The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Elliptic curves in the geometric and algebraic parlances have been studied by computer scientists over the last few decades. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosystem. The main advantage and benefit of using ECC instead of using RSA is that it gives equivalent security for a smaller key, thereby consuming less resource and ameliorating performance on the systems...
Elliptic curve cryptosystem has been heavily studied by computer scientists for many decades. This form of cryptosystem is based on elliptic curves over some Galois fields. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosystem that makes use of public and private key pairs as a means of encrypting and decrypting information in the internet. The critical security of ECC relies...
Cryptography is a technique by which the stored and transferred data in a particular form can be comprehended and processed by only those, who it is intended for. In the modern era, cryptography is most often associated with the deception of the plaintext into a cipher text using a process called Encryption then back to the original plaintext using a process called Decryption. Strong cryptography...
A Cellular Automaton is one of the most engrossing fields of studies. At the present digital world where almost every communication is being done via internet, requirement of security and privacy of information is must. For securing big or small data over internet, cryptographic techniques are essential. Usage of cellular automata characteristics in the field of cryptography is still not much explored...
Cloud computing is based on network and computer applications. In cloud data sharing is an important activity. Small, medium, and big organization are use cloud to store their data in minimum rental cost. In present cloud proof their importance in term of resource and network sharing, application sharing and data storage utility. Hence, most of customers want to use cloud facilities and services....
Current era is cyber era, mostly people are dependent on online task, to keep the message secure from the hackers and crackers there is need of strong cryptography. Hackers are becoming intelligent day by day to attack on data as per their experience gain. Cryptography is a private communication in the public world. A cryptosystem should be secure even if the attacker (intruder) knows all the details...
The Cryptography is very good area for research now a days. As we know that security is very primary requirement for the any business. And for that we need very strong and unbreakable algorithm which provides high security. For that we need encryption and decryption algorithm which is having very high security with very good throughput. If we look at the real world, there are lots of organizations...
The embedded based applications need sensitive data transfer between different nodes. In order to increase the speed and to reduce the hardware complexity, this proposed system focuses on the light weight security algorithm Tiny Encryption Algorithm TEA which can be implemented in microcontroller to adapt with many real time constraints such as memory, data loss and low cost. The additive feature...
Communications usually do not have enough security. One of the ways for making the data secure is using methods for coding the information in a special manner. In this article one of the algorithms of coding and decoding information has been reviewed and explained. Coding is converting information to the form of coded text and decoding is the operation of converting coded information to the original...
In this paper, we proposed a file backup method. Files in devices of computer system can be destructed under abnormal condition. We divide file or database into ranges. Each range contains records and fields. We backup ranges to different devices. When files process the operation of creation, insertion, update or deletion, we only backup the corresponding ranges. When the original file is destructed,...
Grid computing architecture was defined to be a complete physical layer. The message transfer in network must be in secure. In this study, we propose the encryption algorithm in every grid node to keep information in security. Sender requests key code from receiver grid node, uses this key code to encrypt message to produce cipher text and sends out. Receiver also uses this key code to decrypt cipher...
the volume of data storage capacity has changed a lot as compared with earlier times. As most computers were standalone and only the users had access to data, security was not a big concern. All this changed when computers became linked in networks, in form of small dedicated networks to large LANs, WANs and the World Wide Web. With the growth of networking the security of data became a big issue...
A trusted platform module (TPM) contains a unique identity and provides a range of security functions. This paper outlines a client-server system utilizing a TPM-enabled computer to hinder forensic examination. The system allows for data confidentiality, plausible deniability, and hiding of traces that incriminating data was present on the client. The server will attest the client before allowing...
Since data is a vital resource that must be transferred over the Internet, the security issue of this resource must be considered seriously. There are various methods have been proposed by researchers; some of them have been implemented, such as DES and AES. However, those methods have some limitations that allow the plaintext to be unsaved from any threats while it was transferring over the Internet...
This paper presents a method of encryption that enhances the security of vital data against brute force attack. The method is based on dual key encryption in which two different keys encrypt the data simultaneously, one being the regular key and the other being the time of key entry. The encryption process uses conventional encryption methods with some modifications to increase the security but the...
This paper introduces a new (t, n) secret sharing scheme for image encryption. The proposed method encrypts the secret image into two images as the same size of the original image, which one is the public image (called the encrypted image) and another is to be shared among n participants using a new secret sharing method based on the Shamir’s secret sharing. In the new secret sharing scheme, t (or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.