دانلود و نمایش مقالات مرتبط با رمزنگاری نامتقارن::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - رمزنگاری نامتقارن

تعداد مقالات یافته شده: 3
ردیف عنوان نوع
1 A technique for DNA cryptography based on dynamic mechanisms
روشی برای رمزنگاری DNA بر اساس مکانیسم های پویا-2019
This paper proposes a technique for DNA cryptography based on dynamic mechanisms i.e . ‘dynamic se- quence table’ and ‘dynamic DNA encoding’. To form dynamic sequence table: initially, DNA base se- quences are assigned to 256 ASCII characters randomly. Where to attain dynamism, positions of DNA base sequences are re-arranged iteratively following a mathematical series. Likewise, to form dynamic DNA encoding: the use of NCBI bank genome sequence with a mathematical series dynamically settles the number of DNA bases required to merge the ciphertext of every two chunks. Here, the way of encryp- tion is: to transform the plaintext into DNA bases, to assign them w.r.t . ASCII characters using dynamic sequence table, to divide these data into a finite number of chunks, to encrypt them using an asymmet- ric cryptosystem, and lastly to merge the ciphertext of chunks through dynamic DNA encoding. Thus, the usage of dynamic mechanisms along with an asymmetric cryptosystem obviously enhances the secrecy level of data. Finally, the outcome of the proposed technique, a comparative study with existing tech- niques, the security analyses, and a statistical test according to the National Institute of Standards and Technology (NIST) to analyze the randomness of the generated ciphertext are presented.
Keywords: DNA cryptography | Dynamic sequence table | Dynamic DNA encoding | NIST | Asymmetric cryptosystem
مقاله انگلیسی
2 Asymmetric color cryptosystem using chaotic Ushiki map and equal modulus decomposition in fractional Fourier transform domains
رمزنگاری رنگ نامتقارن با استفاده از نقشه آشوبی آشوبی و تجزیه مدول برابر در حوزه های تبدیل فوریه کسری-2019
A single channel optical asymmetric cryptosystem for color image in fractional Fourier transform (FrFT) domain is presented. Instead of commonly used RGB channels encryption system, the color image is encoded into grayscale format and encrypted in a single optical channel system. For the design of asymmetric approach, the effective trapdoor one-way function is calculated by employing equal modulus decomposition (EMD). To enhance the security of the proposed cryptosystem, the Ushiki chaotic system is performed to generate the random phase mask in FrFT and a random sequence for scrambling the private key. The sensitive initial values and chaotic data can be regarded as the additional keys and public key. Various numerical experiments are given to verify the validity and capability of the proposed color cryptosystem.
Keywords: Color image encryption | Asymmetric cryptography | Optical transform
مقاله انگلیسی
3 Optical single-channel color image asymmetric cryptosystem based on hyperchaotic system and random modulus decomposition in Gyrator domains
تصویر رنگی تک کانال نوری رمزنگاری نامتقارن مبتنی بر سیستم هایپرکاژیک و تجزیه مدول تصادفی در حوزه های Gyrator-2019
An enhanced optical single-channel asymmetric cryptosystem for color image is proposed by using hyperchaotic system and random modulus decomposition (RMD) in gyrator domains. For increasing the security of the encryp- tion scheme, a novel 4D four-winged hyperchaotic system is utilized to generate several hyperchaotic phases in the encryption approach. Subsequently, the RMD is implemented to obtain the effective trapdoor one-way func- tion in the asymmetric process. Finally, a scrambling encoding algorithm is designed to combine and randomize the intermediate and hyperchaotic data, and the result can be regarded as the ciphertext and private key of the cryptosystem. In the decryption approach, the ciphertext and private key are imported into the input plane of gyrator transform. In fact, the proposed cryptosystem is also applicable in information authentication since the hyperchaotic data is prerequisite both in encryption and decryption approaches. Various numerical simulations are made to demonstrate the validity and capability of the proposed cryptosystem.
Keywords: Asymmetric cryptography | Color image encryption | Optical transform
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 6294 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 40561 :::::::: افراد آنلاین: 52