دانلود و نمایش مقالات مرتبط با Cryptographic algorithm::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Cryptographic algorithm

تعداد مقالات یافته شده: 26
ردیف عنوان نوع
1 A jamming attack detection technique for opportunistic networks
یک تکنیک تشخیص حمله پارازیت برای شبکه های فرصت طلب-2022
Opportunistic networks (OppNets) are dispersed in nature, with nodes acting as resource restrictions, with intermittent connectivity. These nodes are subject to various types of attacks, posing a security risk in data transmission. One of the most common attacks that cause jamming among the message forwarding nodes in infrastructure-less networks is Denial of Service (DoS) attack. Most of the methods addressing this type of attack rely on cryptographic algorithms, which are too difficult to implement. In this paper, a novel jamming attack detection technique (JADT) for OppNets, is proposed, which relies on the use of some statistical measures collected from the relay nodes and a prescribed threshold on the packet delivery ratio (PDR) to discover a jamming attack while decrypting the acknowledgement, stopping the message transmission and rebroadcasting the message through a different channel. The proposed JADT is evaluated using the ONE simulator, showing its superiority against the Fuzzy Geocasting mechanism in Opportunistic Networks (F-GSAF) scheme in terms of packet delivery ratio and overhead ratio, under varying TTL and buffer size.
Keywords: Jamming detection | Opportunistic networks | Routing | Statistical information | Energy
مقاله انگلیسی
2 A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications
مرور طرح‌های امضای کلید عمومی پسا کوانتومی برای ارتباطات امن خودرو-2022
Basic security requirements such as confidentiality, user authentication and data integrity, are assured by using public-key cryptography (PKC). In particular, public-key signature schemes provide non-repudiation, integrity of transmitted messages and authentication. The presence of a large scale quantum computer would be a real threat to break the most widely used public-key cryptographic algorithms in practice, RSA, DSA, ECDSA signature schemes and Diffie-Hellman key exchange. Thus, all security protocols and applications where these public-key cryptographic algorithms are used are vulnerable to quantum-computer attacks. There are five directions of cryptographic primitives secure against a quantum computer: multivariate quadratic equation-based, hash-based, lattice-based, code-based and supersingular isogeny-based cryptography. These primitives could serve as replacements for current public-key cryptographic algorithms to prepare for post-quantum era. It is important to prioritize the fields to be replaced by post-quantum cryptography (PQC) since it is hard to replace the currently deployed PKC with PQC at the same time. The fields directly connected to human life such as vehicular communications should be the primary targets of PQC applications. This survey is dedicated to providing guidelines for adapting the most suitable post-quantum candidates to the requirements of various devices and suggesting efficient and physically secure implementations that can be built into existing embedded applications as easily as traditional PKC. It focuses on the five types of post-quantum signature schemes and investigates their theoretical backgrounds, structures, state-of-the-art constructions and implementation aspects on various platforms raging from resource constrained IoT devices to powerful servers connected to the devices for secure communications in post-quantum era. It offers appropriate solutions to find tradeoffs between key sizes, signature lengths, performance, and security for practical applications.
Index Terms— Implementation attack | post-quantum cryptography | public-key signature scheme | quantum algorithm | Shor algorithm | side-channel attack.
مقاله انگلیسی
3 Cognitive solutions for security and cryptography
راه حل های شناختی برای امنیت و رمزنگاری-2019
This paper describes the new security solutions based on cognitive approaches and new computing paradigm called cognitive cryptography. This new security area establish a new generation of computational methods and security systems, focused on creation intelligent cryptographic algorithms and security protocols using cognitive information processing approaches. Such systems are designed for semantic evaluation of encrypted data, and allow to select the most appropriate techniques of its encryption. This paper presents a possible application of such techniques for different security tasks like authentication, secret sharing, secure data management etc. Additionally, some cryptographic solutions inspired by biological models will be presented.
Keywords: Cognitive cryptographic protocols | Bio-inspired cryptography | Personalized security systems
مقاله انگلیسی
4 Cognitive and biologically cryptographic protocols for data security
پروتکل های رمزنگاری شناختی و بیولوژیکی برای امنیت داده ها-2019
This article presents new methods of cognitive computational paragigms dedicated to data security solutions. Especially, these paragidms will be presented based on new, combined classes of threshold schemes – names linguistic-biometric threshold schemes. Linguistic, biometric and combined classes of protocols applied cognitive techniques for data analysis, so new classes of cryptographic threshold schemes also based on cognitive techniques. Cognitive and bilogically cryptographic protocols can be applied for data/secret security. It’s possible by used cryptographic techniques based on threshold protocols. These protocols provide secret protection by splitting and distributing shadows between protocol participants. Participants of the protocol receive shadows of a shared secret and ensure their total security by managing them. The authors of this paper have solved the problem of combining existing linguistic and biometric protocols of data protection. The proposed innovative combination of secret protection protocols give new possibilities of application for linguistic-biometric threshold schemes. One of possible application of such protocols is Cloud application, so in this paper will be also describe this possible application. The fundamental methods of data and service protection, dedicated to processes of its security will be describe by cryptographic algorithms, particularly data sharing protocols. This paper will discuss a detailed description of proposed algorithms and their characteristic features.
Keywords: Cognitive paradigm | Data security | Biological protocols | Linguistic-biometric threshold schemes | Cloud computing
مقاله انگلیسی
5 Quantum Cryptography for Internet of Things Security
رمزنگاری کوانتومی برای امنیت اینترنت اشیاء-2019
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security.
Index Terms : Internet of things | quantum computing | quantum cryptography | security
مقاله انگلیسی
6 Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization
ارزیابی چابکی رمزنگاری مقاوم به کوانتومی در مسیریابی و تعویض زیرساخت های شبکه IT در یک سازمان مالی با اندازه بزرگ-2019
This paper provides exploratory research by determining the impact of quantum computing threat on modern routing and switching infrastructure components of IT network infrastructure in a large-size fi- nancial organization. We determine whether common routing and switching IT network infrastructure, including its hardware and software components, have enough cryptographic agility to accommodate the change of cryptographic algorithms to the ones that do not exhibit vulnerability to quantum computing and to the ones that are compliant with National Security Agency (NSA) Suite B set of protocols. We pinpoint upstream or downstream impacts of a change in the encryption algorithms across various IT network infrastructure components in terms of effort required to accomplish this transition. This study is among the first studies that investigate quantum-resistance cryptographic from the hard- ware perspectives of routing and switching technologies using diffusion of innovation theory. The study integrates enterprise governance to meet the challenges presented by quantum-computing with a focus on cryptographic agility. We offer an enterprise architecture framework for assessing the dependencies, costs, and benefits of IT infrastructure migration plan to meet the future challenges of quantum-resistant cryptographic. The analysis in this research can be used by IT managers to pre-plan for an upgrade of routing and switching infrastructure, assist in estimating the effort s required to perform these upgrades, and assist in selecting a vendor of routing and switching equipment from the perspective of cryptographic agility. With today’s supercomputers, a computational task involved in breaking modern asymmetric cryptographic algorithms would be infeasible due to the required computational complexity. However, with progress in the devel- opment of quantum computing technology, firms are facing an increasing risk of potential security threats to existing encrypted data and secured transmission channels as the processing power of quantum com- puters continue to increase.
Keywords: Quantum-resistance | Cryptography | Routing and switching | Enterprise architecture | IT governance
مقاله انگلیسی
7 Secure Transmission of DICOM Images by comparing different cryptographic algorithms
انتقال ایمن تصاویر DICOM با مقایسه الگوریتم های رمزنگاری مختلف-2019
This paper aims to implement the concept of preserving the Confidentiality and Integrity of DICOM Images Using Cryptographic Algorithms. This work uses two types of cryptographic algorithms namely AES (Advanced Encryption Standard) and Blake Hash Function. Using these algorithms, we implement and check the confidentiality and integrity of DICOM images. Our proposed system also ensures that the images are transferred from one hospital database to another in a secure manner and the system will be able to tackle any changes while the image is being transferred. The initial concern of the system lies in providing confidentiality in the communication of the images which can be done using AES algorithm. The integrity can be provided using Blake Hash Function. The comparative analysis of AES with other algorithms such as Triple DES, IDEA, Blowfish and SEED with respect to their execution time is also done. In this work, DICOM files are taken as input and then kept in the encrypted format for storage purpose and also they can be sent over the network in the encrypted format.
Keywords: DICOM images | Confidentiality | Integrity | Cryptography | Advanced Encryption Standard (AES) | Blake Hash Function
مقاله انگلیسی
8 A CAD approach for pre-layout optimal PDN design and its post-layout verification
یک روش CAD برای طراحی بهینه PDN قبل از طرح و تأیید پس از طرح آن-2019
Design of power distribution network (PDN) draws great attention to integrated circuit (IC) designers as it directly affects the circuit performance. The challenge is to immune the circuit from the noise arising due to PDN by means of effective placement of decoupling capacitance (decap) with optimal power, delay, energy and area utilization. Our work involves extraction of circuit parameters in the pre-layout stage and estimating decoupling capacitance as an early prediction activity based on dynamic power dissipation. We propose a new modular pre-layout PDN (MPLPDN) design approach, which modularizes the circuit and involves a computer aided design (CAD) methodology to investigate the changes in noise, power and delay parameter based on predictive decap allocation across the modules. A pruning methodology has been adopted to choose the best combination of the modules. The modularization algorithm is applied in a bottom up approach i.e. the lower level modules are combined at first and the top level module is created at the last stage. The experimental results based on pre and post layout simulation of application circuits show that MPLPDN achieves a considerable PDN noise suppression with a negligible increase in power, delay, energy and area. The comparison between pre-layout and post-layout simulation results also establishes the correctness of our early prediction.
Keywords: Low power VLSI design | Power distribution network (PDN) | Cryptographic algorithm | Digital signal processing (DSP) algorithm | Decoupling capacitance (decap) | Computer aided design (CAD) | Application specific integrated circuit (ASIC)
مقاله انگلیسی
9 Intelligent conditional collaborative private data sharing
به اشتراک گذاری داده های خصوصی شرطی هوشمند-2019
With the advent of distributed systems, secure and privacy-preserving data sharing between different entities (individuals or organizations) becomes a challenging issue. There are several real-world scenarios in which different entities are willing to share their private data only under certain circumstances, such as sharing the system logs when there is indications of cyber attack in order to provide cyber threat intelligence. Therefore, over the past few years, several researchers proposed solutions for collaborative data sharing, mostly based on existing cryptographic algorithms. However, the existing approaches are not appropriate for conditional data sharing, i.e., sharing the data if and only if a pre-defined condition is satisfied due to the occurrence of an event. Moreover, in case the existing solutions are used in conditional data sharing scenarios, the shared secret will be revealed to all parties and re-keying process is necessary. In this work, in order to address the aforementioned challenges, we propose, a ‘‘conditional collaborative private data sharing’’ protocol based on Identity-Based Encryption and Threshold Secret Sharing schemes. In our proposed approach, the condition based on which the encrypted data will be revealed to the collaborating parties (or a central entity) could be of two types: (i) threshold, or (ii) pre-defined policy. Supported by thorough analytical and experimental analysis, we show the effectiveness and performance of our proposal.
مقاله انگلیسی
10 Midgar: Study of communications security among Smart Objects using a platform of heterogeneous devices for the Internet of Things
Midgar : بررسی امنیت ارتباطات درمیان اشیاء هوشمند با استفاده از پلت فرم دستگاه های ناهمگن برای اینترنت اشیاء-2017
In last years, the Internet of Things has been a revolution in terms of applications and research. Currently, there are a great variety of nodes connected to each other to create different applications in areas, ranging from sport to business, inter alia. These applications compromise our private information about our bank accounts, health, and location. This makes us take safety measures to achieve a secure communication, where the interception of a message by a malicious user cannot compromise our privacy. This security encompasses a very broad concept that can be addressed in multiple ways. This work focuses on the techniques and cryptographic algorithms that can be used in the messages exchanged among the nodes to create secure Internet of Things networks in a way to protect our communications. In this article, we have used the Midgar platform to evaluate the different possibilities of traditional security techniques related to cryptography with the purpose of testing the different combinations to find a solution for the Internet of Things when it uses insecure protocols. Analysing the results to determine the best solution, in terms of costs and security, we concluded that the use the RSA, AES and SHA-3 algorithms are a real possibility to protect message privacy among smart objects. This combination offers the lowest consumption–security relation among all the combinations that we have tested in our evaluation.
Keywords: Internet of Things | Privacy | Security | Cryptography | Ubiquitous computing | Smart Objects | Communications
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 222 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 222 :::::::: افراد آنلاین: 65