Skip to main content
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Miscellaneous Contributed Journals and Academic Newsletters
by Koduru Suresh, PVGD Prasad Reddy, Padala Preethi
texts

eye 21

favorite 0

comment 0

Today Internet of things (IoT) interconnects any object possessing sensing and computing capabilities to the internet. In this era, increasing number of electronic devices and applications in Internet of Things (IoT) requires secured communication with low power consumption capabilities. As security is a major challenge in internet of things, it is important to design a key management solution that considers resource constrained nodes and hence key management in public key cryptography is a...
Topics: Cryptography, Internet of things, Public key exchange, Security
Miscellaneous Contributed Journals and Academic Newsletters
by Hana Ali-Pacha, Naima Hadj-Said, Adda Ali-Pacha, Mustafa Mamat, Mohamad Afendee Mohamed
texts

eye 38

favorite 0

comment 0

The development of communications and digital transmissions have pushed the data encryption to grow quickly to protect the information, against any hacking or digital plagiarisms. Many encryption algorithms are available on the Internet, but it's still illegal to use a number of them. Therefore, the search for new the encryption algorithms is still current. In this work, we will provide a preprocessing of the securisation of the data, which will significantly enhance the crypto-systems....
Topics: Cryptography, Permutation, Feistel, Entropy, Pixel Correlations, NPCR, UACI
Miscellaneous Contributed Journals and Academic Newsletters
by Raihan Sabirah Sabri, Roshidi Dini, Aida Mustapha
texts

eye 61

favorite 0

comment 0

In today's era of big data computer networks, protection of secret messages when transmitting information is a major concern. The openness and publicity of the communication channel are the main attraction for malicious people to steal personal data even though privacy protection in operational. Data extraction is process that reverses the data embedding process in information hiding. However, the performance of an information hiding framework highly depends on the evaluation metrics used. The...
Topics: Cryptography, Extracting process, Performance, Steganography
Miscellaneous Contributed Journals and Academic Newsletters
by Jasmin Ilyani Ahmad, Roshidi Din, Mazida Ahmad
texts

eye 42

favorite 0

comment 0

This paper presents several Public Key Cryptography (PKC) algorithms based on the perspective of researchers‟ effort since it was invented in the last four decades. The categories of the algorithms had been analyzed which are Discrete Logarithm, Integer Factorization, Coding Theory, Elliptic Curve, Lattices, Digital Signature and Hybrid algorithms. This paper reviewed the previous schemes in different PKC algorithms. The aim of this paper is to present the comparative trends of PKC algorithms...
Topics: PKC Algorithms, PKC Schemes, Public Key Cryptography
Miscellaneous Contributed Journals and Academic Newsletters
by Hilmi Abdullah, Ali Hikmat Ibrahim
texts

eye 21

favorite 0

comment 0

Recently, the blockchain technology has received a vast popularity because it brought revolutionary changes to some industries due to the fact that this technology enables the implementation of secure, decentralized and trustworthy applications. Moreover, this technology has many advantages over centralized systems such as immutability and transparency. The most common application of the blockchain technology is the Bitcoin cryptocurrency, which provides a method of transferring money in a...
Topics: Bitcoin, Blockchain, Cryptography, Decentralization, Distributed ledger
Miscellaneous Contributed Journals and Academic Newsletters
by Gururaj K. S, K. Thippeswamy
texts

eye 23

favorite 0

comment 0

Accessing and Utilization of data and information from remote location is one of the major requirements of present world. Due to the increase in the requirement of the data access from remote locations, challenges in the enhancement of technology based systems also have increased proportionately. Technology based solution for accessibility of remote data with available infrastructure is the need of the hour. Implementation of technology based solutions for the challenges may be expensive due to...
Topics: CloudSim, Cryptography, Online voting system, Security in cloud environment
Nowadays there is a lot of importance given to data security on the internet. The DES is one of the most preferred block cipher encryption/decryption procedures used at present. This paper presents a high throughput reconfigurable hardware implementation of DES Encryption algorithm. This achieved by using a new proposed implementation of the DES algorithm using pipelined concept. The implementation of the proposed design is presented by using Spartan-3E (XC3S500E) family FPGAs and is one of the...
Topics: Cryptography, DES algorithm, FPGAs, VHDL, Block cipher
In the large scale distributive environment involving mobile network, metadata server and storage applications, the data access and the security measures are of paramount importance. In parallel application processing, data is distributed across multiple servers and storage location. Ensuring confidentiality and availability of the data to the authorised users at the appropriate time involves high level of encryption algorithms, key management schemes and security algorithms. In this paper, key...
Topics: Cryptography, Distributed Systems, ECC, Key Escrow, Secret Sharing, Segmentation
Wireless Sensor Network (WSN) is a spatially distributed network. It contains many numbers of distributed, self-directed, small, battery powered devices called sensor nodes or motes. In recent years the deployment of WSN in various application domains are growing in a rapid pace as with the upcoming boom of Internet of Things (IoT) and Internet of Everything (IoE). However, the effectiveness of the WSN deployment is restricted due to the constrained computation and power source. Hence, many...
Topics: Elliptic curve cryptography (ECC), Hexagonal numbers, WSN
Miscellaneous Contributed Journals and Academic Newsletters
by Noor Alia Nor Hashim, Julius Teo Han Loong, Azrul Ghazali, Fazrena Azlee Hamid
texts

eye 33

favorite 0

comment 0

Cryptographic applications require numbers that are random and pseudorandom. Keys must be produced in a random manner in order to be used in common cryptosystems. Random or pseudorandom inputs at different terminals are also required in a lot of cryptographic protocols. For example, producing digital signatures using supporting quantities or in verification procedures that requires generating challenges. Random number generation is an important part of cryptography because there are flaws in...
Topics: Cryptography, Memristor, Ring oscillator, True random number generator, Window function
Miscellaneous Contributed Journals and Academic Newsletters
by Theda Flare G. Quilala, Ariel M. Sison, Ruji P. Medina
texts

eye 46

favorite 0

comment 0

Cryptography guarantees security in communication through encryption. This paper proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to comply with minimum requirements as an encryption standard. The modification retained the original structure for easy migration but utilized two S-boxes to save memory. A derivation was added to prevent symmetry. The algorithm’s performance was evaluated using time, and avalanche. Upon testing, the modified blowfish is slower...
Topics: Twofish, Cryptography, Encryption, Security, Cipher
Miscellaneous Contributed Journals and Academic Newsletters
by Rogel L. Quilala, Ariel M. Sison, Ruji P. Medina
texts

eye 10

favorite 0

comment 0

Hashes are used to check the integrity of data. This paper modified SHA-1 by incorporating mixing method in every round for better diffusion. The modification increased the hash output to 192-bits. Increasing the output increases the strength because breaking the hash takes longer. Based on the different message types, avalanche percentage of modified SHA-1 showed better diffusion at 51.64%, higher than the target 50%, while SHA-1 achieved 46.61%. The average execution time noted for modified...
Topics: Hash, Data integrity, Security, Cryptography, Avalanche
Miscellaneous Contributed Journals and Academic Newsletters
by Jasmin Ilyani Ahmad, Roshidi Din, Mazida Ahmad
texts

eye 39

favorite 0

comment 0

Cryptography is a method used to establish secure data communication. The goal of cryptography is to send data to satisfy the criteria of confidentiality, data integrity, authentication and non-repudiation. In line with the goals, the performance metrics is the important evaluation criteria to be analyzed. This paper presents the review of performance metrics of Public Key Cryptography (PKC) that had been analyzed based on the PKC scheme from the previous researchers‟ effort since the last...
Topics: Public Key Cryptography, Scheme, Security, Space, Speed
Miscellaneous Contributed Journals and Academic Newsletters
by Chadrakala, S. C. Lingareddy
texts

eye 42

favorite 0

comment 0

The low cost availability of smart devices and broadband connection has led to rapid growth of communication over Internet. As of today the internet based communication service is widely used in various application services such as in E-Mail transaction of sensitive data (medical data), online money transaction etc. all these services requires a strong security. There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted...
Topics: Cryptography, Data sharing, Proxy Re-encryption, Security
Many users of smartphones have secret data they want to save it on their devices. The probability of a device damage or stolen prevents them from saving data. Therefore, data driven applications used to save user’s data on a remote server. Protection of the data during its transmission considered as one of the success aspect for these applications. In this paper, an enhanced method for data encryption proposed which guarantees data secrecy during its transmission over network. User’s data...
Topics: Adversary, Cryptography, Decryption, Encryption, Smartphones
Miscellaneous Contributed Journals and Academic Newsletters
by Abdullah Nazeeh Saleh, Mohammad A. Al-Ahmad
texts

eye 19

favorite 0

comment 0

This paper introduces the security analysis of Titanium hash function that uses SF block cipher and follows sponge construction. A brief description of the sponge function and the design choice of Titanium are introduced. Basic security criteria of random function have been presented and studied on Titanium and then, differential cryptanalysis on Titanium has been performed and showed the resistance of it on the most recent differential attacks. A table of security discussions finalizes the...
Topics: Cryptanalysis, Cryptography, Hashfunction, Preimage, Sponge
Miscellaneous Contributed Journals and Academic Newsletters
by T. Sridevi, P. Mallikarjuna Rao, P. V Ramaraju
texts

eye 31

favorite 0

comment 0

Information hiding is the most important criteria today in several sectors, due to security issues. Mostly for the security applications used in Finance & banking sectors, hiding the information about users and their transactions are necessary at present from the hackers in all high security zones. In this consequence biometrics is progressively considered as foundation component for an extensive array of personal authentication solutions, both at the national level (E.g. India UIDAI) and...
Topics: Biometric applications, Cryptography, E-commerce, Security, Steganography
Miscellaneous Contributed Journals and Academic Newsletters
by T. Sridevi, P. Mallikarjuna Rao, P. V. Ramaraju
texts

eye 44

favorite 0

comment 0

Information hiding is the most important criteria today in several sectors, due to security issues. Mostly for the security applications used in Finance & banking sectors, hiding the information about users and their transactions are necessary at present from the hackers in all high security zones. In this consequence biometrics is progressively considered as foundation component for an extensive array of personal authentication solutions, both at the national level (E.g. India UIDAI) and...
Topics: Biometric applications, Cryptography, E-commerce, Security, Steganography