Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt f...Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt files matrix transformation. Article presents a matrix-based electronic document encryption and decryption algorithm, which relies on a special class of matrices combinatorial problems, the method to improve the security of electronic document system is feasible and effective, and finally give the source code and programming software.展开更多
Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite commun...Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite communications,and so on.In these environments,a fixed password or channel key(e.g.,PW/SKCH)is often adopted to encrypt different data,resulting in security risks since thisPW/SKCH may be solved after hackers collect a huge amount of encrypted data.Actually,the most popularly used security mechanism Advanced Encryption Standard(AES)has its own problems,e.g.,several rounds have been solved.On the other hand,if data protected by the same PW/SKCH at different time points can derive different data encryption parameters,the system’s security level will be then greatly enhanced.Therefore,in this study,a security scheme,named Wrapping Encryption Based on Double Randomness Mechanism(WEBDR),is proposed by integrating a password key(or a system channel key)and an Initialization Vector(IV)to generate an Initial Encryption Key(IEK).Also,an Accumulated Shifting Substitution(ASS)function and a three-dimensional encryption method are adopted to produce a set of keys.Two randomness encryption mechanisms are developed.The first generates system sub-keys and calculates the length of the first pseudo-random numbers by employing IEK for providing subsequent encryption/decryption.The second produces a random encryption key and a sequence of internal feedback codes and computes the length of the second pseudo-random numbers for encrypting delivered messages.A wrapped mechanism is further utilized to pack a ciphertext file so that a wrapped ciphertext file,rather than the ciphertext,will be produced and then transmitted to its destination.The findings are as follows.Our theoretic analyses and simulations demonstrate that the security of the WEBDR in cloud communication has achieved its practical security.Also,AES requires 176 times exclusive OR(XOR)operations for both encryption and decryption,while the WEBDR consumes only 3 operations.That is why the WEBDR is 6.7∼7.09 times faster than the AES,thus more suitable for replacing the AES to protect data transmitted between a cloud system and its users.展开更多
Working with files and the safety of information has always been relevant, especially in financial institutions where the requirements for the safety of information and security are especially important. And in today...Working with files and the safety of information has always been relevant, especially in financial institutions where the requirements for the safety of information and security are especially important. And in today’s conditions, when an earthquake can destroy the floor of a city in an instant, or when a missile hits an office and all servers turn into scrap metal, the issue of data safety becomes especially important. Also, you can’t put the cost of the software and the convenience of working with files in last place. Especially if an office worker needs to find the necessary information on a client, a financial contract or a company’s financial product in a few seconds. Also, during the operation of computer equipment, failures are possible, and some of them can lead to partial or complete loss of information. In this paper, it is proposed to create another level of abstraction for working with the file system, which will be based on a relational database as a storage of objects and access rights to objects. Also considered are possible protocols for transferring data to other programs that work with files, these can be both small sites and the operating system itself. This article will be especially interesting for financial institutions or companies operating in the banking sector. The purpose of this article is an attempt to introduce another level of abstraction for working with files. A level that is completely abstracted from the storage medium.展开更多
文摘Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt files matrix transformation. Article presents a matrix-based electronic document encryption and decryption algorithm, which relies on a special class of matrices combinatorial problems, the method to improve the security of electronic document system is feasible and effective, and finally give the source code and programming software.
基金supported in part by Ministry of Science and Technology(MOST),Taiwan under the Grant MOST 109-2221-E-029-017-MY2.
文摘Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite communications,and so on.In these environments,a fixed password or channel key(e.g.,PW/SKCH)is often adopted to encrypt different data,resulting in security risks since thisPW/SKCH may be solved after hackers collect a huge amount of encrypted data.Actually,the most popularly used security mechanism Advanced Encryption Standard(AES)has its own problems,e.g.,several rounds have been solved.On the other hand,if data protected by the same PW/SKCH at different time points can derive different data encryption parameters,the system’s security level will be then greatly enhanced.Therefore,in this study,a security scheme,named Wrapping Encryption Based on Double Randomness Mechanism(WEBDR),is proposed by integrating a password key(or a system channel key)and an Initialization Vector(IV)to generate an Initial Encryption Key(IEK).Also,an Accumulated Shifting Substitution(ASS)function and a three-dimensional encryption method are adopted to produce a set of keys.Two randomness encryption mechanisms are developed.The first generates system sub-keys and calculates the length of the first pseudo-random numbers by employing IEK for providing subsequent encryption/decryption.The second produces a random encryption key and a sequence of internal feedback codes and computes the length of the second pseudo-random numbers for encrypting delivered messages.A wrapped mechanism is further utilized to pack a ciphertext file so that a wrapped ciphertext file,rather than the ciphertext,will be produced and then transmitted to its destination.The findings are as follows.Our theoretic analyses and simulations demonstrate that the security of the WEBDR in cloud communication has achieved its practical security.Also,AES requires 176 times exclusive OR(XOR)operations for both encryption and decryption,while the WEBDR consumes only 3 operations.That is why the WEBDR is 6.7∼7.09 times faster than the AES,thus more suitable for replacing the AES to protect data transmitted between a cloud system and its users.
文摘Working with files and the safety of information has always been relevant, especially in financial institutions where the requirements for the safety of information and security are especially important. And in today’s conditions, when an earthquake can destroy the floor of a city in an instant, or when a missile hits an office and all servers turn into scrap metal, the issue of data safety becomes especially important. Also, you can’t put the cost of the software and the convenience of working with files in last place. Especially if an office worker needs to find the necessary information on a client, a financial contract or a company’s financial product in a few seconds. Also, during the operation of computer equipment, failures are possible, and some of them can lead to partial or complete loss of information. In this paper, it is proposed to create another level of abstraction for working with the file system, which will be based on a relational database as a storage of objects and access rights to objects. Also considered are possible protocols for transferring data to other programs that work with files, these can be both small sites and the operating system itself. This article will be especially interesting for financial institutions or companies operating in the banking sector. The purpose of this article is an attempt to introduce another level of abstraction for working with files. A level that is completely abstracted from the storage medium.