The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital forensic evidence (DFE) is composed of exhibits, each consisting of a sequence of bits, presented by witnesses in a legal matter, to help jurors understand the facts of the case and support or refute legal theories of the case. The exhibits should be introduced and presented and/or challenged by properly qualified people using a properly applied methodology that addresses the legal theories...
The first part of the chapter describes some examples of multimedia forgery. Here, multimedia data, including images, audio recordings or videos, etc., are forged by any of the following operations: data removal, replacement, replication, photomontage, or computer-aided media generation. The second part presents the concept of multimedia forensics and its corresponding functions. Multimedia forensics...
The Subject of Communication and Information Security (CIS) [38.1, 2], the transfer of accurate and uncompromised information as well as the secure transfer of information has become an international issue ever since 31 December 1999. The year 2000 scare, which has been coded as the Y2K scare, refers to what prominent scientists and business people feared that all computer networks and the systems...
Actors in our general framework for secure systems can exert four types of control over other actors’ systems, depending on the temporality (prospective vs. retrospective) of the control and on the power relationship (hierarchical vs. peering) between the actors. We make clear distinctions between security, functionality, trust, and distrust by identifying two orthogonal properties: feedback and assessment...
Public-key cryptography ensures both secrecy and authenticity of communication using public-key encryption schemes and digital signatures, respectively. Following a brief introduction to the public-key setting (and a comparison with the classical symmetric-key setting), we present rigorous definitions of security for public-key encryption and digital signature schemes, introduce some number-theoretic...
Elliptic curve cryptography, in essence, entails using the group of points on an elliptic curve as the underlying number system for public key cryptography. There are two main reasons for using elliptic curves as a basis for public key cryptosystems. The first reason is that elliptic curve based cryptosystems appear to provide better security than traditional cryptosystems for a given key size. One...
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find...
For much of human history, cryptography has generally been a stream-based concept: for example, a general writes down a note, and a soldier encrypts it letter-by-letter to be sent on. As written language is based on letters and symbols, it is natural that our initial designs for encryption and decryption algorithms operate on individual symbols. However, the advent of digital computers paired with...
This chapter presents new possibilities for a design of chaotic cryptosystems on the basis of paradigms of continuous and discrete chaotic maps. The most promising are discrete chaotic maps that enable one to design stream ciphers and block ciphers similar to conventional ones. This is the result of the fact that discrete-time dynamic chaotic systems naturally enable one to hide relations between...
Cryptography is the backbone upon which modern security has been established. For authentication, conventional cryptography depends on either secret knowledge such as passwords or possession of tokens. The fundamental problem of such mechanisms is that they cannot authenticate genuine users. Biometrics such as fingerprints, faces, irises, etc., are considered as uniquely linked to individuals and...
A few years ago the technological development of a novel technology started that is widely known as “Quantum Cryptography”. But Quantum Cryptography is not a cryptographic technology. It uses some quantum physical principles to exchange binary keys between two partners that can be used subsequently to encrypt communication data. Therefore the technology can be better described as “Quantum Key Distribution”...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.