Protecting the privacy of message receivers is an important issue in pay services of e-commerce and the distribution of digital contents on the Internet. This paper proposes an efficient privacy of message encryption ...
详细信息
ISBN:
(纸本)9781424441334
Protecting the privacy of message receivers is an important issue in pay services of e-commerce and the distribution of digital contents on the Internet. This paper proposes an efficient privacy of message encryption algorithm called PMEA for pay services of e-commerce. In PMEA, each of the receivers only needs to perform constant times of pairing computation to decrypt the received message. PMEA adopts bilinear pairings on elliptic curves to protect the privacy of message receivers, to ensure that an attacker or any other message receiver can not derive the identity of a message receiver such that the privacy of every receiver can be guaranteed. Detailed theoretical analysis proves that PMEA is secure and anonymous for message receivers.
One of the major security threats in domain name system (DNS) is Cache Poisoning (CP) attack, where an attacker can change the IP address in the response packet or the database in DNS. To address CP attacks, many secu...
详细信息
ISBN:
(纸本)9781728136738
One of the major security threats in domain name system (DNS) is Cache Poisoning (CP) attack, where an attacker can change the IP address in the response packet or the database in DNS. To address CP attacks, many security protocols have been proposed. This paper proposes character-wise encryption (CWE) method to provide better security against CP attacks (the probability of successful attack is low as 10(-33)) as compared to the shift-key based method. In addition, the proposed method results in shorter encryption time. For example, with a domain name length of 30, CWE can reduce the encryption time by 10.7% as compared to the shift-key based method.
With the rapid growing of internet and networks applications, data security becomes more important than ever before. encryption algorithms play a crucial role in information security systems. In this paper, we have a ...
详细信息
ISBN:
(纸本)9781424445462
With the rapid growing of internet and networks applications, data security becomes more important than ever before. encryption algorithms play a crucial role in information security systems. In this paper, we have a study of the two popular encryption algorithms: DES and Blowfish. We overviewed the base functions and analyzed the security for both algorithms. We also evaluated performance in execution speed based on different memory sizes and compared them. The experimental results show the relationship between function run speed and memory size.
作者:
Guo, YukunHexi Univ
Coll Informat Technol & Commun 846 Beihuan Rd Zhangye Gansu Peoples R China
Because of multimedia information has huge amount of data and high redundancy, traditional encryption technology is not suitable for multimedia information encryption. Multimedia information encryption get great devel...
详细信息
ISBN:
(纸本)9789811079863;9789811079856
Because of multimedia information has huge amount of data and high redundancy, traditional encryption technology is not suitable for multimedia information encryption. Multimedia information encryption get great development when chaos appears. Chaos is very suitable for image encryption because of its many advantages. In this paper, I analysised the shortcomings of color image encryption algorithm based on 3D unified chaotic system, then aiming at the algorithm deficiency, I analysised the algorithm which improved by cat map, the security of the algorithm has been greatly improved.
Nowadays, many algorithms in cryptography area has been developed. Choosing the appropriate algorithm and dealing with its tradeoff, require a specific analysis. One of the examples is calculating the optimum encrypti...
详细信息
ISBN:
(纸本)9781509051700
Nowadays, many algorithms in cryptography area has been developed. Choosing the appropriate algorithm and dealing with its tradeoff, require a specific analysis. One of the examples is calculating the optimum encryption algorithm in video encryption. There are various ways to encrypt the video, depend on encryption algorithms (DES, Triple DES, Blowfish, AES, etc), modes of operation (ECB, CBC, CFB, OFB, CTR, etc), and padding modes (ISO10126, PKCS5, or without padding). The purpose of this paper is to calculate the best combination of encryption method regarding to processing time, performance, security, dynamism of system and impact from error propagation using two layer of AHP. The first AHP is to determine encryption algorithm and the second AHP is to determine modes of operation. The conclusion of this paper is the author suggest to use combination of AES/CTR/PKCS5Padding as the optimum method to encrypt the video. In this paper, also include the sample of video before and after encryption method.
With the high-speed development of mobile terminal device, the mobile information application solution has been more and more common. According to the processing and manufacturing industry MES (Manufacturing Execution...
详细信息
ISBN:
(纸本)9781479987306
With the high-speed development of mobile terminal device, the mobile information application solution has been more and more common. According to the processing and manufacturing industry MES (Manufacturing Execution System) data security and the power consumption for mobile application, this paper studies a kind of lightweight mobile security encryption algorithm, and applies this method in a mobile application of MES in aluminum electrolytic industry. This paper will discuss the key process of the algorithm in detail, and compared with existing algorithms, by comparing the test and analysis, this algorithm has the advantages of high security and low power consumption.
In this paper, we propose a new DES variant named Hashed Data encryption Standard (or HDES for short), with an objective to enhance the limitation of static S-boxes arrangement in DES. The proposed HDES combines sever...
详细信息
ISBN:
(纸本)9781467386142
In this paper, we propose a new DES variant named Hashed Data encryption Standard (or HDES for short), with an objective to enhance the limitation of static S-boxes arrangement in DES. The proposed HDES combines several techniques and components into one new algorithm to enhance the original DES. The HDES uses a hash function at the beginning of each block encryption process to produce a fingerprint for the plaintext, which will be used later to produce a seed that will coordinate the generation of the S-boxes during the sixteen rounds of the encryption process. The performance of the HDES has been evaluated and compared against DES and DESX. The evaluation has been conducted using the cipher data randomness and the encryption time.
Authors, formerly, proposed a new knapsack cryptosystem which uses a random sequence as its secret key. In this paper we first propose a systematic encryption algorithm for this cryptosystem. We then evaluate the amou...
详细信息
ISBN:
(纸本)9781467308946;9788994364261
Authors, formerly, proposed a new knapsack cryptosystem which uses a random sequence as its secret key. In this paper we first propose a systematic encryption algorithm for this cryptosystem. We then evaluate the amount of information of plaintext when using this algorithm. It is concluded that the proposed systematic encryption algorithm is sufficiently practical.
With the increasing complexity of access and network structure of smart devices, there are many security threats in smart distribution networks. How to ensure the security of smart distribution network communication h...
详细信息
ISBN:
(纸本)9781728114101
With the increasing complexity of access and network structure of smart devices, there are many security threats in smart distribution networks. How to ensure the security of smart distribution network communication has become an important challenge for the safe and stable operation of smart distribution networks in the future. In response to this, this paper proposes an encryption algorithm based on electric emergency communication system. The algorithm uses the random number sequence generated by the two-dimensional mapping to XOR with the plaintext to obtain two ciphertexts. Then, the two ciphertexts are subjected to different scrambling operations, and the two ciphertexts are combined into a matrix according to the parity of the number of loops of the encryption algorithm. The first round of encryption is then completed through column confusion, diagonal interchange, and generation of the next round of keys. Loop through the above steps to get the final encrypted ciphertext. The algorithm is innovative in preventing the attacker from exhausting the key, and the algorithm is simple, the running speed is fast, the encryption is efficient, and the reliability of the data transmission is improved. The algorithm is suitable for application in the electric power emergency communication system to ensure the safe operation of the power communication network, and can effectively improve the security of information transmission and the real-time performance of data transmission in the emergency communication system.
In this era of information technology, information security is a major concern. To address the challenges of data security, cryptography is used for storage as well as for the communication of data. A cryptographic al...
详细信息
ISBN:
(纸本)9781538695098
In this era of information technology, information security is a major concern. To address the challenges of data security, cryptography is used for storage as well as for the communication of data. A cryptographic algorithm has two main performance characteristics: the ability to secure data against different attacks and the processing speed. An algorithm is considered secure if no attack exists to reveal the original contents without knowing the key. The strength of any secure encryption algorithm is, therefore, generally measured based on the difficulty to obtain the encryption key through cyber-attacks such as brute force. It is presumed that the bigger the key size, the more difficult it is for the attacker to compute the key. Consequently, increasing the key size generally increases the computational complexity and processing time of algorithms. As a result, an established assumption is the existence of a tradeoff and computational complexity. In this paper, we are presenting an alternate symmetric key encryption algorithm, which can easily avoid long and complex computation of conventional popular symmetric key encryption algorithms such as the Data encryption Standards and the Advance encryption Standard. We have shown that despite providing a higher level of security, one simplest software implementation of our algorithm is faster than some previously implemented conventional algorithms. Additionally, our algorithm also provides other advantages such as inherent data compression option and flexibility of choosing different complexity levels according to the need for different applications.
暂无评论