The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Embedded devices are becoming more popular and used in network communications. These devices are now used commonly for storing data and exchange of data through public networks. Wireless networking imposes threat to the sensitive data. To protect sensitive data against threat embedded devices are designed with inbuilt security features. The sensitive data is encrypted before transmission so that only...
The Advanced Encryption standard (AES) cryptosystem for the small scale network presents the implementation of the AES algorithm, FIPS 197, on the microcontroller operated on the real-time operating system (RTOS) for securing data in a small scale network for example as an UAVs wireless communication. The Electronic Code Book (ECB) mode of the AES algorithm is mainly used as the cryptographic core...
A new symmetric encryption model for enhanced security is designed for the data of any size and type. It is envisaged that the proposed encryption model would enable a range of IoT devices to transfer data or to communicate more securely over open/insecure communication channel and also to provide enhanced data integrity. The model keeps the size of output cipher text unchanged by XORing the parity...
Ransomware is a growing threat that encrypts auser's files and holds the decryption key until a ransom ispaid by the victim. This type of malware is responsible fortens of millions of dollars in extortion annually. Worse still, developing new variants is trivial, facilitating the evasion of manyantivirus and intrusion detection systems. In this work, we presentCryptoDrop, an early-warning detection...
In the paper the gamma sequences based on perfect binary arrays presented. Such structures can be applied to encryption of big data streams in real time. The designed gamma sequences meet the requirements of FIPS 140-1.
Cloud computing technology offers so many luxuries like low cost, ease of accessibility of resources, high performance due to which it becomes a forthcoming revolution among organizations. Organisations are still very reluctant to store their data on cloud because it shifts the organizations data on cloud which is not trustworthy. There are different types of issues like Security, Protection, Identity...
This work focuses on the further reduction of the bandwidth usage of the Bloom Filter based SNMP by means of an additional compression scheme. The zip compression technique is used for the zip encryption and the zip decryption of the Bloom Filter. The experiment with compression ratio was done and the results show that the SNMP bandwidth that utilizes the proposed compression scheme is reduced to...
This paper presents an improvised approach for plain text password encryption in the server's database. One of the major aspect of password protection issue is to secure it by means of encryption process. In cryptanalysis, a dictionary attacks or brute force attacks are the most common ways of cracking passwords. A new approach for improvising the scheme of password encryption is using the process...
Traditional methods of securing communications rely on methods, such as encryption, which require coordination between the transmitter and the receiver. Physical layer encryption techniques propose exploiting transmit arrays to cover the transmitted signal with beamformed noise or to generate directional modulation to provide security without requiring coordination a priori between the transmitter...
In computer science literature, sorting is an age-old theoretically interesting problem with great practical importance. In this paper, we discuss the effect on sorting when the comparisons are erroneous. Such an analysis would be in particular effective for secured cloud data which is Fully Homomorphically Encrypted (FHE) and the sorting is intended to be applied on the encrypted data. Although theoretically...
The SHA-2 hash function is used in many fields of security system such as digital signature, tamper detection, password protection and so on. SHA-2 is very important algorithm for integrity and authentication realization, SHA-2 is a one way algorithm to produce hash code of any message with 256 random hash bits (that's according to the version of SHA-2), which cannot be reversible, this property makes...
Exchange of data over the open networks and internet is rapidly growing so security of the data becomes a major concern. One possible solution to this problem is to encrypt the data. The data can be text, image, audio, video etc. In today's world most of the multimedia applications involve images. Image encryption has applications in internet communication, multimedia systems, medical imaging, telemedicine,...
This paper explores optimal array beamforming for secure communication in static multipath propagation environments. The problem is cast as a convex optimization of the average secure key rate achieved in the presence of a passive eavesdropper, and the optimization is performed using semidefinite programming. While representative results are presented for a uniform linear array, the optimization procedure...
In this paper a robust Audio steganography technique is proposed by randomizing and dynamically changing the embedding sequence. Advance Encryption standards is used for providing additional security and robustness to the algorithm and tested for the 30 speech files. The addition of cryptography in steganography increases the robustness and introduces a higher level of security since the key is required...
Encryption is a process of hiding significant data so as to prevent unauthorized access and ensure confidentiality of data. It is widely used to transmit data across networks ensuring secure communication. This paper aims at improving the security and efficiency of image encryption by using a highly efficient shuffle based encryption algorithm and an equivalent decryption algorithm based on random...
The aim of this paper is to develop a hardware Random Number Generator (RNG) by using an optical Theremin. Theremin is a noncontact electronic musical instrument based on the principle of heterodyne. It has two antennas to control volume and pitch of the sound which form a pair of resonant RLC oscillators. In the presented system, optical sensors (Photodiodes) have been used to produce the notes of...
In the image encryption, chaotic map usually used for pixel permutation, due to it can generate chaotic permutations hence difficult to predict. However chaotic map which is widely used for image permutations like Arnold Cat Map (ACM) has a relatively low recurrence period so vulnerable to the known image attack. Besides, the key space Arnold cat map is also relatively low so vulnerable to brute-force...
The extremely constrained resource has hindered the efforts to implement the elliptic curve cryptography (ECC) into a radio-frequency identification (RFID) tag chip. In this paper, an ECC-based RFID digital baseband controller (DBC), which is compatible with ISO/IEC 14443 and Schnorr authentication protocol, is presented. In order to achieve low resources consumption and fast ECC computation speed,...
A series of latest papers have pretended collision attacks on publicly used hash functions, including the widely published SHA-1 algorithm. To estimate this threat, the natural response has been to strengthening the system to overcoming the weakness that make the system apt to collision. The SHA-1 hash function used in many fields of security system such as digital signature, tamper detection, password...
With the rise of cloud computing new ways to secure outsourced data have to be devised. Traditional approaches like simply encrypting all data before it is transferred only partially alleviate this problem. Searchable Encryption (SE) schemes enable the cloud provider to search for user supplied strings in the encrypted documents, while neither learning anything about the content of the documents nor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.