The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A data encryption model based on logistic map is studied and multiple chaotic dynamical systems were implemented to improve by addressing the issues related to use of logistic map. Use of different chaotic systems other than logistic map, provides us to vary control parameters to a larger extent, hence enabling to overcome the limitations of logistic map without compromising security of data. Further,...
RSA algorithm is used to hide and retrieve the data in an insecure network environment. The advantage of RSA algorithm is to increase security and accessibility. The private keys never required to be transferred or exposed to everybody. In a shared-key cryptographic system, the secret keys must be shared since exactly the same key is used for encryption and decryption. So there may be a chance that...
3C consist of three terms a. Cryptography b. Cascade c. Customized In brief It protects data from being viewed or modified and provides a secure means of communication over insecure channels by encrypting data multiple time using different algorithms selected by users as per their need. Thus key size and cipher text size will increase which leads to more security rather than regular, single algorithm.
Block ciphers are very important in communication systems as they provide confidentiality through encryption. Today's block ciphers need not only high cryptographic security but also high performance encryption and decryption, as well as the ability to adapt in special environments. This paper focuses on improving the security and performance of AES-256 algorithm, based on improving diffusion layer...
Huge amount of data are generated and transmitted over the world each second. Transmitting the data over the network and using the data in the applications create a need to protect this data from unauthorized entities, especially if this data are sensitive or confidential. Many techniques were used to protect the data such as Encryption. Encryption is a very popular technique was used to protect data...
Security is the major aspect in any type of communication systems. The generation of secret keys randomly provides good security as well as better complexity in cryptographic based algorithms. In literature there exist symmetric key algorithms which use the same key for encryption as well as decryption. Among all the algorithms, Advanced Encryption Standard (AES) is used in many fields of security...
Security is major concern in data handling, communication, message transmission and electronic transaction on public network. Cryptography (secret writing) is the encryption process of transformation of messages to make information secure and resistant to attack. AES is symmetric encryption standard recommended by NIST. AES is proved to be highly secure, faster and strong encryption algorithm. AES...
DNA cryptography is one of the promising fields in cryptographic research which emerged with the evolution of DNA computing. In this era, end to end transmission of secure data by ensuring confidentiality and authenticity over the networks is a real challenge. Even though various DNA based cryptographic algorithms exists, they are not secure enough to provide better security as required with today's...
Play Fairal gorithm has been enhanced in various ways. One of the methods is to increase the confusion rates by transforming the algorithm into 3D-playfair which has four tables of 4×4 and accepts trigraph rather than digraph. This paper further enhances the 3D-playfair algorithm by extending its tables and hereby increasing the security level as well as supporting the characters of all the world's...
With the rapid increase of the Internet users, network security becomes very essential. Cryptography plays a major role in network security. However, cryptographic systems consume considerable amounts of resources, like memory, CPU time, encryption and decryption time. In this paper, we compared the most common block cipher modes of operation on AES according to the recommendations of the National...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper, we propose a lightweight, computationally efficient protocol, called CLOAK, for the mobile device. CLOAK is based on stream cipher and takes the...
This paper presents a new Hybrid security algorithm for RSA cryptosystem named as Hybrid RSA (HRSA). Here computation of "public key" (P) as well as "private key" (Q) depends on the value of M, where M is the product of four prime numbers. So complexity involved in factorizing the variable M increases. Another interesting feature about this algorithm is that the computation of...
The process of exchanging information is called communication. Communication is done using wired media as well as wireless media. While communicating through wireless media data security plays a major role. Data security is mainly concerned with ensuring security during communication, transmission as well as in data storage. To protect data from intentional internal security breaches and unauthorized...
Sharing encrypted data with different users gained great attention in the cloud environment. There have some security issues like data leaks during data sharing, key management of shared data etc. In our project we developed a system which enables secure data sharing in the group of users as well as efficient key management. In our proposed system we used public key cryptography for securely storing...
The security of information being stored and transmitted is paramount in today's world. Many efficient encryption standards exist for securing classified data from cyber threats. Two common types of encryption algorithms are classified as Symmetric and Asymmetric. With Symmetric encryption, the same key/password is used to cipher and decipher data whereas with Asymmetric algorithms, we have different...
Camouflaging of twofold images is necessary while information's are communication through image. Technology brings the communication easier, most of the communication today through open network, for this threats also increased frequently. This paper brings the new technique called flow code procedure technique. Given binary image converted into text representation and encrypted using flow code procedure...
In this article, a novel technique about secure medical information transmission of patient inside medical cover image is presented by concealing data using decision tree concept. Decision tree shows a robust mechanism by providing decisions for secret information concealing location in medical carrier image using secret information mapping concept. RSA encryption algorithm is being used for patient's...
Now-a-day's network security has become an important issue. Security is most important part in data communication system. Fast progress of data exchange in electronic way, security of information is most important in data storage and also while transmission. That's why in this paper the designing of all circuit is made combinational design. Using of this combinational circuit there is zero delay at...
With the fast progression of digital data exchange information security has become an important issue in data communication. Encryption algorithms play an important role in information security system. These algorithms use techniques to enhance the data confidentiality and privacy by making the information indecipherable which can be only be decoded or decrypted by party those possesses the associated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.