The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The need of image security is increasing due to image communication is increasing rapidly. There are several different research work are going in this direction but still there is the need of betterment and the possibility of improvement is there. So focusing the security possibility an improved cryptography system based on RSA and RC6 have been proposed in this paper. The specialty of this approach...
Connection setup in software-defined networks (SDN) requires considerable amounts of processing, communication, and memory resources. Attackers can target SDN controllers with simple attacks to cause denial of service. We proposed a defense mechanism based on a proof-of-work protocol. The key characteristics of this protocol, namely its one-way operation, its requirement for freshness in proofs of...
Nowadays information is shared through online resources. It is necessary to provide security to the shared information. To maintain the secrecy of the information shared various techniques are used. Enabling multiple encryptions will disable the interloper to recover the information and to strengthen the security multi fold. Multiple Encryption are performed by shifting the particular block of the...
This paper presents a proposed approach called VAIL System Call Monitor (VSCM) to detect and thwart previously unknown code injection attacks. The idea is based on the fact that any process needs to correctly invoke CreateProcess() system calls, otherwise child-process creation will fail. VSCM intercepts and verifies CreateProcess() system call invocations from a monitored process. In case an unknown...
DNA cryptography is a new promising direction in cryptography research that emerged with the progress in DNA computing field. Traditional cryptographic systems have long legacy and are built on a strong mathematical and theoretical basis. So, an important perception needs to be developed that the DNA cryptography is not to negate the tradition, but to create a bridge between existing and new technology...
One of the core skills that Computer Science undergraduates master is to create finite automata and regular expressions from natural-language descriptions of formal languages. It is quite common for such descriptions to be ambiguous (or appear to be so), particularly when instructors or students are not fluent in the natural language. Two questions arise: (1) Can an instructor unambiguously convey...
In cryptographic applications, super long integer operations are often used. However, cryptographic algorithms generally run on a computer with a single-core CPU, and the related computing process is a type of serial execution. In this paper, we investigate how to parallelize the operations of super long integers in multi-core computer environment. The significance of this study lies in that along...
This paper focuses on parallelizing the most time-consuming statistical tests of the pseudorandom number generators for execution on the Graphics Processing Unit using NVIDIA Compute Unified Device Architecture. We propose new efficient parallel strategies for several tests that exhaust most time and hardware resources from a Statistical Test Suite for Random and Pseudorandom Number Generators of...
This paper proposes a modification to standard cryptographic techniques. The key idea is to mitigate side channel attacks by dynamically changing the encryption key with redundant numbers at each encryption step. Side channel attacks currently are a major vulnerability; they exploit the implementation of the cryptosystem rather than attacking the cryptosystem. Side channel attacks have a wide range...
Steganography is a method of hiding information, whereas the goal of cryptography is to make data unreadable. Both of these methodologies have their own advantages and disadvantages. Encrypted messages are easily detectable. If someone is spying on communication channel for encrypted message, he/she can easily identify the encrypted messages. Encryption may draw unnecessary attention to the transferred...
Cryptography and Encryption methods are means to ensure confidentiality of data transferred from one computer to another. While design of appropriate security protocols is vital for information security, making sure that they are implemented accurately and effectively is even more important. Effective implementation of encryption algorithms and security protocols involves implementing big number arithmetic...
The process of jumbling up the contents of a secret message so as to secure it, is known as cryptography, whereas the process of hiding the very existence of a secret message is known as steganography. The term “steganography” describes the method by which the contents of a secret message are concealed inside some other medium, so as to avoid any kind of detection by an intruder. In this paper, we...
In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication...
This paper presents new aspects of using biometric features and patterns for creation of new cryptographic protocols. These protocols are dedicated for secure information sharing and distribution processes. Such algorithms allow protecting confidential data sets, and performing secure operation for different kinds of information. Bio-inspired techniques for securing information will be presented on...
Linear (k,n) secret sharing scheme is a class of (k,n) secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an important role in other cryptographic systems, such as multi-party computation and function sharing schemes. On the other hand, cheating problem in (k,n) secret sharing is an important issue, such that cheaters (dishonest players) submit forged shares...
Designing a secure routing protocol to ensure the network and privacy security is a huge challenge for the Internet of Things. In this paper, a new security routing protocol named PALXA is proposed. The PALXA integrates a new AGV (Arrow-d'Aspremont-Gerard-Varet) mechanism based on the mechanism design theory with the subject logic based reputation mechanism to provide secure and privacy-aware routing...
A Cellular Automaton is one of the most engrossing fields of studies. At the present digital world where almost every communication is being done via internet, requirement of security and privacy of information is must. For securing big or small data over internet, cryptographic techniques are essential. Usage of cellular automata characteristics in the field of cryptography is still not much explored...
Traditional e-voting schemes use centralized and nontransparent count centers which leads to distrust of the centers and their doubt of the voting on impartiality and correctness. In this paper, we propose a distributed and verifiable e-voting scheme based on Mignotte's threshold secret sharing scheme. Our scheme effectively regulates the interests conflict between voters and count centers. Additionally,...
Cloud computing is based on network and computer applications. In cloud data sharing is an important activity. Small, medium, and big organization are use cloud to store their data in minimum rental cost. In present cloud proof their importance in term of resource and network sharing, application sharing and data storage utility. Hence, most of customers want to use cloud facilities and services....
In response to recent cyberattacks, mathematicians, cryptographers, and security experts have advocated developing alternative approaches for building "high-assurance" cryptographic software. There's evidence that computer tools that deliver high-assurance cryptographic software are within our reach.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.