Anonymous location schemes classified into reactive routing methods and proactive routing methods and anonymous middleware methods. Reactive routing methods includes hop by hop encryption and redundant traffic analysi...
详细信息
ISBN:
(纸本)9781479938346
Anonymous location schemes classified into reactive routing methods and proactive routing methods and anonymous middleware methods. Reactive routing methods includes hop by hop encryption and redundant traffic analysis which either generates high cost or cannot provide full anonymity to source, destination and routes. An Anonymous Location-based Efficient Routing protocol (ALERT) was used to offer high anonymity protection at a low cost. GPSR protocol is used to transmit message from source to destination. Like other anonymity routing algorithms, ALERT is not completely bulletproof to all attacks. To prevent occurrence of active attacks advanced cryptographic algorithm SHA-2 is used, which provides better security features. Thus it provides full anonymity in Source destination as well as in route.
The strength of present day cryptosystem lies mainly in the key used for encryption. The problem to remember, protect and manage private key is a major issue in case of asymmetric ciphers. By using proven one way math...
详细信息
ISBN:
(纸本)9781479960422
The strength of present day cryptosystem lies mainly in the key used for encryption. The problem to remember, protect and manage private key is a major issue in case of asymmetric ciphers. By using proven one way mathematical functions, multiplication of two large primes and securehash function, we propose a robust and stable fingerprint key generation scheme. This scheme enables the generation of secure and cancelable cryptographic key with a very small FAR. The key can be used as private key for elliptic curve or NTRU based cryptosystems.
For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand ...
详细信息
For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand by Triple DES and RSA algorithms for data encryption to hide, on the other hand, by the SHA-1 algorithm to validate the integrity of data, it has a wide range of practicality.
One-way hash functions play an important role in modem cryptography. Matusiewicz et al. proved that the message scheduling is essential for the security of SHA-256 by showing that it is possible to find collisions wit...
详细信息
One-way hash functions play an important role in modem cryptography. Matusiewicz et al. proved that the message scheduling is essential for the security of SHA-256 by showing that it is possible to find collisions with complexity 2(64) hash operations for a variant without it. In this article, we first proposed the conjecture that message scheduling of SHA algorithm has higher security complexity (or fitness value in Genetic algorithm) if each message word (W-t) involves more message blocks (M-i) in each round. We found some evidence supports the conjecture. Consider the security of SHA-0 and SHA-1. Since Chabaud and Joux shown that SHA-1 is more secure than SHA-0. Further, Wang found collisions in full SHA-0 and SHA-1 hash operations with complexities less than 2(39) and 2(69), respectively. We found it is consistent from the viewpoint of message blocks (terms) involved in each message word. It clearly shown that the number of terms involved in SHA-1 is more than that in SHA-0, taking W-27 as an example, 14 and 6, respectively. Based on the conjecture we proposed a new view of complexity for SHA-256-XOR functions, a variant of SHA-256, by counting the terms involved in each equation, instead of analyzing the probability of finding collisions within SHA-256-XOR hash function. Our experiments shown that the parameter set in each equation of message schedule is crucial to security fitness. We applied genetic algorithms to find the near-optimal message schedule parameter sets that enhance the complexity 4 times for SHA-1 and 1.5 times for SHA-256-XOR, respectively, when compared to original SHA-1 and SHA-256-XOR functions. The analysis would be interesting for designers on the security of modular-addition-free hash function which is good for hardware implementation with lower gate count. And the found message schedule parameter sets would be a good reference for further improvement of SHA functions.
Security was not considered when current wireless sensor nodes were designed. As a result, providing high level of security on current WSNs platforms is unattainable, especially against attacks based on key resolving ...
详细信息
Security was not considered when current wireless sensor nodes were designed. As a result, providing high level of security on current WSNs platforms is unattainable, especially against attacks based on key resolving and node compromise. In this paper, we scrutinize the security holes in current WSNs platforms and compare the main approaches to implementing their cryptographic primitives in terms of security, time, and energy efficiency. To secure these holes and provide more efficiency, we propose SN-SEC, a 32-bit RISC secure wireless sensor platform with hardware cryptographic primitives. The choice of cryptographic primitives for SN-SEC is based on their compatibility with the constrained nature of WSNs and their security. SN-SEC is implemented using very high-speed integrated circuit hardware description language. Experimental results using synthesis for Spartan-6 low-power FPGA show that the proposed design has a very reasonable computational time and energy consumption compared to well-known WSN processers.
We introduce a novel way to use Low Density Parity Check (LDPC) error correction code to reduce the variability and noise in iris code, which is generated from Iris Recognition System (IRS) and secure hash algorithm (...
详细信息
ISBN:
(纸本)9788132207399;9788132207405
We introduce a novel way to use Low Density Parity Check (LDPC) error correction code to reduce the variability and noise in iris code, which is generated from Iris Recognition System (IRS) and secure hash algorithm (SHA-512) to transform codewords into hash string to make them as a Cancel-lable Biometric. In the enrolment process, by using majority voting scheme a unique iris code is generated from n-iris codes of IRS from n-eye samples of same person in different time interval. Then the codewords from LDPC encoding, parity check matrix of LDPC and hash string of codewords from SHA-512 are stored into smart card for high security access environment. In the verification process, iris code from live person is generated by using IRS then LDPC decoding is applied with the help of stored codewords and parity check matrix in the smart card. For authentication, new hash string, produced by employing SHA-512 on corrected iris code is compared with hash string stored in smart card. The LDPC code reduces the Hamming distance for genuine comparisons by a larger amount than for the impostor comparisons. This results in better separation between genuine and impostor users which improves the verification performance. Security of this scheme is very high due to the security complexity of SHA-512, which is 2256 under birthday attack. Experimental results show that this approach can assure a higher security with a low false rejection or false acceptance rate.
We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and secure hash algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wave...
详细信息
We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and secure hash algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wavelet Transform (IWT) and threshold embedding technique. The parity checks and parity matrix of LDPC encoding and cancellable biometrics i.e., hash string of unique iris code from SHA-512 are embedded into an image for authentication purpose using reversible watermarking scheme based on IWT and threshold embedding technique. Simply by reversing the embedding process, the original image, parity checks, parity matrix and SHA-512 hash are extracted back from watermarked-image. For authentication, the new hash string produced by employing SHA-512 on error corrected iris code from live person is compared with hash string extracted from watermarked-image. The LDPC code reduces the hamming distance for genuine comparisons by a larger amount than for the impostor comparisons. This results in better separation between genuine and impostor users which improves the authentication performance. Security of this scheme is very high due to the security complexity of SHA-512, which is 2 256 under birthday attack. Experimental results show that this approach can assure more accurate authentication with a low false rejection or false acceptance rate and outperforms the prior arts in terms of PSNR. (C) 2012 Faculty of Computers and Information, Cairo University. Production and hosting by Elsevier B.V. All rights reserved.
For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand ...
详细信息
ISBN:
(纸本)9780769548180
For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand by Triple DES and RSA algorithms for data encryption to hide, on the other hand, by the SHA-1 algorithm to validate the integrity of data, it has a wide range of practicality.
For modern society,The concealment and completeness of data is particularly *** solve this problem,developed a mixed DES and SHA-1 encryption system based on VC++*** system on the one hand by Triple DES and RSA algori...
详细信息
For modern society,The concealment and completeness of data is particularly *** solve this problem,developed a mixed DES and SHA-1 encryption system based on VC++*** system on the one hand by Triple DES and RSA algorithms for data encryption to hide,on the other hand,by the SHA-1 algorithm to validate the integrity of data,it has a wide range of practicality.
Similar to any digital dataset, a digital map is also vulnerable to modification, deliberate alteration and copyright violation. A map is a visual representation of a geographical area that is digitally stored in eith...
详细信息
暂无评论