A virtual private network (VPN) extends a private network across a public network, such as the Internet. The purpose of this research study is to implemented ATHS3 streamcipher and VEA block cipheralgorithm as the a...
详细信息
ISBN:
(纸本)9781509023264
A virtual private network (VPN) extends a private network across a public network, such as the Internet. The purpose of this research study is to implemented ATHS3 streamcipher and VEA block cipheralgorithm as the addition of TLS ciphersuites in an SBC Raspberry Pi Model B+ as a personal VPN gateway. It consists three main processes, namely the initialization process, key generation process, and encryption process to secure data that are sent through the VPN. The personal VPN Gateway will obtain cryptographic algorithms, TLS ciphersuites supply from OpenSSL library, and VEA algorithm implementation ciphersuites as the addition of TLS ciphersuites. Implementation of VEA algorithm source code will be made in both of the OpenSSL library and the cryptographic library. This comparative study will be conducted by implementing not only a streamalgorithm, but also block cipheralgorithm on the same VPN gateway and analyze its performances in order to get the most efficient algorithm to secure data that are sent through the VPN. Not only data transfer rate, but also memory usage measurement in SBC Raspberry Pi Model B+ as personal VPN gateway. The personal VPN gateway works as a bridge between the user's PC and network to secure its communication to internal resources, so data that is transmitted is prevented from attacks. The result of performances analysis will recommend the most efficient cipheralgorithm, data transfer rate and memory usage to be implemented in an SBC Raspberry Pi Model B+ as a personal VPN gateway on OpenVPN.
Big Data in IoT and Cloud Computing are two important developments over the years, enabling companies to provide efficient and effective IT services. To ensure the security of the information being processed, the info...
详细信息
Big Data in IoT and Cloud Computing are two important developments over the years, enabling companies to provide efficient and effective IT services. To ensure the security of the information being processed, the information is usually stored within a year in a secure database. However, Encrypted Data Cloud introduces new duplication problems, which are important for storing large data. The proposed methodology consists of three segments that are Mapreduce framework, security, and authentication. Initially, the input dataset is mapped into multiple groups to minimize the volume of big data to maintain a strategic distance from scalability issues. To enhance the performance of SCA, the key values are optimally selected with the help of orthogonal learning particle swarm optimization (OLPSO) algorithm is utilized. After encryption process, the data are stored in cloud. In authentication phase, attribute-based access control mechanism is utilized. The proposed methodology performance is analyzed in terms of different metrics and performance is compared with different algorithms.
Data hiding is a tremendous and fast growing multidisciplinary field, which conceals the existence of secret data. Security and the privacy of the data over internet and communication technique is a prime concern amon...
详细信息
ISBN:
(纸本)9781479979868
Data hiding is a tremendous and fast growing multidisciplinary field, which conceals the existence of secret data. Security and the privacy of the data over internet and communication technique is a prime concern among content owner. To avoid the unauthorized access of data over communication, a novel and reliable data hiding technique is proposed in this study based on powerful standard stream cipher algorithm and Stationary Wavelet Transform (SWT). At first, the original image is decomposed by SWT and four sub bands are obtained. The obtained sub bands are encrypted by using encryption key, which is generated by stream cipher algorithm. After that the secret data is embedded with encrypted sub-bands by using data hiding key and transmits over transmitter one by one. The secret sub-band is retrieved at the receiver side by using appropriate data hiding key otherwise receiver couldn't access the secret sub-band. Similarly, the original image content is retrieved by appropriate decryption key along with SWT reconstruction.
Based on some recent results derived from the Shannon theory of secrecy systems, this paper develops a new mathematical model for an infinite cryptosystem with perfect secrecy, and establishes a sufficient condition f...
详细信息
Based on some recent results derived from the Shannon theory of secrecy systems, this paper develops a new mathematical model for an infinite cryptosystem with perfect secrecy, and establishes a sufficient condition for a cryptosystem of perfect secrecy with non-uniformly distributed keys based on several groups of orthogonal Latin squares. The new model has the following features and advantages. First, the model with non-uniformly distributed keys, where the number of keys can be many more than the number of messages in a secrecy system, greatly improves the common one with finite perfect secrecy based on modulo additions in the current literature. Second, the model can be regraded as a theoretical base for designing practical block cipheralgorithms. Third, since the number of basic cryptosystems in the new model is many more than that of the basic cryptosystems available in the current literature, it helps design new stream and block cipheralgorithms with practical security and better resistance to known plaintext attacks. Finally, the present research on infinite secrecy systems of the new model is theoretically valuable and practically useful, as illustrated by an example of designing new basic cryptosystems under the conditions of the new model.
The main function components used in stream cipher algorithm Mickey is linear or nonlinear module shift register. Through analyzing its structural characteristics, a kind of reconfigurable module feedback shift regist...
详细信息
The main function components used in stream cipher algorithm Mickey is linear or nonlinear module shift register. Through analyzing its structural characteristics, a kind of reconfigurable module feedback shift register hardware architecture design is proposed, which constructs Boolean calculation block(BCB) based on the improved look-up table. It can achieve the feedback function's computing at every MFSR level and can reconfigurable realize 32, 64, and 128 level MFSR through BCB different cascaded combinations. Therefore, the design has considerable advantage on efficiency and flexibility.
暂无评论