The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since NSA announced the plans for transitioning to the algorithms which are resistant to attacks by the potential quantum computers, the interest of implementation of post-quantum cryptography (PQC) on various devices has emerged. Including widely used Java Card, memory-constrained smart cards need the efficient implementation of encryption schemes to resist quantum-computing attacks. Meanwhile, lattice-based...
This paper presents an efficient algebraic fault analysis on all four modes of SHA-3 under relaxed fault models. This is the first work to apply algebraic techniques on fault analysis of SHA-3. Results show that algebraic fault analysis on SHA-3 is very efficient and effective due to the clear algebraic properties of Keccak operations. Comparing with previous work on differential fault analysis of...
There are various methods of anti-forensics many of which are simple and robust, however, some advanced techniques such as Deniable Encryption not only are powerful but also proven to be unbreakable in the mathematical sense. Thus, studying them has a crucial role in the science of digital forensics research. In this research, we propose a new technique for deniable encryption based on RSA with OAEP...
There is high need for data encryption. Accordingly, there are several techniques to encrypt and encode data. Unicode has become a unified global coding system. The special feature of Unicode system is that it can be expanded and it is adopted by many computer fonts' ready-package programs. This research work uses FontCreator program, which adopts unified global coding system, to generate computer...
A new method will be proposed in this paper to encrypt an image using a secret key contain an image information. In our new LFSR method of color image encryption to produce random numbers used in the reorder position of the image pixels. The initial value will generate random numbers to reorder position of each pixel in the row of image in the first encryption process and each pixel in the column...
This paper proposes a modification to standard cryptographic techniques. The key idea is to mitigate side channel attacks by dynamically changing the encryption key with redundant numbers at each encryption step. Side channel attacks currently are a major vulnerability; they exploit the implementation of the cryptosystem rather than attacking the cryptosystem. Side channel attacks have a wide range...
In the present paper the authors have introduced a new symmetric key cryptographic method which is based on several bit level operations on any plain text file. Nath et al already developed Bit Level Encryption Standard ver-1, 2, 3, Bit level Multi way Feedback encryption standard. Recently Nath et al also developed 2-dimensional and 3-dimensional multiway feedback encryption standard. In the present...
Steganography is a method of hiding information, whereas the goal of cryptography is to make data unreadable. Both of these methodologies have their own advantages and disadvantages. Encrypted messages are easily detectable. If someone is spying on communication channel for encrypted message, he/she can easily identify the encrypted messages. Encryption may draw unnecessary attention to the transferred...
The Dhall-Pal Cipher (DPC) is a 128-bit block cipher with a 128-bit key introduced by Dhall and Pal in 2010. It is based on the substitution-permutation network (SPN) structure, and has elements in common with the Advanced Encryption Standard (AES). The most significant differences between the DPC and the AES occur in the linear transformation stage, some components of which are key-dependent in the...
This paper proposes a new offline TTP-based fair exchange protocol. The protocol will allow customers to buy physical products (such as computers, furniture, and so forth) from merchants online. The protocol will ensure fairness for both customer and merchant. That is, the customer will get the physical product and the merchant will get the payment or neither does. Only six messages to be exchanged...
In this research, we aim to encrypt secret information with high security. In our approach, Residue Number System (RNS) is used to encrypt and Huffman coding and Lempel-Ziv-Welch (LZW) compression algorithm are used to compress information. In the embedding process, Data Encryption Standard (DES) algorithm is used to earn high security.
This study centers on multiple-scheme encryption using annotation technology. The objective was to propose a composite encryption framework that combines several encryption specifications. It was assumed that combining several encryption standards can further enhance information security. It divided a message to be encrypted into packets and each packet was coded with a methodology independent of...
Information security involves many components, including communication security, computer security, physical security, and personnel security. This paper deals only with communication and computer security. In systems that involve either communications systems or monolithic computer systems (but not both) the overall requirements for information security are relatively straightforward, or at least...
Cryptography is no longer the province of a specialized elite of mathematicians and military operatives. Its potential cost-effective applications to modern computer/communications systems appear to be many and varied. In spite of disappointing sales of cryptographic equipment, the market for these devices is expected to rapidly expand over the next several years.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.