Although traditional asymmetric algorithm along with its implementations are successful in keeping important documents confidential,it uses only one private *** research proposes the loose asymmetric(LA) algorithm to ...
详细信息
Although traditional asymmetric algorithm along with its implementations are successful in keeping important documents confidential,it uses only one private *** research proposes the loose asymmetric(LA) algorithm to satisfy requirement of generating many access *** access key is granted to only one *** demand is real because a group of members needs to retrieve same documents but each member requires confidentiality in *** implementation of LA algorithm is complicated,I also propose two schemes of how to deploy LA *** research is a proposal because I do not make experiment on LA algorithm yet.
Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to their extensive use WSNs are susceptible to several significan...
详细信息
We propose a new asymmetric pixel confusion algorithm for images based on the Rivest-Shamir-Adleman(RSA)public-key cryptosystem and Arnold ***,the RSA asymmetric algorithm is used to generate two groups of Arnold tran...
详细信息
We propose a new asymmetric pixel confusion algorithm for images based on the Rivest-Shamir-Adleman(RSA)public-key cryptosystem and Arnold ***,the RSA asymmetric algorithm is used to generate two groups of Arnold transform parameters to address the problem of symmetrical distribution of Arnold map ***,the image is divided into blocks,and the first group of parameters is used to perform Arnold confusion on each ***,the second group of parameters is used to perform Arnold confusion on the entire *** image correlation is thereby fully weakened,and the image confusion degree and effect are further *** experimental results show that the proposed image pixel confusion algorithm has better confusion effect than the classical Arnold map based confusion and the row-column exchange based ***,the values of gray difference are close to *** addition,the security of the new confusion operation is dependent on RSA,and it can act as one part of a confusion-substitution structure in a cipher.
In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously ...
详细信息
In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PIU-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the. environment of network.
A brief history of international standardization of IT security techniques is given beginning with the first working group within ICO/TC97 in 1980. Nowadays security is dealt with by an increasing number of standardiz...
详细信息
A brief history of international standardization of IT security techniques is given beginning with the first working group within ICO/TC97 in 1980. Nowadays security is dealt with by an increasing number of standardization committees. Many of these however are considering security techniques within the framework of other topics such as architecture or special applications. The GMD participates in some of these committees especially in the subcommittee ISO/IEC JTC 1/SC 27 which is standardizing generic IT security techniques and mechanisms. The emphasis of this article is on the work of SC27. The scope and a short description of the programme of work of SC27 is given including the most important security mechanisms based on cryptography relating, for instance, to authentication, access control, confidentiality, data integrity, and non-repudiation. The results of a discussion, whether cryptographic algorithms should be standardized or not, are described. The classification of IT security standards is given to set up a link to the environment of IT security techniques and mechanisms.
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a...
详细信息
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server ***,the attackers have designed even better mechanisms to break these security *** cryptography is the best data protection algorithm that exchanges data between authentic *** this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure ***,the XOR function will be applied to plain text,and then salt technique will be ***,a reversing mechanism will be implemented on that data to provide more data *** decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be *** the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms.
Internet applications are increased and growing at very fast. Owing towards the technological development, secured way of data transmission over the internet is becoming a questioning task. Intruders hack the data and...
详细信息
ISBN:
(纸本)9781467393379
Internet applications are increased and growing at very fast. Owing towards the technological development, secured way of data transmission over the internet is becoming a questioning task. Intruders hack the data and use it for their beneficial purpose. To avoid these undesirable acts, cryptography is used to ensure security of the covert and secure message. Although encrypted data is difficult to decipher, it is relatively easy to detect. Strong encryption algorithms and proper key management techniques for the systems will helps in achieving confidentiality, authentication and integrity of data. In this research work various encryption (symmetric and asymmetric) algorithms have been studied. Literature Survey has been carried out for cryptography by incorporating key papers related to data encryption based on performance metrics (Security and Time constraints). From this, the observation and future work has been identified.
In many research results today, the encryption of data at rest is considered to be one of the main issues related to security in cloud computing and especially cloud storage. Based on result from survey and the need f...
详细信息
ISBN:
(纸本)9781538608142
In many research results today, the encryption of data at rest is considered to be one of the main issues related to security in cloud computing and especially cloud storage. Based on result from survey and the need for enterprise-wide strategies for data encryption, we have implemented a cloud-based model for security management, previously proposed in our research. We integrate in our strategy specific elements such as the way of saving data to the cloud, possible attacks on data. In addition, based on these elements we have analyzed the level of support of the proposed model for security in cloud. Every analysis made, proves a possibility that our proposed model for security in cloud offers and itself, the way of implementation in the proposed model. Also, the strategy of implementation is shown to increase security in cloud based on the partition and encryption of data under various models, and sending them to the cloud. All details of the strategy used for a particular file are stored on a separate file, which can be considered as a master key for the file contents.
It was considered that the security of information is an important factor in an electoral process in a country;for the frequent problems that have been detected in the scanning of votes to expedite the *** objective i...
详细信息
It was considered that the security of information is an important factor in an electoral process in a country;for the frequent problems that have been detected in the scanning of votes to expedite the *** objective is to analyze a method of vote scanning that allows improving security,administration,and implementation so that vote counting is faster and more secure compared to the traditional voting *** deductive method and the exploratory investigation were used to analyze the information of the articles of the *** turned out to be a prototype of a voting scan algorithm based on the OCR reader scanner that was proposed and analyzed;for the scanning of the votes and projection of results via the Internet for the next elections is to improve the integrity of the *** was concluded that a prototype of an adequate algorithm for vote scanning is an alternative to improve a traditional system that will be integrated into a voting system.
In the current scenario,various forms of information are spread everywhere,especially through the Internet.A lot of valuable information is contained in the dissemination,so security issues have always attracted *** t...
详细信息
In the current scenario,various forms of information are spread everywhere,especially through the Internet.A lot of valuable information is contained in the dissemination,so security issues have always attracted *** the emergence of cryptographic algorithms,information security has been further ***,cryptography encryption is divided into symmetric encryption and asymmetric *** symmetric encryption has a very fast computation speed and is beneficial to encrypt a large amount of data,the security is not as high as asymmetric *** same pair of keys used in symmetric algorithms leads to security ***,if the key can be protected,the security could be *** an asymmetric algorithm to protect the key and encrypting the message with a symmetric algorithm would be a good *** paper will review security issues in the information transmission and the method of hybrid encryption algorithms that will be widely used in the ***,the various characteristics of algorithms in different systems and some typical cases of hybrid encryption will be reviewed and analyzed to showcase the reinforcement by combining *** encryption algorithms will improve the security of the transmission without causing more other ***,the way how the encryption algorithms combine to strength the security will be discussed with the aid of an example.
暂无评论