The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Active Network is a new type network architecture which intermediate node could be programmed. However, its architecture feature bring many security problems which embarrassed the development of active network greatly. This context analyze and studies the characteristics of active network communication and the security problems exist in the process. At the same time, we put forward a safe communication...
Nowadays, short message service (SMS) is faced with various security threats. Thus, the fields of high confidentiality(e.g., mobile E-commerce) require a higher level of security protection on SMS. Secure communication in incredible mobile network has very important significance. This paper presents a high security communication protocol for SMS. Through authentication, decryption and integrity protection,...
As one of the most popular mobile communication technologies, short message service (SMS) is faced with various security threats. Thus, the fields of high confidentiality (e.g., mobile E-commerce) require a higher level of security protection on SMS. Secure communication in incredible mobile network has very important significance. This paper presents a high security framework for SMS. Through authentication,...
Grid computing architecture was defined to be a complete physical layer. Data transfer in network must be in secure. In this study, encryption and decryption algorithms of a site authentication and its message are developed and applied in each grid node to ensure secure transmitted information. If the site information has been built in supervisor node then it can receive data sent from other grid...
The Galois/counter mode (GCM) algorithm enables fast encryption combined with per-packet message authentication. This paper presents an FPGA implementation of a complete bidirectional 2 Gbps fibre channel link encryptor hosting two area-optimized GCM cores for concurrent authenticated encryption and decryption. The proposed architecture fits into one Xilinx Virtex-4 device. Measurements in a working...
To provide secure delivery of satellite data in IPTV systems, service providers charge subscribing fee by scrambling the program in conditional access system using control words. At the receiver end, smart card is used to decrypt the control words and transfer them back to set-top box to descramble the scrambled program. Therefore, secure communication between set-top box and smart card is closely...
This paper proposes an efficient, scalable and secure (ESS) data management system on HVEM datagrid to ensure the security for data access as well as to balance the load of data intensive processing using active disks. When authentication and authorization are managed by a storage manager or a server on datagrid, if an attacker succeeds in assaulting the entity, he can access to the data on the disks...
In this paper, we propose a system and method for obtaining Kerberos passwords by capturing a single packet, encrypted using the RC4-HMAC encryption type. We present two methods that when combined together, can reduce the time needed to crack a password by 60.2% over brute force. The first method uses known text in the preauthentication phase to skip the verification section of the decryption process...
This paper proposes two transparency authentication schemes used in visual cryptography, which are based on watermarking techniques. In the first scheme, a secret image can be perceptible when stacking two transparencies. In addition, another watermark image is visible when shifting one transparency to an appropriate position and stacking it with the other transparency. In the second scheme, both...
Authentication is the most essential procedure to ensure that the service is properly used for wireless environments. Recently, Zhu and Ma proposed a novel authentication scheme with anonymity for wireless environments by basing on the hash functions and smart card, and mobile users only do symmetric encryption and decryption. And they claimed that their new scheme is security and provide user anonymity...
A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm "MAJE4" and the popular asymmetric key algorithm "RSA". The MAJE4 algorithm is used for encryption/decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as to accomplish...
Because the standard symmetric cryptographic algorithm DES cannot implement the operations of encryption and decryption for any length over 8 bytes, this paper defines DES-based data cryptographic functions, which can keep the byte length of input and output messages identical. These cryptographic functions have been successfully applied in secure transmission for the APDU of the smart card. An Implementation...
Secure Socket Layer (SSL) is a cryptographic protocol widely used to make a secure connection to a Web server. SSL uses three interdependent cryptographic functions to perform a secure connection. The first function is authentication. It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this function...
We present two "asymmetric" probabilistic key predistribution schemes to cater for mutual authentication and broadcast authentication respectively. The schemes however employ only symmetric cryptographic primitives - the asymmetry is due to the use of different secrets for encryption/authentication and decryption/verification, which are however related through a one-way function. Both schemes...
Once an application steps out of the bounds of a single-computer box, its external communication is immediately exposed to a multitude of outside observers with various intentions, good or bad. In order to protect sensitive data while these are en route, applications invoke different methods. In today's world, most of the means of secure data and code storage and distribution rely on using cryptographic...
Communication plays a very important and indeed a crucial part in our daily lives. Electronic mail, data transfer, and the development of the Internet have changed the way the world communicates. As the Internet grows in popularity and therefore also in size, more and more transmissions take place, mainly because the technology is more readily available and applications have become more user friendly,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.