The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most programs related to security communicate with servers through encrypted channels, and sensitive data that are transmitted should be encrypted using a suitable protocol. Transport Layer Security (TLS) is a protocol that encrypts data by exchanging key materials in a secure way. Protocol analyzers in turn decrypt packets to see the raw protocols in plain text. Decryption is not a minor job, and...
Memory forensics has become an important part of digital forensic investigation. Its importance has increased due to the type of information resides within memory that can be extracted using appropriate tools. This information includes open processes, open dynamically linked libraries (DLLs), encryption keys, function parameters passed at runtime, and login information. In this paper, we propose a...
This paper presents a FPGA (Field Programmable Gate Array) based secured speech signal communication system. The system consists of compression, encryption and water- marking. Watermark provides authentication and ownership verification. Encryption is used for security of watermark and voice signal. As random numbers are used as a key for the encryption process, the signal is secured for both wired...
Information security is an important issue. Today's encryption technologies can be traced back to the earliest ciphers, and have grown as a result of evolution. The first ciphers were cracked, so new, stronger ciphers emerged. Code breakers set to work on these and eventually found flaws, forcing cryptographers to invent better ciphers and so on. Hill Cipher is one of the most famous symmetric cryptosystem...
This paper presents an originally encryption system implemented on a structure of hybrid additive programmable cellular automata (HAPCA). As the development of cellular automata (CA) applications is generally an experimental effort, the research implies the exploration through simulation of the huge space of cellular automata local rules and global states. The encryption and decryption modules are...
In this paper we present a new approach for identifying the crypto routines in different types of malware. In traditional malware analysis, like sandboxing, network data is examined as seen on the wire or data is collected as it is written to a file. The use of proprietary binary formats, obfuscation, or encryption hides important details, which are necessary for investigating malicious behavior....
In recent years, there has been increasing concern about ??database as a service??(DAS) architectures. Data security is the overriding concern in DAS, and encryption is a natural solution. However, queries over encrypted databases are usually inefficient due to a heap of time on the encryption and decryption. In this paper, we present an encryption scheme and XQuery translation model of XML database...
Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations...
The purpose of CEDA (certified electronic document authority) is to guarantee reliability and stability of electronic documents. When using storage and issuance services which are one of core services offered by CEDA, users register their electronic documents and they are issued to a third party later on. In this process, issuance of partial information (part page) instead of the entire registered...
In this paper, we proposed a file backup method. Files in devices of computer system can be destructed under abnormal condition. We divide file or database into ranges. Each range contains records and fields. We backup ranges to different devices. When files process the operation of creation, insertion, update or deletion, we only backup the corresponding ranges. When the original file is destructed,...
In traditional image encryption system, decryption is extremely sensitive to packet loss. However, in wireless networks, packet loss is inevitable. Compressed sensing (CS) theory shows that sparse signal can be recovered from few incomplete measurements of it. Strong randomness of measurement matrix and irrelevance among the elements of the measurement vector imply that measurement process can be...
Grid computing architecture was defined to be a complete physical layer. The message transfer in network must be in secure. In this study, we propose the encryption algorithm in every grid node to keep information in security. Sender requests key code from receiver grid node, uses this key code to encrypt message to produce cipher text and sends out. Receiver also uses this key code to decrypt cipher...
There are a lot of important and sensitive data in databases, which need to be protected from attacks. To secure the data, Cryptography support is an effective mechanism. However, a tradeoff must be made between the performance and the security because encryption and decryption greatly degrade the query performance. In this paper, a framework is proposed that can quickly implement query over encrypted...
Based on the analysis of 41 popular block ciphers, we research the characteristics of conventional substitution boxes, and then analyze the realization methods of the substitution box. A efficient and flexible specific instruction is proposed, which can execute four kinds S-boxes substitution including 4-4, 6-4, 8-8, 8-32, and perform operation on different pages. Besides, it can meet the various...
Traditionally, it has been difficult to deploy mobile Java security in mass market mobile devices primarily due to size and speed constraints. NTRU, a relatively new public key cryptosystem based on the shortest vector problem in a lattice, with many advantages compared with other cryptosystems, such as high speed and low memory use, provides the possibility to overcome the constraints. This paper...
Grid computing architecture was defined to be a complete physical layer. Data transfer in network must be in secure. In this study, encryption and decryption algorithms of a site authentication and its message are developed and applied in each grid node to ensure secure transmitted information. If the site information has been built in supervisor node then it can receive data sent from other grid...
This paper will present the design, implementation and performance of a FIPS - approved cryptographic algorithm - Advanced Encryption Standard (AES), which can be used to protect electronic data. This system consists of two main components: cipher and key-expansion. Furthermore, there are four small parts in process of cipher: subbytes and its inverse, shiftrows and its inverse, mixcolumns and its...
LUC cryptosystem is a public key cryptosystem based on Lucas functions. The encryption of this cryptosystem is relatively easy since we have the knowledge of public key e, two primes p and q and also the message M. Meanwhile, decryption process is difficult without the knowledge of private key d. In this paper, we are presenting a technique that can be used to compute private key for LUC cryptosystem...
Conventional approach of detecting malwares relies on static scanning of malware signature. However, it may not work on the malwares that use software protection methods such as encryption and packing with run-time decryption and unpacking. We propose a hardware-assisted malware detection system that detects malwares during program run time to complement the conventional approach. It searches for...
SSL/TLS servers are often overloaded with many simultaneous requests or denial of service (DoS) attack which will result in degradation of performance. So SSL/TLS servers have to utilize significantly more hardware in order to provide a reasonable response time to their customers. Instead of developing the hardware, it is always possible to look for faster algorithms in order to speed up decryption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.