Chebyshev map and Arnold map. The proposed HCAM has complex dynamical behaviors and can avoid the problems of ...
详细信息
In this paper, we propose a homogenized Chebyshev-Arnold map (HCAM) by homogenizing the linear coupling of Chebyshev map and Arnold map. The proposed HCAM has complex dynamical behaviors and can avoid the problems of the original Chebyshev map when used in image encryption. Based on the HCAM, we present a color image encryption algorithm that contains confusion and diffusion processes. In the confusion stage, we use the random chaotic matrix transform (RCMT) to randomize the shifting steps, which can eliminate the regular pattern of the original CMT and enhance the security level. In the diffusion stage, we use a SHA-512- and SHA-384-based fast pixel substitution scheme to perform the bit-level exclusive-or operation, which can obtain outstanding self-adaptiveness and high efficiency. The experimental results and security analysis demonstrate that the proposed algorithm has high level of security and robust to the potential attacks.
This paper proposes a robust 256-bit hash producer. The underlying motivation is to overcome security-related limitations of pseudo-random number generators embedded in Linux and Windows, which render these widely use...
详细信息
ISBN:
(纸本)9781728151465
This paper proposes a robust 256-bit hash producer. The underlying motivation is to overcome security-related limitations of pseudo-random number generators embedded in Linux and Windows, which render these widely used operating systems vulnerable to security breaches. The proposed approach is called hash Bits Producer-256 (HBP-256). It produces outputs that look like random to an adversary who is unaware of its internal state. In addition, it provides forward and backward security in case its internal state is known to an adversary at any particular time. HBP-256 offers such protection by providing the following capabilities. Firstly, output pseudo-randomness. This is ensured by: (1) seeding and reseeding HBP256 from three sources of entropy input, of which two are non-deterministic hardware sources;and (2) maintaining a high-level entropy input. Secondly, provide forward security. This is ensured by using two one-way irreversible functions: the secure hash algorithm-256 (SHA-256) and SHA-512. Thirdly, provide backward security. This is ensured by: (1) maintaining cumulative entropy;(2) sustaining rapid refreshment rates for the entropy pools;and (3) preserving uniqueness of bits input to the SHA-512 at any particular time. Security analysis is conducted by exposing HBP-256 to external and internal attacks. Based on the security analysis, it is concluded that HBP-256's individual and collaborative defenses successfully address adversaries' attempts to compromise HBP-256 from outside as well as from within its boundary. HBP-256 meets the intended security requirements, and achieves its objective.
With the increasing number of electronic based systems being connected to the Internet via wired or wireless connections in the era of the IoT, the importance of security aspects is well recognized. At the same time g...
详细信息
ISBN:
(纸本)9781728119533
With the increasing number of electronic based systems being connected to the Internet via wired or wireless connections in the era of the IoT, the importance of security aspects is well recognized. At the same time growth of available complexity and increasing market share of reconfigurable integrated circuits make integration of whole digital systems feasible at relatively low cost. Placing security functions into reconfigurable logic might be advantageous in case of algorithm changes, bug fixes, or updates for hardening of the core against attacks. In this paper we thus want to give an overview of available open-source hardware security building blocks for basic cryptographic functions and show evaluation results of selected cores in FPGA technology.
This paper introduces a secured and distributed Big Data storage scheme with multiple authorizations. It divides the Big Data into small chunks and distributes them through multiple Cloud locations. The Shamir's S...
详细信息
ISBN:
(纸本)9781728100067
This paper introduces a secured and distributed Big Data storage scheme with multiple authorizations. It divides the Big Data into small chunks and distributes them through multiple Cloud locations. The Shamir's Secret Sharing and secure hash algorithm are employed to provide the security and authenticity of this work. The proposed methodology consists of two phases: the distribution and retrieving phases. The distribution phase comprises three operations of dividing, encrypting, and distribution. The retrieving phase performs collecting and verifying operations. To increase the security level, the encryption key is divided into secret shares using Shamir's algorithm. Moreover, the secure hash algorithm is used to verify the Big Data after retrieving from the Cloud. The experimental results show that the proposed design can reconstruct a distributed Big Data with good speed while conserving the security and authenticity properties.
Cryptography plays a leading role in the information transmission security. Even though encrypted, data can be altered when transmitted over a network. Therefore, to verify data the use of a digital signature is essen...
详细信息
ISBN:
(纸本)9781728111841
Cryptography plays a leading role in the information transmission security. Even though encrypted, data can be altered when transmitted over a network. Therefore, to verify data the use of a digital signature is essential. hashing algorithms are used both to create digital signatures and to verify the receiving data. Our proposed design of a hashing algorithm, is a custom hardware implementation on a FPGA of the secure hash algorithm-2 (SHA-2), using Nios II processor. We use two acceleration techniques, to improve performance of SHA-2 computation: floating point and floating point 2. Finally, after applying these techniques, we studied all the designs in terms of integration time, the number of clock cycles and the percentage of overlap in the FPGA.
暂无评论