This article considers the work done to find a suitable group implementation for the creation of new cryptosystems which work is based on the use of finite non-commutative algebraic groups. In particular, some subgrou...
详细信息
ISBN:
(纸本)9781509056484
This article considers the work done to find a suitable group implementation for the creation of new cryptosystems which work is based on the use of finite non-commutative algebraic groups. In particular, some subgroup structures of matrix groups over finite fields are described, and one of the possible methods for representing of open texts as elements of the group is used. At the preliminary stage of the cryptosystem, the developed concept of generating keys is described, and recommendations are given for selecting the elements of the secret key. The structure and features of the cryptosystem under investigation are given, earlier studies and experiments that were carried out in this field are considered. To generate subgroups of the groups under study, it is proposed to use elementary transvections, in particular, long and short root unipotent elements. A classification of certain groups of the Chevalley type by types A(l)-D-l is provided. Some assumptions are made concerning the possible improvement of reliability and speed of such cryptosystems based upon the finite non-commutative algebraic groups, as well as relating to the prospects of further research in this direction and minimizing or eliminating the shortcomings of this data encryption model.
Two kinds of image encryption algorithms based on a three-dimensional chaotic system is presented in this paper. Firstly, a new three-dimensional chaotic circuit based on memristor is designed, and the characteristics...
详细信息
ISBN:
(纸本)9781509044238
Two kinds of image encryption algorithms based on a three-dimensional chaotic system is presented in this paper. Firstly, a new three-dimensional chaotic circuit based on memristor is designed, and the characteristics of the chaotic system are studied. Secondly, we present two kinds of images encryption algorithms based on the chaotic sequences above, and by doing theoretical and statistical analysis, we can find that the algorithms have very good effect. Finally, the simulation results are given.
Wireless body area networks (WBANs) are an exciting technology that will revolutionize physiological monitoring in the coming years. However, the widespread deployment of WBANs is restricted by steep energy limitation...
详细信息
Wireless body area networks (WBANs) are an exciting technology that will revolutionize physiological monitoring in the coming years. However, the widespread deployment of WBANs is restricted by steep energy limitations. Furthermore, they require acute security measures to protect user medical data. We aim to measure the energy consumption of a cellphone as it transmits and encrypts data in a mock WBAN scenario. We evaluated the impact of various design parameters in an effort to discover the ideal WBAN operational protocols. In conclusion, we recommend an optimal file size strategy, data communication network, and encryption algorithm that minimize energy consumption and enhance WBAN operation. Copyright (c) 2015John Wiley & Sons, Ltd.
this paper provides a performance evaluation of four different symmetric encryption algorithms in Android mobile platform. DES, Bluefish, RC6 and AES algorithms have been written and implemented in JAVA for Android pl...
详细信息
ISBN:
(纸本)9781467374651
this paper provides a performance evaluation of four different symmetric encryption algorithms in Android mobile platform. DES, Bluefish, RC6 and AES algorithms have been written and implemented in JAVA for Android platform utilizing an open source library called Bouncy castle. Different file sizes have been encrypted and power consumption has been measured. The results demonstrated that the cost of implementing these encryption algorithms in smartphones is high. Power consumption may prevent developers from utilizing encryption algorithms in their communication applications through smartphones. In addition, our results demonstrate the requirements of new power-saving 'Green' encryption algorithms. Finally, encryption algorithms are not about security only, power should be one requirement in designing these algorithms for smartphones.
Nowadays, IT has an important role in people's life. Bank is one of the example of institute which using IT in its daily tasks. Customer's personal information which has stored by the bank is considered as pri...
详细信息
ISBN:
(纸本)9781467387224
Nowadays, IT has an important role in people's life. Bank is one of the example of institute which using IT in its daily tasks. Customer's personal information which has stored by the bank is considered as private and has to be saving securely by bank. Only legal staff of bank, also legal customers can operate any of the tasks. Hence, bank has own system to protect its transaction tasks such as online and offline transactions. Bank account hacking has caused millions money losses around the world. It is important to achieve how the security aspects in a banking system can influence great lost to the financial institution. This paper reports on the aiming at identifying and classifying Mobile banking payment security challenges. First, different security risks of mobile banking have been presented. In addition, different methods of encryption have been presented. Moreover, our method which has two layers of security has been presented. Furthermore, for preparing the security of the Network Layer, our method will authorize the Message format with Check sum.
Cloud Computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. Cloud computing is most interesting and enticing technology ...
详细信息
ISBN:
(纸本)9781467366182
Cloud Computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. Cloud computing is most interesting and enticing technology which is offering the services to its users on demand over the internet. Since Cloud Computing stores the data and disseminated resources in the open environment, security has become the main obstacle which is hampering the deployment of Cloud environments. Even though the Cloud Computing is promising and efficient, there are many challenges for data security as there is no vicinity of the data for the Cloud user. The main scope of this paper is to solve the security issues in both cloud providers and cloud consumers. The outcome of the research paper is securing cloud data storage by using modulo 37, but existing hill cipher working with modulo 26.
Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to ensure security increases. This is a potential problem for the Department of Defense, which requires smar...
详细信息
Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to ensure security increases. This is a potential problem for the Department of Defense, which requires smart card usage for its employees. This paper defines, compares, and contrasts two algorithms: Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC), and then provides test data for encryption algorithms tested on particular certification key processes in an attempt to show that the ECC encryption algorithm provides the security necessary for smart card operations at a fast enough speed to benefit smart card users. It describes the Open Protocol for Access Control Identification and Ticketing with privacY (OPACITY) pilot project that took place over 2014 in relation to the card testing, and hypothesizes the risks and mitigation factors for the Department of Defense to permanently switch to the ECC algorithm for smart card use.
A joint encryption and watermarking technique is an efficient method for verifying the reliability of medical images. The medical image integrity control is achieved by the combined watermarking algorithm, QIM (Quanti...
详细信息
ISBN:
(纸本)9781479949816
A joint encryption and watermarking technique is an efficient method for verifying the reliability of medical images. The medical image integrity control is achieved by the combined watermarking algorithm, QIM (Quantization Index Modulation), with an encryption algorithm. The proposed method uses two encryption algorithm namely RC4, AES are Stream cipher, Block cipher algorithm respectively. The main objective of this method is to provide integrity control for medical images although it is encrypted. Experimental security analysis is taken for the 8-bit ultrasound images and 16-bit Positron Emission Tomography (PET) images. The results achieved are demonstrates the capability of the system to provide security attributes while minimizing the distortion in encrypted and spatial domain. When AES algorithm is operated with Cipher Block Chaining (CBC) mode the output image is transparent with the DICOM standard.
Cloud Communication Environment is an internet-based computing, where shared resources, software, and information are provided with computers and devices on-demand. They guarantee a way to share distributed resources ...
详细信息
Cloud Communication Environment is an internet-based computing, where shared resources, software, and information are provided with computers and devices on-demand. They guarantee a way to share distributed resources and services that belong to different organizations. In order to develop cloud computing applications, security and trust to share data through distributed resources must be assured. This paper offers a study of the different mechanisms used in open cloud environments such as keys generation and management, and encryption/decryption algorithms. In addition, the paper proposes a new cryptographic environment, annotated as "CCCE" that deploys the combination between quantum key distribution mechanisms (QKD) and advanced encryption standard (AES), and demonstrates how quantum mechanics can be applied to improve computation.
暂无评论