The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the security of chaotic encryption algorithm, a modified chaotic map, which is based on the Logistic map, is proposed in this paper. Compared with original logistic map, the proposed map makes it always be chaotic, and expands the iteration range from original (0, 1) to (0, 4?) (??0.25). We designed an encryption scheme based on the proposed map for implementing image encryption...
Software cryptosystems face the challenge of secure key management. Recent trends in breaking cryptosystems suggest that it is easier to steal the cryptographic keys from unsecure systems than to break the algorithm itself, a prominent example of such an attack is the cracking of the HD-DVD encryption. This paper presents two methods to hide cryptographic keys in an unsecure machine. The first methoduses...
In recent years, wireless sensor network technology has been frequently used in various fields, thereby making it increasingly important to ensure that the data being transferred remains confidential. Symmetric-key cryptography, which does not require high computing capacity, is a method that is generally used because the computing and memory requirements of sensor nodes are low. An implementation...
The paper deals with efficient modular arithmetic algorithms for resource restricted devices like smart-cards or sensors. The modular arithmetic is important for a wide variety of computations in these devices, from communication to signal processing. To speed up some cryptographic operations, the most widespread devices often have some cryptographic support provided by a dedicated chip. Our goal...
With PowerBuilder 11 to design database application program, the security problem of the database is of the priority for the designer to solve. If dynamic encryption technology of linear transformation of data source, user name connected to database and password, even others obtain the database files, they also can't crack the connection user name and password database. So the security problem is...
We present a new technique to prevent chosen-cipher text attack against the NTRU public key cryptosystem, based on polynomial algebra. In this paper, we present the existing NTRU public key cryptosystem implemented in C using array in section II, which can perform encryption and decryption on text file using polynomials up to degree 147. In section III, we present the chosen cipher text attack with...
This paper extracted the low frequency coefficients, scramble the low frequency coefficients by prime algorithm, reconstruct the coefficients that be scrambled to get the final image. The algorithm expands the dimension of key space and increases the secrecy of the image.
This paper introduced a practicable method to connect web portal with campus-user information system, via a Web Service-based SSO (Single Sign-on) system, in order to realize the sharing of users' statuses and information. Cookies, after being serialized into binary array and encrypted with RSA, will be transmitted in the Web Service framework. Then this array will be deserialized when Identity Server...
This paper proposes a wireless communication system for secure transmission of data. Bluetooth is used as the wireless communication medium due to its low-cost and low-power consumption features. Advanced encryption standard (AES) protocol is implemented for the security reason over Bluetooth stack. RC10 prototyping board with Xilinx XC3S1500L-4-FG320 device has been used for the hardware evaluation...
Webpage Trojan horse in IIS server is also a kind of ASP, ASP.NET or HTML programs; It has no clear distinction with other webpage programs. This is the reason why Trojans have become the main approach to attack websites. These years webpage Trojan horses have applied varied technique to hide their characteristics, and techniques of Trojan finding and anti-killing contest further more. Based on analyzing...
A new method based on cryptography to ensure voters and candidates' confidentiality in the Internet E-Voting, referred to as the Name and vOte separaTed E-voting (NOTE) system, is proposed. In NOTE, an impartial party, the Election Commission (EC) will be responsible for part of the vote counting duties besides collecting and verifying the voter ID. The votes and the candidates' names are separated...
Based on the principle of symmetric key encryption we present a new method of symmetric block encryption using indices called Index-Based Symmetric Block Encryption. Instead of going through a number of tedious rounds while encrypting the data, the data can be encrypted in just two rounds. Also, no two identical data blocks have the same ciphers. i.e. if a single block has been encrypted twice we...
Due to increasing the technologies security systems are very popular in many areas. The security of information can be achieved by using encryption and steganography. In cryptography, encrypted data is transmitted after transforming the other form instead of the original data. Contrast cryptography, information hiding process can be extended for protecting from the interesting of any attacker. This...
Cryptography is one of the major concerned areas of computer and data security and a very promising direction in cryptography research is known as DNA Cryptography. DNA computational logic can be used in cryptography for encrypting, storing and transmitting the information, as well as for computation. Although in its primitive stage, DNA cryptography is shown to be very effective. In this paper, a...
Security is very important in modern life due to most information is now stored in digital format. A good security mechanism will keep information secrecy and integrity, hence, plays an important role in modern information exchange. However, cryptography algorithms are extremely expensive in terms of execution time. To make data not easily being cracked, many arithmetic and logical operations will...
The security of digital images attracts much attention recently. For images the transformation can be implemented at two levels, the first one consists of the pixel value permutation and the second one consists of position permutation. In this paper, we propose an encryption scheme for digital images with new pixel position permutation method based on Evolvable Hardware (EHW). In this work, we use...
The properties and periodicity of the two-dimensional Fibonacci transformation of digital images are discussed on the background of image information security problem research, and a new computation method and an accurate formula of whose period are also given, its application in digital image scrambling is illustrated with examples.
This paper proposes an image encryption algorithm based on a progression, which scrambles the pixel and changes the value of the pixel using the progression. The experiments illustrate the new algorithm can adapt almost all the images and it is more secure.
Advanced Encryption Standard, a federal information processing standard is an approved cryptographic algorithm that can be used to protect electronic data. The AES can be programmed in software or built with pure hardware. However field programmable gate array offers a quicker and more customizable solution. This paper presents the AES algorithm with regard to FPGA and the very high speed integrated...
In this paper, a novel image cheat-encryption algori-thm based on hyper-chaotic Chen-system is proposed. The hyper-chaos is employed to encrypt plain image into cheat-like image. The cheat-image is transferred in network and easily neglected by attackers. If cheat succeeds, it is impossible to decrypt. When the cheat-image fails to cheat the attackers, security and performance analysis shows the cheat-encryption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.