期刊文献+
共找到59篇文章
< 1 2 3 >
每页显示 20 50 100
ECC Based Threshold Decryption Scheme and Its Application in Web Security 被引量:2
1
作者 张险峰 张峰 +1 位作者 秦志光 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第4期41-46,共6页
The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test appro... The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test approach based on elliptic curve cryptography is designed. The application of these techniques in Web security is studied. Performance analysis shows that our scheme is characterized by excellent security as well as high efficiency. 展开更多
关键词 INTRUSION tolerance ELLIPTIC CURVE CRYPTOGRAPHY threshold decryption web security
下载PDF
Encryption and Decryption of Color Images through Random Disruption of Rows and Columns
2
作者 曾建华 占炎林 杨建荣 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期245-255,共11页
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o... In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value. 展开更多
关键词 color image ENCRYPTION decryption single channel RGB component image disrupting
下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
3
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image Encryption and decryption Two-Stage Logistic Mapping M Sequence
下载PDF
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
4
作者 Fauziyah Zhaoshun Wang Mujahid Tabassum 《Computers, Materials & Continua》 SCIE EI 2024年第3期4417-4452,共36页
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method... In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security. 展开更多
关键词 CRYPTOGRAPHIC SECURITY privacy preservation decryption INTEGRITY
下载PDF
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
5
作者 Pawan Kumar Vipin Saxena 《Journal of Computer and Communications》 2024年第2期201-210,共10页
Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an expone... Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an exponential manner. Hybrid cryptography provides a better solution than a single type of cryptographical technique. In this paper, nested levels of hybrid cryptographical techniques are investigated with the help of Deoxyribonucleic Acid (DNA) and Paillier cryptographical techniques. In the first level, information will be encrypted by DNA and at the second level, the ciphertext of DNA will be encrypted by Paillier cryptography. At the decryption time, firstly Paillier cryptography will be processed, and then DAN cryptography will be processed to get the original text. The proposed algorithm follows the concept of Last Encryption First Decryption (LEFD) at the time of decryption. The computed results are depicted in terms of tables and graphs. 展开更多
关键词 ENCRYPTION decryption DNA Paillier Cryptography Nested Levels Hybrid Cryptography
下载PDF
Dual-imaging-mode smart hydrogel information platform for illumination-independent covert decryption and read
6
作者 Junjie Wei Long Li +3 位作者 Rui Li Qingquan Liu Zejun Yan Tao Chen 《International Journal of Smart and Nano Materials》 SCIE EI 2022年第4期612-625,共14页
Smart hydrogel with color responsiveness is envisioned as one of the most promising materials for advanced information encryption and decryption platform,but the illumination-dependent way of decrypt-ing and reading i... Smart hydrogel with color responsiveness is envisioned as one of the most promising materials for advanced information encryption and decryption platform,but the illumination-dependent way of decrypt-ing and reading information leads to the worrying of concealment in some particular scenarios.Herein,we proposed a smart hydrogel information platform with dual imaging modes by utilizing the accom-panying behaviors in transparency change and heat releasing after crystallization of supercooled solution.For this smart hydrogel informa-tion platform,the hidden information could be written and decrypted by ink of ethylene glycol and decryption tool of seed crystal,respec-tively.Furthermore,in addition to the traditional optical imaging mode with the assistance of light illumination,the decrypted information on dual-imaging-mode hydrogel platform also could be read by thermal imaging mode in dark environment owing to the exothermic crystal-lization.The illumination-independent read mode based on heat radia-tion helps to improve the secrecy and safety of the decryption and read process.This investigation provides a facile and feasible strategy to design illumination-independent information platform that enables reading the encrypted information in secret. 展开更多
关键词 Hydrogel information platform information decryption thermal imaging illumination-independent pattern crystallization
原文传递
Identity-Based Threshold Decryption on Access Structure
7
作者 秦华旺 朱晓华 戴跃伟 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期485-489,共5页
For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through desig... For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible. 展开更多
关键词 threshold decryption access structure IDENTITY CRYPTOGRAPHY information security
原文传递
AIE活性抗冻水凝胶可实现低温环境下多级信息的加密与解密
8
作者 睢晓洁 汪晓东 +3 位作者 蔡诚诚 马君怡 杨静 张雷 《Engineering》 SCIE EI CAS CSCD 2023年第4期82-89,M0005,共9页
抗冻水凝胶可在低温环境下调控内部水分子的冻结状态,进而维持其优异特性(如智能响应性、离子运输能力等)以及拓展其在低温环境下的应用。本文开发了一系列具有AIE活性的抗冻水凝胶,其可用于低温环境下的信息加密/解密。根据水凝胶中甜... 抗冻水凝胶可在低温环境下调控内部水分子的冻结状态,进而维持其优异特性(如智能响应性、离子运输能力等)以及拓展其在低温环境下的应用。本文开发了一系列具有AIE活性的抗冻水凝胶,其可用于低温环境下的信息加密/解密。根据水凝胶中甜菜碱浓度的不同使其具有可调的冻结温度(T_(f))。当温度高于/低于Tf时,编码于水凝胶内的AIE分子表现出不发光/发光行为,从而实现信息的加密/解密。此外,通过调控水凝胶的冷冻程序,或者在水凝胶中原位引入具有光热效应的硫化铜纳米粒子并结合一定的照射条件,可实现多级信息的读取,从而增强信息的安全性。最后,由于该水凝胶对外界温度波动表现出不可逆性,因此可作为无需外界供能的超低温防伪标签,用于实时可视化监测冷链运输过程中细胞的活性。 展开更多
关键词 Freeze-tolerant hydrogels Aggregation-induced emission ENCRYPTION decryption Anticounterfeiting
下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
9
作者 Muhammad Nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 CRYPTOGRAPHY symmetric algorithm ENCRYPTION decryption cipher text cloud security asymmetric algorithm
下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
10
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT ENCRYPTION decryption cloud security matrix cipher
下载PDF
Paillier Cryptography Based Message Authentication Code for IoMT Security
11
作者 S.Siamala Devi Chandrakala Kuruba +1 位作者 Yunyoung Nam Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2209-2223,共15页
Health care visualization through Internet of Things(IoT)over wireless sensor network(WSN)becomes a current research attention due to medical sensor evolution of devices.The digital technology-based communication syst... Health care visualization through Internet of Things(IoT)over wireless sensor network(WSN)becomes a current research attention due to medical sensor evolution of devices.The digital technology-based communication system is widely used in all application.Internet of medical thing(IoMT)assisted health-care application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation.These smart medical devices may consume with limited resources and also the data generated by these devices are large in size.These IoMT based applications suffer from the issues such as security,anonymity,privacy,and interoper-ability.To overcome these issues,data aggregation methods are the solution that can concatenate the data generated by the sensors and forward it into the base station through fog node with efficient encryption and decryption.This article proposed a well-organized data aggregation and secured transmission approach.The data generated by the sensor are collected and compressed.Aggregator nodes(AN)received the compressed data and concatenate it.The concatenated and encrypted data is forward to fog node using the enhanced Paillier cryptogra-phy-based encryption with Message Authentication code(MAC).Fog node extracts the forwarded data from AN using Fog message extractor method(FME)with decryption.The proposed system ensures data integrity,security and also protects from security threats.This proposed model is simulated in Net-work Simulator 2.35 and the evaluated simulation results proves that the aggregation with MAC code will ensures the security,privacy and also reduces the communication cost.Fog node usages in between Aggregator and base station,will reduce the cloud server/base station computational overhead and storage cost.The proposed ideology is compared with existing data aggregation schemes in terms of computational cost,storage cost,communication cost and energy cost.Cost of communication takes 18.7 ms which is much lesser than existing schemes. 展开更多
关键词 FOG IoMT wireless sensor network cloud AGGREGATION ENCRYPTION decryption energy
下载PDF
Smart Quarantine Environment Privacy through IoT Gadgets Using Blockchain
12
作者 Nitish Pathak Shams Tabrez Siddiqui +3 位作者 Anjani Kumar Singha Heba G Mohamed Shabana Urooj Abhinandan R Patil 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3021-3036,共16页
The coronavirus,formerly known as COVID-19,has caused massive global disasters.As a precaution,most governments imposed quarantine periods ranging from months to years and postponed significantfinancial obligations.Furt... The coronavirus,formerly known as COVID-19,has caused massive global disasters.As a precaution,most governments imposed quarantine periods ranging from months to years and postponed significantfinancial obligations.Furthermore,governments around the world have used cutting-edge technologies to track citizens’activity.Thousands of sensors were connected to IoT(Internet of Things)devices to monitor the catastrophic eruption with billions of connected devices that use these novel tools and apps,privacy and security issues regarding data transmission and memory space abound.In this study,we suggest a block-chain-based methodology for safeguarding data in the billions of devices and sen-sors connected over the internet.Various trial secrecy and safety qualities are based on cutting-edge cryptography.To evaluate the proposed model,we recom-mend using an application of the system,a Raspberry Pi single-board computer in an IoT system,a laptop,a computer,cell phones and the Ethereum smart contract platform.The models ability to ensure safety,effectiveness and a suitable budget is proved by the Gowalla dataset results. 展开更多
关键词 Ring signature blockchain IOT ENCRYPTION smart contract decryption authentication PRIVACY-PRESERVING
下载PDF
Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
13
作者 P.Prathap Nayudu Krovi Raja Sekhar 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1079-1092,共14页
The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of t... The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of their data when the data is outsourced to the cloud.Therefore,access control mechanisms will become a significant challenging problem.The Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is an essential solution in which the user can control data access.CP-ABE encrypts the data under a limited access policy after the user sets some access policies.The user can decrypt the data if they satisfy the limited access policy.Although CP-ABE is an effective access control program,the privacy of the policy might be compromised by the attackers.Namely,the attackers can gather important information from plain text policy.To address this issue,the SHA-512 algorithm is presented to create a hash code for the user’s attributes in this paper.Depending on the created hash codes,an access policy will be formed.It leads to protecting the access policy against attacks.The effectiveness of the proposed scheme is assessed based on decryption time,private key generation time,ciphertext generation time,and data verification time. 展开更多
关键词 Cloud computing access policy CP-ABE hash code SHA-512 ATTRIBUTE CIPHERTEXT encryption decryption
下载PDF
Air target recognition method against ISRJ for radio frequency proximity sensors using chaotic stream encryption
14
作者 Jian-feng Li Jian Dai +2 位作者 Xin-hong Hao Xiao-peng Yan Xin-wei Wang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第10期267-279,共13页
The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article propose... The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article proposes a recognition method for RFPSs to identify the false targets caused by ISRJ.The proposed method is realized by assigning a unique identity(ID)to each RFPS,and each ID is a periodically and chaotically encrypted in every pulse period.The processing technique of the received signal is divided into ranging and ID decryption.In the ranging part,a high-resolution range profile(HRRP)can be obtained by performing pulse compression with the binary chaotic sequences.To suppress the noise,the singular value decomposition(SVD)is applied in the preprocessing.Regarding ID decryption,targets and ISRJ can be recognized through the encryption and decryption processes,which are controlled by random keys.An adaptability analysis conducted in terms of the peak-to-side lobe ratio(PSLR)and bit error rate(BER)indicates that the proposed method performs well within a 70-k Hz Doppler shift.A simulation and experimental results show that the proposed method achieves extremely stable target and ISRJ recognition accuracies at different signal-to-noise ratios(SNRs)and jamming-to-signal ratios(JSRs). 展开更多
关键词 Interrupted-sampling repeater jamming(ISRJ) Radio frequency proximity sensors(RFPS) Chaotic stream encryption Air target recognition Identity(ID)decryption
下载PDF
DERNNet:Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN
15
作者 A.Venkatesh S.Asha 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1375-1392,共18页
A Wireless Sensor Network(WSN)is constructed with numerous sensors over geographical regions.The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy.As sensor no... A Wireless Sensor Network(WSN)is constructed with numerous sensors over geographical regions.The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy.As sensor nodes are resource constrained in nature,novel techniques are essential to improve lifetime of nodes in WSN.Nodes energy is considered as an important resource for sensor node which are battery powered based.In WSN,energy is consumed mainly while data is being transferred among nodes in the network.Several research works are carried out focusing on preserving energy of nodes in the network and made network to live longer.Moreover,this network is threatened by attacks like vampire attack where the network is loaded by fake traffic.Here,Dual Encoding Recurrent Neural network(DERNNet)is proposed for classifying the vampire nodes s node in the network.Moreover,the Grey Wolf Optimization(GWO)algorithm helps for transferring the data by determining best solutions to optimally select the aggregation points;thereby maximizing battery/lifetime of the network nodes.The proposed method is evaluated with three standard approaches namely Knowledge and Intrusion Detection based Secure Atom Search Routing(KIDSASR),Risk-aware Reputation-based Trust(RaRTrust)model and Activation Function-based Trusted Neighbor Selection(AF-TNS)in terms of various parameters.These existing methods may lead to wastage of energy due to vampire attack,which further reduce the lifetime and increase average energy consumed in the network.Hence,the proposed DERNNet method achieves 31.4%of routing overhead,23%of end-to-end delay,78.6%of energy efficiency,94.8%of throughput,28.2%of average latency,92.4%of packet delivery ratio,85.2%of network lifetime,and 94.3%of classification accuracy. 展开更多
关键词 Wireless sensor network vampire nodes LIFETIME optimal routing energy ENCRYPTION decryption trust value optimization
下载PDF
Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT
16
作者 M.Suresh Kumar T.Purosothaman 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期925-938,共14页
The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive... The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive power consumption,which constitute a danger to intelligent IoT-based apps.Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member.A centralized trustworthy system,which is in charge of key distribution and upgrades,is used to maintain group keys.To provide longitudinal access controls,Software Defined Network(SDN)based security controllers are employed for group administration services.Cloud service providers provide a variety of security features.There are just a few software security answers available.In the proposed system,a hybrid protocols were used in SDN and it embeds edge system to improve the security in the group communication.Tree-based algorithms compared with Group Key Establishment(GKE)and Multivariate public key cryptosystem with Broadcast Encryption in the proposed system.When all factors are considered,Broadcast Encryption(BE)appears to become the most logical solution to the issue.BE enables an initiator to send encrypted messages to a large set of recipients in a efficient and productive way,meanwhile assuring that the data can only be decrypted by defining characteristic.The proposed method improves the security,efficiency of the system and reduces the power consumption and minimizes the cost. 展开更多
关键词 Internet of things ENCRYPTION decryption group key software defined network public key SECURITY
下载PDF
Enhanced Rsa (Ersa): An Advanced Mechanism for Improving the Security
17
作者 S.Castro R.PushpaLakshmi 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2267-2279,共13页
Cloud computing has become ubiquitous in our daily lives in recent years.Data are the source of technology that is generated hugely by various sources.Big data is dealing with huge data volumes or complex data.The maj... Cloud computing has become ubiquitous in our daily lives in recent years.Data are the source of technology that is generated hugely by various sources.Big data is dealing with huge data volumes or complex data.The major concern in big data is security threats.Security concerns create a negative impact on the user on the aspect of trust.In big data still,security threats exist as com-monly known as DDOS(Distributed-Denial-of-Service)attacks,data loss,Inade-quate Data Backups,System Vulnerabilities,and Phishing as well as Social Engineering Attacks.In our work,we have taken the data loss and Inadequate Data Backups issues into consideration.We analyze that RSA(Rivest,Shamir,&Adleman)is the most secure cryptography mechanism.In cloud computing,user authentication is the weaker section to be secured.Generally,the cryptogra-phy mechanism is done in the authentication section only.We implemented our new idea of registration with selected images and pins for processing RSA.By valid authentication approval earned by the proposed mechanism,the user is allowed to use the cloud database,encryption,decryption,etc.To prove the effi-ciency level of our proposed system,a comparison work is conducted between DSSE(Digital Signature Standard Encryption)and EFSSA(Efficient framework for securely sharing afile using asymmetric key distribution management).The experimental work is carried out and the performance evaluation is done using encryption time and decryption time analysis,throughput,and processing time.On this observation,the security level attained by ERSA is far better in compar-ison to DSSE and EFSSA with the maximum throughput attained by the proposed E-RSA being 500 Mb/Min and encryption time of 3.2 s,thus ensuring the user trust in using the cloud environment. 展开更多
关键词 Cloud computing ENCRYPTION decryption file sharing RSA key generation
下载PDF
Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security
18
作者 S.Prince Chelladurai T.Rajagopalan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期951-960,共10页
Cloud computing offers numerous web-based services.The adoption of many Cloud applications has been hindered by concerns about data security and privacy.Cloud service providers’access to private information raises mo... Cloud computing offers numerous web-based services.The adoption of many Cloud applications has been hindered by concerns about data security and privacy.Cloud service providers’access to private information raises more security issues.In addition,Cloud computing is incompatible with several industries,including finance and government.Public-key cryptography is frequently cited as a significant advancement in cryptography.In contrast,the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive data.This study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key cryptography.Through strategic design,the hybrid Envelope model adequately supports enterprises delivering routine customer services via independent multi-sourced entities.Both the Cloud service provider and the consumer benefit from the proposed scheme since it results in more resilient and secure services.The suggested approach employs a secret version of the distributed equation to ensure the highest level of security and confidentiality for large amounts of data.Based on the proposed scheme,a Digital Envelope application is developed which prohibits Cloud service providers from directly accessing insufficient or encrypted data. 展开更多
关键词 Digital Envelope Cloud computing big data ENCRYPTION decryption
下载PDF
VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption
19
作者 M.Sundar Prakash Balaji V.R.Vijaykumar +2 位作者 Kamalraj Subramaniam M.Kannan V.Ayyem Pillai 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3155-3168,共14页
The current research work proposed a novel optimization-based 2D-SIMM(Two-Dimensional Sine Iterative chaotic map with infinite collapse Mod-ulation Map)model for image encryption.The proposed 2D-SIMM model is derived o... The current research work proposed a novel optimization-based 2D-SIMM(Two-Dimensional Sine Iterative chaotic map with infinite collapse Mod-ulation Map)model for image encryption.The proposed 2D-SIMM model is derived out of sine map and Iterative Chaotic Map with Infinite Collapse(ICMIC).In this technique,scrambling effect is achieved with the help of Chaotic Shift Transform(CST).Chaotic Shift Transform is used to change the value of pixels in the input image while the substituted value is cyclically shifted according to the chaotic sequence generated by 2D-SIMM model.These chaotic sequences,generated using 2D-SIMM model,are sensitive to initial conditions.In the proposed algorithm,these initial conditions are optimized using JAYA optimization algorithm.Correlation coefficient and entropy are considered asfitness functions in this study to evaluate the best solution for initial conditions.The simulation results clearly shows that the proposed algorithm achieved a better performance over existing algorithms.In addition,the VLSI implementation of the proposed algorithm was also carried out using Xilinx system generator.With optimization,the correlation coefficient was-0.014096 and without optimization,it was 0.002585. 展开更多
关键词 Chaotic mapping 2D-SIMM ENCRYPTION decryption jaya optimization
下载PDF
Design of an E-Administration Platform and Its Cryptography-Based Security Model
20
作者 Ohwobeno Omohwo Iwasokun Gabriel Babatunde +1 位作者 Boyinbode Olutayo Kehinde Gabriel Junior Arome 《Journal of Computer and Communications》 2023年第4期166-189,共24页
E-administration is performing administrative works via computer and its associated technologies such as the Internet. It is administrative efforts that center on the exchange of information and providing services to ... E-administration is performing administrative works via computer and its associated technologies such as the Internet. It is administrative efforts that center on the exchange of information and providing services to people and the business sector at high speed and low cost through computers and networks with the assurance of maintaining information security. It is based on the positive investment in information technology and communication in administrative practices. This paper presents the design of the e-administration platform that adopts the concept of cryptography for identity management. The architectural framework of the platform comprises subcomponents for service and forms identification, business process redesign, service architecture, amalgamation, and deployment. The cryptography model for securing the platform was designed based on the combination of authentication criteria presented in the Rijndael-Advanced Encryption Standard (AES), Lattice-based cryptography (LBC), and Secure Hash Algorithm (SHA512). It is required that a record be encrypted prior to its commitment to the database via a double encryption method. The AES algorithm-based encryption’s output will form the input to the LBC algorithm to obtain the final output. 展开更多
关键词 E-Administration CRYPTOGRAPHY Management System Encryption and decryption
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部