Encryption
18,270 Followers
Recent papers in Encryption
Most computer systems are currently being integrated into networks. The purpose of integrating a computer system into a network is to make it more effective and easy to access. Various data and information are usually stored within a file... more
In this paper an analysis of the existing video information protection methods is made. Analysis of current H.323 protocol stack has been made. A new encryption/decryption layer has been suggested. An approach for partial data encryption... more
Modern networks have critical security needs and a suitable level of protection and performance is usually achieved with the use of dedicated hardware cryptographic cores. Although the Advanced Encryption Standard (AES) is considered the... more
A type of distributed and self-regulating network is the wireless sensor network (WSN). The sensor nodes have limited computing capabilities, memory, battery power are needed to ensure a strong security design. In this paper, an adaptive... more
With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and... more
Data is a most valuable part of most of nowadays system. A lot of hackers and criminals are trying to steal this data all the time. Due to that data should also be the best protected part of every company's systems. We would like our... more
Database security is a growing concern as the amount of sensitive data collected and retained in databases is fast growing and most of these data are being made accessible via the internet. Majority of the companies, organizations and... more
In this paper we consider a chosen-plaintext variant of the linear attack on DES introduced by Matsui. By choosing plaintexts in a clever way one can reduce the number of plaintexts required in a successful linear attack. This reduces the... more
This paper is on RSA Encryption Tables.
In the 21st century, we have plenty of data available in the society of education. Importantly, today's education system has changed, it takes place through all the available channels and one of the significant means is the digital... more
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more
A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with... more
This work proposes a novel reversible data hiding scheme for encrypted image. After encrypting the entire data of an uncompressed image by a stream cipher, the additional data can be embedded into the image by modifying a small proportion... more
Today almost all organizations have improved their performance through allowing more information exchange within their organization as well as between their distributers, suppliers, and customers using web support. Databases are central... more
Encryption is the de facto method for protecting information, whether this information is locally stored or on transit. Although we have many encryption techniques, they have problems inherited from the computational models that they use.... more
Non-governmental organizations (NGOs) in underdeveloped countries are receiving funds from donor agencies for various purposes, including relief from natural disasters and other emergencies, promoting education, women empowerment,... more
Cryptography and encryption have been used for secure communication. In the modern world, cryptography is a very important tool for protecting information in computer systems. With the invention of the World Wide Web or Internet, computer... more
Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where each authority can issue secret keys to the user independently without any cooperation and a central authority. This is in contrast to the... more
There exist numerous kinds of cryptographic structures. In symmetric cryptography, both sending and receiving events share the identical secret key. While symmetric cryptography is computationally green, it requires that the shared secret... more
Most prior designated confirmer signature schemes either prove security in the random oracle model (ROM) or use general zero-knowledge proofs for NP statements (making them impractical). By slightly modifying the definition of designated... more
Cryptography, Steganography and Digital watermarking are widely used for Image Encryption and Textual Data Encryption and also we have various classification of these techniques. In this paper we study of Hybrid Cryptographic Encryption... more
In this paper, two image encryption schemes are proposed for grayscale and color images. The two encryption schemes are based on dividing each image into blocks of different sizes. In the first scheme, the two dimension (2D) input image... more
Hiding Capacity plays a vital role for efficient covert communication. This is achieved by Steganography. Steganography is the science of hiding the information into the other information so that the hidden information appears to be... more
In this era of information technology and e-commerce security is the key aspect while transmitting confidential information over insecure network like internet. In order to protect the information, various security mechanisms are used.... more
At the start of the 21 st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management... more
With the massive number of e-Commerce and websites becoming the target of hackers’ attacks in recent years, threats that are commonly targeting web applications include SQL Injection and data theft. Designing, establishing, and... more
It is not secret that the algorithms and methods used to encrypt messages in Arabic language are few and old, there are no modern encryption algorithms to encrypt the Arabic letters along the lines as the encryption algorithms of the... more
Over the years, millions of data and information in transit have been abused, compromised or lost to cybercriminals/hackers due to inefficient security measures adopted during data transmission. To address this issue this paper reviewed... more
Organizations and individuals have been moving to the cloud computing technology looking for effective and fast computing services. Confidential information is becoming more vulnerable to leak due to outsource computations to... more
We propose a novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the trade-off between the required data confidentiality level and the flexibility of the cloud database structures... more
Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this change. Edge computing... more
Fear of security breaches has been a major reason for the business world's reluctance to embrace the Internet as a viable means of communication. A widely adopted solution consists of physically separating private networks from the rest... more
An enhanced technique of color image encryption based on random matrix key encoding is proposed. To encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each channel is encrypted using a technique... more
Users nowadays have several web accounts for email, banking, blogging, social media, online shopping, and other services. The choice of passwords for these different web accounts poses a problem, resulting in a dilemma. Since users tend... more
Abstract — Genetic algorithm based Cryptanalysis has gained considerable attention due to its fast convergence time. This paper proposes a Genetic Algorithm (GA) based cryptanalysis scheme for breaking the key employed in Simplified- AES.... more
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe... more
Security is the level of confidentiality of data stored using cryptography. There are many ways you can do to improve security. In this study, the writer will use a method by encrypting the database with the Caesar Cipher Algorithm, Hill... more
We live in the era of information explosion and have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. Data security and privacy are among top concerns for any business... more
Data base security is the mechanisms that protect the data base against intentional or accidental threats. It is also a specialty within the broader discipline of computer security using encryption techniques. Encryption is one of the... more