The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the modern digital era, the storage of digital data in multi-users systems and transmission over the internet is prime important in the society. The cryptographic technique is one of the possible solutions for protecting digital information for unauthorized uses. In this technique, the encryption algorithm should be simple to design and implementation. In the proposed article, a novel color image...
Multimedia data, nowadays, needs high levels of security as it is widely transferred over various networks. One of the newly-invented and most attracting safety-raising strategies is the chaos-based cryptography. This paper examines the competence of an algorithm for image encryption that uses a double-chaotic logistic map equation. The algorithm produces two sequence keys (K1 & K2) in two phases...
A data encryption model based on logistic map is studied and multiple chaotic dynamical systems were implemented to improve by addressing the issues related to use of logistic map. Use of different chaotic systems other than logistic map, provides us to vary control parameters to a larger extent, hence enabling to overcome the limitations of logistic map without compromising security of data. Further,...
Authentication means preserving the systems and information from unwanted unauthorized access, usage, disclosure, disruption, integration, inspection, modification or destruction of the information. The studies have shown that the text passwords are more vulnerable to shoulder surfing, brute force, and dictionary attacks. The password with images are hard to guess and will provide a more secure way...
RSA algorithm is used to hide and retrieve the data in an insecure network environment. The advantage of RSA algorithm is to increase security and accessibility. The private keys never required to be transferred or exposed to everybody. In a shared-key cryptographic system, the secret keys must be shared since exactly the same key is used for encryption and decryption. So there may be a chance that...
In this paper we have proposed an innovative way to modify RSA algorithm in order to improve the security level of this scheme. The two-variable bijective mapping is utilized in this scope. A mathematical background of bijective function is discussed in order to understand the proposed technique. First of all the original RSA algorithm is discussed then the proposed modification methodology is explained...
3C consist of three terms a. Cryptography b. Cascade c. Customized In brief It protects data from being viewed or modified and provides a secure means of communication over insecure channels by encrypting data multiple time using different algorithms selected by users as per their need. Thus key size and cipher text size will increase which leads to more security rather than regular, single algorithm.
This paper presents an interesting approach extending the approach of Vernam Cipher technique, Vigenere Cipher and Modified Caesar approach towards the creation of ciphertext using ASCII conversion in order to encrypt not only alphabets but stretching the boundaries to special symbols, numeric data as well as case sensitive data which is the utmost requirement for encrypting confidential information...
Caller ID has been used to tell the recipient who is calling before answering the call. In fact, nowadays using just Caller ID is not enough to proof the real caller since there are several ways to manipulate the caller identity. There are number of solutions to proof the caller e.g. using Time base, SMS base, or hardware. Even using DSA and CA, it can lead to data leak or inconsistent verification...
Block ciphers are very important in communication systems as they provide confidentiality through encryption. Today's block ciphers need not only high cryptographic security but also high performance encryption and decryption, as well as the ability to adapt in special environments. This paper focuses on improving the security and performance of AES-256 algorithm, based on improving diffusion layer...
Video streaming services over the Internet are being widely used in mobile networks. Currently, service providers are relying more and more on securing data transferred between the service provider, namely the video streaming server, and the end user. However, securing video content includes at least the use of video encryption algorithm requiring processing and memory capabilities, provoking more...
Huge amount of data are generated and transmitted over the world each second. Transmitting the data over the network and using the data in the applications create a need to protect this data from unauthorized entities, especially if this data are sensitive or confidential. Many techniques were used to protect the data such as Encryption. Encryption is a very popular technique was used to protect data...
Security is the major aspect in any type of communication systems. The generation of secret keys randomly provides good security as well as better complexity in cryptographic based algorithms. In literature there exist symmetric key algorithms which use the same key for encryption as well as decryption. Among all the algorithms, Advanced Encryption Standard (AES) is used in many fields of security...
Now a day, need for fast accessing of data is increasing with the exponential increase in the security field. QR codes have served as a useful tool for fast and convenient sharing of data. But with increased usage of QR Codes have become vulnerable to attacks such as phishing, pharming, manipulation and exploitation. These security flaws could pose a danger to an average user. In this paper we have...
Security is major concern in data handling, communication, message transmission and electronic transaction on public network. Cryptography (secret writing) is the encryption process of transformation of messages to make information secure and resistant to attack. AES is symmetric encryption standard recommended by NIST. AES is proved to be highly secure, faster and strong encryption algorithm. AES...
The Security and Consistency of data are integral parts of Database maintenance. The modification, addition and/or alteration of data types in the database system without having to change the physical and overall structure of the database schema. In this paper, the authors have proposed the creation of a Generic database system to address the rapidly growing complexities of today's systems in which...
In confidential data transmission data security is an important factor. Advance Encryption Standard is symmetric cryptography standard used for confidential data transmission. However, some faults are injected during implementation of AES to reduce its reliability and may cause information leakage. Fault detection scheme includes the details of each transformation in AES algorithm. Simulation results...
DNA cryptography is one of the promising fields in cryptographic research which emerged with the evolution of DNA computing. In this era, end to end transmission of secure data by ensuring confidentiality and authenticity over the networks is a real challenge. Even though various DNA based cryptographic algorithms exists, they are not secure enough to provide better security as required with today's...
Digital watermarking technique is used to provide the intellectual property rights. This technique proves the proprietor of the content. The authentication and identification of the ownership protect the data from intruders. The copyright protection protects the multimedia data from modifying, illegal copying and removing the data. The binary image is taken as the watermark, it scrambles first and...
Play Fairal gorithm has been enhanced in various ways. One of the methods is to increase the confusion rates by transforming the algorithm into 3D-playfair which has four tables of 4×4 and accepts trigraph rather than digraph. This paper further enhances the 3D-playfair algorithm by extending its tables and hereby increasing the security level as well as supporting the characters of all the world's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.