The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the core issues for robust cryptographic systems is to deal with the rate of diffusion and distribution of keys. We try to strengthen this aspect by increasing the length of block ciphers. We present a new encryption and decryption algorithm for block cipher that supports 27 bit block size. All components in our system are chosen to be based on cellular automata so as to achieve higher parallelism...
This paper presents a very low power and area efficient ASIC implementation of Advanced Encryption Standard Algorithm (AES). The implementation results of S-Box, MixColumn Transformation and overall AES encryption/ decryption are given in this paper. The AES has been implemented in 90nm standard CMOS library using Synopsys Design Compiler with a core voltage of 1.2V. The power dissipation of S-Box...
There are a number of algorithms which provide methods to encrypt parts of video frames to make them unrecognizable or degraded. The proposed scheme treats the video as a sequence of ordered frames and provides an algorithm to break this order of frames by first distributing frames into n frame-sequences and then by internally scrambling these frame-sequences using proper keys. Any of these frame...
DNA cryptography is a new field in cryptography that is emerging with the advancement on DNA research carried out in recent years. DNA is being used because of its vast parallelism, energy efficiency and the amount of information that the DNA can store. These properties of DNA are explored for cryptographic purposes such as encryption, authentication, signature, and various other applications in cryptography...
A novel technique is proposed for encryption and compression. Here an image is first encrypted using the stream cipher and then compressing the encrypted image using SPIHT. The panorama here stands for using the highly efficient encryption standard and unabating experience of compression techniques. The stream ciphers are chosen for their high encryption rate and they are mainly of bit-by-bit encryption...
Ever since the rise of technology and communication, the want of security system has also gone up. The indispensable facets of secure data transmission are none other than sheltered, hasty last but not least multifarious cryptosystem. The other dimension of information hiding is steganography. The downside of cryptography is though the secret is cloaked, communication is not rather disguised. For...
Image authentication plays an important role in the peer-to-peer (P2P) file sharing system. In the file sharing process, there is a chance for alteration of the original contents by unknown intermediaries. In the present study, an attempt is made to identify the malicious attack in the original image by predictive lossless coding. In order to authenticate the received image, a predictive encoded quantized...
As most of the web applications are associated with database as back end so there are possibilities of SQL injection attacks (SQLIA) on it. Even SQLIA is among top 10 attacks according to Open Web Application Security Project but still approaches are not able to give proper solution to this problem. Number of measures are also discovered to overcome this attack, but which measure is more convenient...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.