期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Image Encryption and Decryption Based on Chaotic Algorithm
1
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image encryption and decryption Two-Stage Logistic Mapping M Sequence
下载PDF
Design of an E-Administration Platform and Its Cryptography-Based Security Model
2
作者 Ohwobeno Omohwo Iwasokun Gabriel Babatunde +1 位作者 Boyinbode Olutayo Kehinde Gabriel Junior Arome 《Journal of Computer and Communications》 2023年第4期166-189,共24页
E-administration is performing administrative works via computer and its associated technologies such as the Internet. It is administrative efforts that center on the exchange of information and providing services to ... E-administration is performing administrative works via computer and its associated technologies such as the Internet. It is administrative efforts that center on the exchange of information and providing services to people and the business sector at high speed and low cost through computers and networks with the assurance of maintaining information security. It is based on the positive investment in information technology and communication in administrative practices. This paper presents the design of the e-administration platform that adopts the concept of cryptography for identity management. The architectural framework of the platform comprises subcomponents for service and forms identification, business process redesign, service architecture, amalgamation, and deployment. The cryptography model for securing the platform was designed based on the combination of authentication criteria presented in the Rijndael-Advanced Encryption Standard (AES), Lattice-based cryptography (LBC), and Secure Hash Algorithm (SHA512). It is required that a record be encrypted prior to its commitment to the database via a double encryption method. The AES algorithm-based encryption’s output will form the input to the LBC algorithm to obtain the final output. 展开更多
关键词 E-Administration CRYPTOGRAPHY Management System encryption and decryption
下载PDF
Energy-efficient and security-optimized AES hardware design for ubiquitous computing 被引量:2
3
作者 Chen Yicheng Zou Xuecheng Liu Zhenglin Han Yu Zheng Zhaoxia 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期652-658,共7页
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H... Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost. 展开更多
关键词 encryption and decryption power analysis model inhomogeneous S-Boxes ubiquitous computing advanced encryption standard.
下载PDF
A secure identification system using coherent states 被引量:3
4
作者 何广强 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第2期371-374,共4页
A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed i... A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed into an arbitrary elliptical polarization state, To verify the identity of a communicator, a reverse procedure is performed by the receiver, For simply describing the transformation procedure, the analytical methods of Poincaré sphere and quaternion are adopted. Since quantum noise provides such a measurement uncertainty for the eavesdropping that the identity information cannot be retrieved from the elliptical polarization state, the proposed scheme is secure. 展开更多
关键词 quantum identification polarization encryption and decryption quantum noise Poincaré sphere
下载PDF
Recovery of Image through Alamouti Channel with Incorporation of RSA Algorithm
5
作者 Aninda Majumder Mohammad Raihan Ruhin +1 位作者 Tahsina Hashem Md. Imdadul Islam 《Journal of Computer and Communications》 2016年第2期1-10,共10页
In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end nod... In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end node of the internet and remote service center. In such link, the communication is heavily affected by large and small scale fading;hence the received signal experiences huge distortion in case of forward error correction. Otherwise, huge service delay arises due to frequent negative acknowledgements. To combat the situation, we can choose Alamouti channel of full rate and fully orthogonal space-time block code (OSTBC). Our aim is to transmit images through Alamouti channel and to observe the quality of the recovered image, in context of bit error rate (BER). We have also observed the impact of fading and additive white Gaussian noise (AWGN) on the image without application of error correction or detection technique of channel coding. To ensure security, we apply the RSA algorithm on each pixel prior transmitting and decrypt them at the receiving end, where we found no impairment from the algorithm. Finally, we observe that the relative performance of the system changes digital modulation schemes. 展开更多
关键词 Quotient and Remainder Matrix Alamouti Simulator Multiple-Input Single-Output (MISO) Image encryption and decryption BER and Discrete Wavelet Transform (DWT)
下载PDF
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
6
作者 P. Premkumar D. Shanthi 《Circuits and Systems》 2016年第11期3626-3644,共19页
Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them ... Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them plays an important role in the successful achievement of the other. In cloud computing data integrity assurance is one of the major challenges because the user has no control over the security mechanism to protect the data. Data integrity insures that data received are the same as data stored. It is a result of data security but data integrity refers to validity and accuracy of data rather than protect the data. Data security refers to protection of data against unauthorized access, modification or corruption and it is necessary to ensure data integrity. This paper proposed a new approach using Matrix Dialing Method in block level to enhance the performance of both data integrity and data security without using Third Party Auditor (TPA). In this approach, the data are partitioned into number of blocks and each block converted into a square matrix. Determinant factor of each matrix is generated dynamically to ensure data integrity. This model also implements a combination of AES algorithm and SHA-1 algorithm for digital signature generation. Data coloring on digital signature is applied to ensure data security with better performance. The performance analysis using cloud simulator shows that the proposed scheme is highly efficient and secure as it overcomes the limitations of previous approaches of data security using encryption and decryption algorithms and data integrity assurance using TPA due to server computation time and accuracy. 展开更多
关键词 Cloud Computing Data Integrity Data Security SHA-1 Digital Signature AES encryption and decryption
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部