The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid increase of the Internet users, network security becomes very essential. Cryptography plays a major role in network security. However, cryptographic systems consume considerable amounts of resources, like memory, CPU time, encryption and decryption time. In this paper, we compared the most common block cipher modes of operation on AES according to the recommendations of the National...
In the healthcare field the patient data is very sensitive. So the hospitals should have some plan to protect it as well. However, in US alone a number of hospitals are attacked by cybercriminals through ransomware malwares to make big bucks. The hospitals should be prepared when given such situation where they have to pay money to get their data back. Now the question arises should they be paying...
Elliptic curves in the geometric and algebraic parlances have been studied by computer scientists over the last few decades. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosystem. The main advantage and benefit of using ECC instead of using RSA is that it gives equivalent security for a smaller key, thereby consuming less resource and ameliorating performance on the systems...
Elliptic curve cryptosystem has been heavily studied by computer scientists for many decades. This form of cryptosystem is based on elliptic curves over some Galois fields. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosystem that makes use of public and private key pairs as a means of encrypting and decrypting information in the internet. The critical security of ECC relies...
A new method will be proposed in this paper to encrypt an image using a secret key contain an image information. In our new LFSR method of color image encryption to produce random numbers used in the reorder position of the image pixels. The initial value will generate random numbers to reorder position of each pixel in the row of image in the first encryption process and each pixel in the column...
Cryptography is a technique by which the stored and transferred data in a particular form can be comprehended and processed by only those, who it is intended for. In the modern era, cryptography is most often associated with the deception of the plaintext into a cipher text using a process called Encryption then back to the original plaintext using a process called Decryption. Strong cryptography...
In the global networked world, there is a phenomenal growth in data transfer and sharing. Security plays a vital role in transmitting the private data over the communication medium which tends to be open and insecure. The threat posed by an intruder in accessing the “not to be disclosed data” has been a genuine apprehension for the communication specialists. In this paper we propose a new approach...
A Cellular Automaton is one of the most engrossing fields of studies. At the present digital world where almost every communication is being done via internet, requirement of security and privacy of information is must. For securing big or small data over internet, cryptographic techniques are essential. Usage of cellular automata characteristics in the field of cryptography is still not much explored...
Cloud computing is based on network and computer applications. In cloud data sharing is an important activity. Small, medium, and big organization are use cloud to store their data in minimum rental cost. In present cloud proof their importance in term of resource and network sharing, application sharing and data storage utility. Hence, most of customers want to use cloud facilities and services....
Nowdays, image processing is applied to send an enhanced image in all applications including forensics, robotics, military communications. However, these applications have a additional overhead of image security. AES is one of the high speed technique which is used widely against various attacking techniques inspite of its high computational complexity. In this paper we propose the novel implementation...
Current era is cyber era, mostly people are dependent on online task, to keep the message secure from the hackers and crackers there is need of strong cryptography. Hackers are becoming intelligent day by day to attack on data as per their experience gain. Cryptography is a private communication in the public world. A cryptosystem should be secure even if the attacker (intruder) knows all the details...
The Cryptography is very good area for research now a days. As we know that security is very primary requirement for the any business. And for that we need very strong and unbreakable algorithm which provides high security. For that we need encryption and decryption algorithm which is having very high security with very good throughput. If we look at the real world, there are lots of organizations...
For the realistic demand of data security communications, the paper proposes a new algorithm for encryption/decryption based on the theory of artificial immunization. It is a new method based on the negative selection algorithm and extracts the encryption factor from the plaintext. Encryption factor as a key group is expanded by the way of the m-sequence and generates pseudo-random key sequence that...
The embedded based applications need sensitive data transfer between different nodes. In order to increase the speed and to reduce the hardware complexity, this proposed system focuses on the light weight security algorithm Tiny Encryption Algorithm TEA which can be implemented in microcontroller to adapt with many real time constraints such as memory, data loss and low cost. The additive feature...
Communications usually do not have enough security. One of the ways for making the data secure is using methods for coding the information in a special manner. In this article one of the algorithms of coding and decoding information has been reviewed and explained. Coding is converting information to the form of coded text and decoding is the operation of converting coded information to the original...
We introduce a non-interactive RSA time-lock puzzle scheme whose level of difficulty can be arbitrarily chosen by artificially enlarging the public exponent. Solving a puzzle for a message m means for Bob to encrypt m with Alice's public puzzle key by repeated modular squaring. The number of squarings to perform determines the puzzle complexity. This puzzle is non-parallelizable. Thus, the solution...
In allusion to the malpractice about pure software encryption techniques, this article puts forward an exploring thought and design process of a hardware encryption and decryption system. This system applies DES encryption algorithm, implements hardware encryption and on-line upgrade. It adopts FPGA chip and MCU as the control cores, applies microchip control technology to implement PCI bus protocol,...
In this paper, we proposed a file backup method. Files in devices of computer system can be destructed under abnormal condition. We divide file or database into ranges. Each range contains records and fields. We backup ranges to different devices. When files process the operation of creation, insertion, update or deletion, we only backup the corresponding ranges. When the original file is destructed,...
Grid computing architecture was defined to be a complete physical layer. The message transfer in network must be in secure. In this study, we propose the encryption algorithm in every grid node to keep information in security. Sender requests key code from receiver grid node, uses this key code to encrypt message to produce cipher text and sends out. Receiver also uses this key code to decrypt cipher...
LUC cryptosystem is a public key cryptosystem based on Lucas functions. The encryption of this cryptosystem is relatively easy since we have the knowledge of public key e, two primes p and q and also the message M. Meanwhile, decryption process is difficult without the knowledge of private key d. In this paper, we are presenting a technique that can be used to compute private key for LUC cryptosystem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.