The main aim of the paper is to evaluate and compare the hardware implementation of three lightweight cryptographic algorithms - SKINNY, ForkAE, and Romulus to determine their efficiency and suitability for IoT enviro...
详细信息
Cryptography is a bedrock of IoT security, and elliptic curve cryptography (ECC) has been recognized as a potential option due to its effectiveness and robust security qualities. The heterogeneous nature of IoT deploy...
详细信息
An important aspect for both individuals and business data is security. Security has been studied extensively by many researchers. Security gaps or threats are ever increasing, and data protection is a primary issue. ...
详细信息
A systematic analysis of the use of the hypercomplex numbers in the construction of the cryptographic algorithms is given. The cases of constructing various types of ciphers, both symmetric and asymmetric, with the us...
详细信息
The Internet of Things is millions of devices that communicate with each other and transmit sensitive information between them. The information is collected through the sensors on these devices, and is transmitted bet...
详细信息
We obfuscate words of a given length in a free monoid on two generators with a simple factorization algorithm (namely SL2()) to create a public-key encryption scheme. We provide a reference implementation in Python an...
详细信息
The medical privacy of patients is protected by law. This paper briefly introduces the legal basis of medical privacy protection and the attribute-based encryption algorithm used for encrypting medical privacy data. A...
详细信息
security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long ti...
详细信息
ISBN:
(纸本)9780769550053
security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long time period, due to recent advances such as high progress in cryptanalysis techniques, improvement of computing skills and continuous hacking trials. This paper refers important issues regarding how to enhance the transition to more secure cryptographic and encryption algorithms in the financial sector. This paper recommends that adopting and implementing open source applications following international standards can be considered as a good replacement to the conventional algorithms to offer more enhancement security techniques and highest performance encryption algorithms for e-banking transaction services. We proposed a modified algorithm for AES, in which substitute byte, shift row will remain as in the original AES while mix column operation is replaced by 128 permutation operation followed by add round key operation. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm and its high ability to overcome the problem of computational overhead. We additionally suggested another level of e-banking security services using Confidence Building Metric (CBM). The CBMs are computed based on certain parameters and can be implemented on any platform at the client side.
Two kinds of image encryption algorithms based on a three-dimensional chaotic system is presented in this paper. Firstly, a new three-dimensional chaotic circuit based on memristor is designed, and the characteristics...
详细信息
ISBN:
(纸本)9781509044238
Two kinds of image encryption algorithms based on a three-dimensional chaotic system is presented in this paper. Firstly, a new three-dimensional chaotic circuit based on memristor is designed, and the characteristics of the chaotic system are studied. Secondly, we present two kinds of images encryption algorithms based on the chaotic sequences above, and by doing theoretical and statistical analysis, we can find that the algorithms have very good effect. Finally, the simulation results are given.
Cloud generally relates to storing, processing and managing of data over a network. The cloud provides mainly three services, storage as a service, platform as a service and software as a service using internet, based...
详细信息
ISBN:
(纸本)9781538619742
Cloud generally relates to storing, processing and managing of data over a network. The cloud provides mainly three services, storage as a service, platform as a service and software as a service using internet, based on the user's demand. As it became a vital platform, many companies are building their infrastructure. This has increased the corresponding vulnerabilities and threats as these services are often provided by third parties. So, security of the information in the cloud is a noteworthy issue for the cloud client. On the other hand, Performance of the security-based algorithms is another major concern. So, the work plan is to analyze the efficiency of these algorithms, based on the encryption time, decryption time, encryption throughput and memory utilized for encryption by the algorithms for different sizes of file formats like text, image and video. Further, eliminating the privacy concerns of data stored in cloud by enhancing the security using encryption algorithms like DES,3DES,AES and BLOWFISH.
暂无评论