The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the modern digital era, the storage of digital data in multi-users systems and transmission over the internet is prime important in the society. The cryptographic technique is one of the possible solutions for protecting digital information for unauthorized uses. In this technique, the encryption algorithm should be simple to design and implementation. In the proposed article, a novel color image...
Multimedia data, nowadays, needs high levels of security as it is widely transferred over various networks. One of the newly-invented and most attracting safety-raising strategies is the chaos-based cryptography. This paper examines the competence of an algorithm for image encryption that uses a double-chaotic logistic map equation. The algorithm produces two sequence keys (K1 & K2) in two phases...
RSA algorithm is used to hide and retrieve the data in an insecure network environment. The advantage of RSA algorithm is to increase security and accessibility. The private keys never required to be transferred or exposed to everybody. In a shared-key cryptographic system, the secret keys must be shared since exactly the same key is used for encryption and decryption. So there may be a chance that...
In this paper we have proposed an innovative way to modify RSA algorithm in order to improve the security level of this scheme. The two-variable bijective mapping is utilized in this scope. A mathematical background of bijective function is discussed in order to understand the proposed technique. First of all the original RSA algorithm is discussed then the proposed modification methodology is explained...
Security is the major aspect in any type of communication systems. The generation of secret keys randomly provides good security as well as better complexity in cryptographic based algorithms. In literature there exist symmetric key algorithms which use the same key for encryption as well as decryption. Among all the algorithms, Advanced Encryption Standard (AES) is used in many fields of security...
Now a day, need for fast accessing of data is increasing with the exponential increase in the security field. QR codes have served as a useful tool for fast and convenient sharing of data. But with increased usage of QR Codes have become vulnerable to attacks such as phishing, pharming, manipulation and exploitation. These security flaws could pose a danger to an average user. In this paper we have...
In confidential data transmission data security is an important factor. Advance Encryption Standard is symmetric cryptography standard used for confidential data transmission. However, some faults are injected during implementation of AES to reduce its reliability and may cause information leakage. Fault detection scheme includes the details of each transformation in AES algorithm. Simulation results...
Play Fairal gorithm has been enhanced in various ways. One of the methods is to increase the confusion rates by transforming the algorithm into 3D-playfair which has four tables of 4×4 and accepts trigraph rather than digraph. This paper further enhances the 3D-playfair algorithm by extending its tables and hereby increasing the security level as well as supporting the characters of all the world's...
In recent world, the way of transferring the secured information particularly in public sectors, has faced more challenges. To minimize these challenges, cryptographic concepts has been introduced. Cryptography is the art of technique that is used to changing the information in to unreadable format based on the user's key. Various cryptographic concepts have been introduced for text and image. Due...
The security of information being stored and transmitted is paramount in today's world. Many efficient encryption standards exist for securing classified data from cyber threats. Two common types of encryption algorithms are classified as Symmetric and Asymmetric. With Symmetric encryption, the same key/password is used to cipher and decipher data whereas with Asymmetric algorithms, we have different...
Today we are enjoying the benefits of technology, particularly in the field of communication, in the form of anywhere and anytime communication. One of the causes for this achievement is building global computer networks. The technological growth in the field of wireless technologies provides communication between mobile users. Any invention is to say success, only if it is useful in a meaningful...
Now-a-day's network security has become an important issue. Security is most important part in data communication system. Fast progress of data exchange in electronic way, security of information is most important in data storage and also while transmission. That's why in this paper the designing of all circuit is made combinational design. Using of this combinational circuit there is zero delay at...
With the fast progression of digital data exchange information security has become an important issue in data communication. Encryption algorithms play an important role in information security system. These algorithms use techniques to enhance the data confidentiality and privacy by making the information indecipherable which can be only be decoded or decrypted by party those possesses the associated...
Biometric could play an essential role in the future authentication system. So the security of biometric data is becoming a challenging problem now a days. We are proposing a cryptographic algorithm for securing biometric template using double hill cipher with the random permutation of pixels locations and self-invertible key matrix. The random permutation creates diffusion by permuting the location...
In cloud computing distributed resources are shared via network in open environment. Hence user can easily access their data from anywhere. At the same time there exist privacy and security issues due to many reasons. First one is dramatic development in network technologies. Another is increased demand for computing resources, which make many organizations to outsource their data storage. So there...
In cryptographic applications, the data sent to a remote host are encrypted at the source machine using an encryption key and then the encrypted data are sent to the destination machine, where it is decrypted to get the original data. Thus the attacker will not have the encryption key which is required to get the original data and so a hacker can do nothing with any cryptographic system. Reprogrammable...
FPGA is an integrated circuit, which can be reconfigured by designers themselves. FPGA are reprogrammable silicon chips. Field Programmable Gate Arrays (FPGA) are used for hardware implementations of cryptographic algorithm. This paper presents an FPGA based Hardware implementation of Boolean algebra based cryptographic algorithm for secure transmission. Using this algorithm, we can hide the meaning...
AES represents the algorithm for advanced encryption standard consistof different operations required in the steps of encryption and decryption. The proposed architecture is based on optimizing area in terms of reducing no of slices required for design of AES algorithm in VHDL. This paper presents AES-128 bit algorithm design consist of 128 bit symmetric key. The AES implementation, merging technique...
AES algorithm or Rijndael algorithm is a network security algorithm which is most commonly used in all types of wired and wireless digital communication networks for secure transmission of data between two end users, especially over a public network. This paper presents the hardware implementation of AES Rijndael Encryption and Decryption Algorithm by using Xilinx Virtex-7 FPGA. The hardware design...
Cryptography is a technique by which the stored and transferred data in a particular form can be comprehended and processed by only those, who it is intended for. In the modern era, cryptography is most often associated with the deception of the plaintext into a cipher text using a process called Encryption then back to the original plaintext using a process called Decryption. Strong cryptography...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.