The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we have proposed an innovative way to modify RSA algorithm in order to improve the security level of this scheme. The two-variable bijective mapping is utilized in this scope. A mathematical background of bijective function is discussed in order to understand the proposed technique. First of all the original RSA algorithm is discussed then the proposed modification methodology is explained...
Mobile phone is an important source of evidence for judicial staff, but the research of mobile phone forensics system is quite deficient compared with computer forensics. Toward this end, this paper proposed an integrated framework of the mobile phone forensics system, which is based on the characteristic and difficulties of mobile phone forensics. To begin with, the inner structure and forensic process...
Cloud computing is boon in technology field which provide on-demand services in IT enterprises. With storage of data on cloud the challenge of its security and authentication threats occurring. Authentication in cloud computing is a major concerned. The main objective of these technique is to authenticate at client side, server side, or as third party using different method to keep the data in secure...
Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper, we propose a lightweight, computationally efficient protocol, called CLOAK, for the mobile device. CLOAK is based on stream cipher and takes the...
As citizens debate the morality of using global surveillance to enforce cyber security, software technologies that can proliferate illegal distribution of copyright material are evolving rapidly. One such technology is Peer-to-Peer networking which, through well-known implementations such as Napster, Bittorrent and eMule, has enabled users to share files at optimal speeds and at near infinite scale...
Most programs related to security communicate with servers through encrypted channels, and sensitive data that are transmitted should be encrypted using a suitable protocol. Transport Layer Security (TLS) is a protocol that encrypts data by exchanging key materials in a secure way. Protocol analyzers in turn decrypt packets to see the raw protocols in plain text. Decryption is not a minor job, and...
Secured Packet transmission in wireless networks is the main research carried out. The packets those are transmitted in the network moves through the routing path which might reach the destination or might get loss in between the transmission. The paper discusses on how to transmit the packets securely in adhoc networks. The transmission of packets depends upon the size of the information for transmission...
Unmanned Aerial Vehicles (UAVs) have undergone major technological developments recently which have promoted the deployment of multi-UAV systems in military and civil applications that require collaborative and cooperative performance of UAVs. With the advancement of multi-UAV systems, Flying Ad-Hoc Networks (FANET) have emerged with techniques that facilitates real time data transfer addressing the...
This paper focuses on the VLSI implementation of Baseband layer, Security Manager and Link manager, using Verilog HDL as the modelling tool. The baseband layer is mainly responsible for handling the data packets. Its operation is divided into two basic modes viz. Master mode and Slave mode. When device operates in master mode, it actively initiates communication while in slave mode it passively waits...
Rapidly acceleration in the technological advances throughout the world leads to enormous increase in encrypted Internet traffic. Tremendous progressions and changes are taking place in months rather than in years. From mobility and video to cloud and network programmability, there is no end of vision. Majority of people still believe that computer securely sends the email to the intended recipient...
Digital Signature Scheme is very useful in communication between parties. We studied new applications of Jordon-Totient function and applied them to RSA Digital Signature Scheme and developed protocols for communication between two parties using java and shown the graphical performance analysis on test results for key generation time, encryption time and decryption time respectively.
The concept of transition from IPv4/IPv6 network is currently being extensively studied to gain high level compatibility for easy, independent deployment ofIPv6. The transition between IPv4 and IPv6 internet will be a very long process as they are completely incompatible two protocols. IPv6 offers various features including Larger addressing capacity and capabilities, QoS control, encryption and decryption,...
We introduce a non-interactive RSA time-lock puzzle scheme whose level of difficulty can be arbitrarily chosen by artificially enlarging the public exponent. Solving a puzzle for a message m means for Bob to encrypt m with Alice's public puzzle key by repeated modular squaring. The number of squarings to perform determines the puzzle complexity. This puzzle is non-parallelizable. Thus, the solution...
In this paper we are proposing a technique for encrypting ‘high volume data streams’ that are sent over communication links throughout various networks. High volume data streams refer to applications such as audio-video conferencing, or more specifically Internet Protocol Television (IPTV), and usage of the File Transfer Protocol or FTP. In most cases when data related to these applications is transferred...
IP based communications are becoming more and more ubiquitous and hence the need for reliable and faster algorithms that can provide authentication, confidentiality and integrity. However, not much attention is paid to large volume data communications such as VoIP, IPTV, IP Multimedia Subsystems (IMS), etc. Large volume data communications require simple, easy to implement and extremely fast algorithms...
In this paper we present a new approach for identifying the crypto routines in different types of malware. In traditional malware analysis, like sandboxing, network data is examined as seen on the wire or data is collected as it is written to a file. The use of proprietary binary formats, obfuscation, or encryption hides important details, which are necessary for investigating malicious behavior....
Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations...
Nowadays, short message service (SMS) is faced with various security threats. Thus, the fields of high confidentiality(e.g., mobile E-commerce) require a higher level of security protection on SMS. Secure communication in incredible mobile network has very important significance. This paper presents a high security communication protocol for SMS. Through authentication, decryption and integrity protection,...
SSL/TLS servers are often overloaded with many simultaneous requests or denial of service (DoS) attack which will result in degradation of performance. So SSL/TLS servers have to utilize significantly more hardware in order to provide a reasonable response time to their customers. Instead of developing the hardware, it is always possible to look for faster algorithms in order to speed up decryption...
Mobile relay stations (RSs) provide broadband wireless access (BWA) networks with additional mobility, which extends network coverage and advances dynamic networking and ubiquitous computing. However, there are many unresolved security vulnerabilities in the current IEEE 802.16 standard, such as BS/RS spoofing. Additional measures are needed to ensure that each component in the network is a trusted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.