Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th...
详细信息
ISBN:
(纸本)9781538652572
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of the facility it provided. In this, user pays only for the services it uses. Now a days, vast amount of information gets stored over cloud, which include personal file, images, pdf, text, multimedia data etc. So security becomes one of the important issue. Everyone just want to upload, store its data without worrying about the security. IT organization should look after to provide security to the document. Documents content get altered by some outsider attacker, so it is necessary to verify the integrity. This data get duplicated and unnecessary much of the space will get waste. So to avoid this, data must be de-duplicated and uploaded over the cloud server. For this secure hash algorithm is used. It calculates the hash value for chunk of data and store over cloud. Only reducing unnecessary wastage of space is not the solution administrator should look toward the security issue. TPA is used for verification of integrity of the document. This system is proposed for achieving this both issues.
A physical layer enhanced secure future generation passive optical network (PON) based on chaotic signal scrambling and the secure hash algorithm (SHA) is proposed and demonstrated. In this paper, the architecture of ...
详细信息
A physical layer enhanced secure future generation passive optical network (PON) based on chaotic signal scrambling and the secure hash algorithm (SHA) is proposed and demonstrated. In this paper, the architecture of a wavelength-division multiplexed orthogonal frequency division multiplexing (OFDM) PON system based on a centralized light source using direct detection is analyzed. A logistic chaos map is employed here for the scrambling of OFDM symbols in the frequency and time domains. Before transmitting the signal over optical fiber, a message-digest of scrambled and descrambled OFDM signals is computed and compared at the optical line terminal and optical network unit, respectively, to verify the actual data recovered. For the downstream channel, a 10 Gbps 32 quadrature amplitude modulation OFDM signal is successfully transmitted over a distance of 50 km single-mode fiber within the limits of the peak-to-average-power value. The results show that the proposed scheme can protect the system from bad actors and eavesdroppers, while chaos encryption with SHA-2 provides a robust and promising secure strategy for future-generation PON systems.
This paper defines a generalized SHA algorithm based on the SHA family rules. The proposed algorithm accepts arbitrary length message as input to generate message digest with the required length. It contains the initi...
详细信息
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th...
详细信息
ISBN:
(纸本)9781538652589;9781538652572
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of the facility it provided. In this, user pays only for the services it uses. Now a days, vast amount of information gets stored over cloud, which include personal file, images, pdf, text, multimedia data etc. So security becomes one of the important issue. Everyone just want to upload, store its data without worrying about the security. IT organization should look after to provide security to the document. Documents content get altered by some outsider attacker, so it is necessary to verify the integrity. This data get duplicated and unnecessary much of the space will get waste. So to avoid this, data must be de-duplicated and uploaded over the cloud server. For this secure hash algorithm is used. It calculates the hash value for chunk of data and store over cloud. Only reducing unnecessary wastage of space is not the solution administrator should look toward the security issue. TPA is used for verification of integrity of the document. This system is proposed for achieving this both issues.
Now a day's data is transmitted between users through internet in the form of multimedia. The data transmission requires less time complexity as well as security of data, security is the big issue during transmiss...
详细信息
ISBN:
(纸本)9781509006694
Now a day's data is transmitted between users through internet in the form of multimedia. The data transmission requires less time complexity as well as security of data, security is the big issue during transmission of data. Data integrity is one of the major parameter to ensure the security. There are many algorithms or methods have been developed for maintain the integrity of data during transmission. Numbers of algorithms have been proposed to provide integrity but almost all of them proved to be breakable or less secure in terms of execution time and bit difference. So to increase the security a novel SHA is introduced, that possess less execution time and better bit difference value.
In This Paper, we report a new approach for providing security as well as privacy to the corporate user. With the help of locations sensing mechanism by using GPS we can avoid the un-authorized reading & relay att...
详细信息
ISBN:
(纸本)9781479917341
In This Paper, we report a new approach for providing security as well as privacy to the corporate user. With the help of locations sensing mechanism by using GPS we can avoid the un-authorized reading & relay attacks on RFID system. For example, location sensing mechanism with RFID card is used for location specific application such as ATM cash transfer van for open the door of van. So after reaching the pre-specified location (ATM) the RFID card is active & then it accepts the fingerprint of the registered person only. In this way we get a stronger cross layer security. SHA-3 algorithm is used to avoid the collision (due to fraud fingerprint) effect on server side.
Internet is critical to both the economy and society in today's world. Domain Name System (DNS) is a key building block of the internet and the DNS hides all technical infrastructures, software and hardware requir...
详细信息
ISBN:
(纸本)9781479970759
Internet is critical to both the economy and society in today's world. Domain Name System (DNS) is a key building block of the internet and the DNS hides all technical infrastructures, software and hardware required for the domain name system to function correctly. It allows users to access websites and exchange emails. It runs a strong mechanism to provide the IP address of the internet host name. An attacker can launch rebinding attack when the DNS server sends a query to any particular server on the network. Different types of techniques have been proposed to prevent this attack that all have some pros and also cones. A new technique is proposed in this paper by using security proxy with a hash function. Rebinding attack can be avoided by using this technique. It provides a secured environment for the DNS to communicate with other DNS. While the source DNS are receiving response from any DNS it will authenticate of all the receiving packets and then sends the data to the client. It gives a secure environment for DNS communication. For this purpose 2 different algorithms are used, namely SHA-2 and AES algorithms. First a random ID will be given to the query and then the query is sent to the DNS server.
The quantum key distribution (QKD) system has been developed rapidly, but its key generation rate is limited for kinds of reason such as detector efficiency and not fitted for high speed application such as video conf...
详细信息
The quantum key distribution (QKD) system has been developed rapidly, but its key generation rate is limited for kinds of reason such as detector efficiency and not fitted for high speed application such as video conferences. For promotion of key generation rate, an algorithm based secure hash algorithm (SHA) is introduced to process QKD keys which could be expanded to be about tens times and implemented in field programmable gate array (FPGA) device in this paper. The expanded key is tested by NIST test program to verify its randomness and security. In our tests, the expanded keys less than 32 times QKD keys are all passed NIST test program and shows its good security. (C) 2012 Elsevier GmbH. All rights reserved.
The secured data communication over internet is the most important concern nowadays. Our main aim is to build an apparently attack resistant encryption model. Session key may be one solution where new encryption key i...
详细信息
The secured data communication over internet is the most important concern nowadays. Our main aim is to build an apparently attack resistant encryption model. Session key may be one solution where new encryption key is used in every session but that needs key exchange prior to every communication. Common solution is, the new key be the function of the previous key and previous plain-text. Here after every communication one needs to extract the next session key and to remember till the next communication. In this paper, we have proposed a scheme where session key is the function of a secret key and the current plain-text. Thus in each session the encryption key is changing but there is no need to extract and remember the next session key. Moreover, we have used double encryption technique and shown that our scheme is better against crypto-analysis than other existing schemes like DES, AES.
This paper deals with the design and implementation of the post-quantum public-key algorithm McEliece. Seamless incorporation of a new error generator and new SHA-3 module provides higher indeterminacy and more random...
详细信息
ISBN:
(纸本)9781479934324
This paper deals with the design and implementation of the post-quantum public-key algorithm McEliece. Seamless incorporation of a new error generator and new SHA-3 module provides higher indeterminacy and more randomization of the original McEliece algorithm and achieves CCA2 security standard. Due to the lightweight and high-speed implementation of SHA-3 module the proposed 128-bit secure McEliece architecture provides 6% higher performance in only 0.78 times area of the best known existing design.
暂无评论