The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most programs related to security communicate with servers through encrypted channels, and sensitive data that are transmitted should be encrypted using a suitable protocol. Transport Layer Security (TLS) is a protocol that encrypts data by exchanging key materials in a secure way. Protocol analyzers in turn decrypt packets to see the raw protocols in plain text. Decryption is not a minor job, and...
Following the increase requirement of data security, distribute information after encrypting, this is an effective method to keep its security during transporting period. This article introduces an encryption and distribution system design process. This system takes a FPGA chip as a control center. Apply VHDL implements PCI protocol and DES encryption and decryption algorithm. The function of this...
A lot of approaches for software tamper resistance have been proposed to insure that the program will execute as expected. One important technique is integrity-checking which use self-hashing to check the integrity of the software, but the adversary can easily bypass the verification by locating the hash value comparison instruction. Another one is software encryption. But most of them don't protect...
Multimedia data encryption attempts to prevent unauthorized disclosure of confidential multimedia information in transit or storage. Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. If we call a multimedia data stream (message) plaintext , the process of transforming the plaintext into unintelligible data stream is referred...
The science of Cryptology dates back to Caesar's time. A wide variety of techniques have been employed for encryption and decryption but cryptanalysis has simultaneously cracked these encryption techniques from time to time. The use of a multilingual approach in cryptography is not prevalent. In this paper we propose an algorithm that focuses on encryption of plain text over a range of languages supported...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
Summary form only given. Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
In recent years, there has been increasing concern about ??database as a service??(DAS) architectures. Data security is the overriding concern in DAS, and encryption is a natural solution. However, queries over encrypted databases are usually inefficient due to a heap of time on the encryption and decryption. In this paper, we present an encryption scheme and XQuery translation model of XML database...
In this paper, we propose an improved RC6 encryption algorithm that have the same structure of encryption and decryption. So far, conventional RC6 algorithms have difference structure of encryption and decryption. We devise our algorithm by inserting a symmetric layer using simple rotation and XOR operations, in which the half of whole RC6 rounds uses encryption procedure and the rest of it are employs...
Feistel and SPN are the two main structures in designing a block cipher algorithm. Unlike Feistel, an SPN has an asymmetric structure in encryption and decryption. In this paper we propose an SPN algorithm which has a symmetric structure in encryption and decryption. The whole operations in our SPN algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2, applies...
This paper describes the implementation of mailer that is used to send the mail in the mailer that has encoded format. By using this encoding method the mail will be send very safe, the hackers can't read the mail. The mailer is used to send the encrypted mail directly to the mail box as it is. It can also send the effective html page, images and textual mails. instead of this, the composer will send...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.