854 Hits in 2.0 sec

A Block Cipher Algorithm Based on Magic Square for Secure E-bank Systems

Farah Tawfiq Abdul Hussien, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab
2022 Computers Materials & Continua  
Due to a decrease in the time of encrypting and decrypting, as well as the usage of the central processing unit (CPU), efficiency is improved.  ...  Nowadays the E-bank systems witnessed huge growth due to the huge developments in the internet and technologies.  ...  Which conflicts with the requirement of fast encryption algorithm for real-time systems [25] [26] [27] [28] [29] .  ... 
doi:10.32604/cmc.2022.027582 fatcat:tm6ub56nfvhi3jxjvs63364dae

Single-bit re-encryption with applications to distributed proof systems

Nikita Borisov, Kazuhiro Minami
2007 Proceedings of the 2007 ACM workshop on Privacy in electronic society - WPES '07  
We examine the implementation of the distributed proof system designed by Minami and Kotz [17].  ...  We find that, although a high-level analysis shows that it preserves confidentiality, the implementation of the cryptographic primitives contains a covert channel that can leak information.  ...  with the final version of the paper.  ... 
doi:10.1145/1314333.1314341 dblp:conf/wpes/BorisovM07 fatcat:mtujpttyuneyljmiq63od3ikwy

Design hybrid encryption system based on E0 algorithm and A5/3 algorithm in the encryption process

2018 Al-Qadisiyah Journal Of Pure Science  
The purpose of this paper is to create the safer hybrid system ,the more secure and fast , by the merge A5/3 algorithm with E0 algorithm, so as to produce bluetooth algorithm relies on block cipher.  ...  Some modifications were done on both algorithms in order to correspond the work of each algorithm with other, that would speed up the labor of the algorithm in the calculation of the total time-spent and  ...  the our system with systems " A5/3 algorithm and E0 algorithm" separately. 13-Specification of the A5/3 Encryption Algorithms for GSM and ECSD, and the GEA3 Encryption Algorithm for GPRS; Design  ... 
doi:10.29350/jops.2018.23.2.764 fatcat:t3e7byb5h5evxffbfbcgyjlv4u

Cube-Type Algebraic Attacks on Wireless Encryption Protocols

Nikolaos Petrakos, George W. Dinolt, James Bret Michael, Pantelimon Stanica
2009 Computer  
For efficiency-in speed, size, and power consumption-the system uses the E0 (128-bit) stream cipher instead of one of the widely used block ciphers.  ...  By skillfully choosing some publicly settable bits, the attacker can replace the degree of the polynomial that represents the encryption function with a system of linear equations.  ... 
doi:10.1109/mc.2009.318 fatcat:4zqnguqai5bnrgbd2ie56faiau

Dynamical properties of ion-acoustic waves in space plasma and its application to image encryption

Jharna Tamang, Jean De Dieu Nkapkop, Muhammad Fazal Ijaz, Punam Kumari Prasad, Nestor Tsafack, Asit Saha, Jacques Kengne, Youngdoo Son
2021 IEEE Access  
In addition complexity analysis shows the possibility of practical implementation of the proposed algorithm.  ...  Applying the wave transformation, the governing equations are deduced into a dynamical system (DS). Supernonlinear and nonlinear periodic IAWs are presented through phase plane analysis.  ...  Kengne Jacques for his inestimable broad knowledge, common sense, and ability to analyze intricate problems crucial to the success of this research work.  ... 
doi:10.1109/access.2021.3054250 fatcat:737mdfandbagfawpwajumppqvq

An Integrated Scheme based on Triple DES, RSA and MD5 to Enhance the Security in Bluetooth Communication

Trishna Panse, Vivek Kapoor
2012 International Journal of Computer Applications  
This scheme is based on Triple DES, RSA and MD5.Triple DES algorithm (variant of DES) is used for encryption, which is more secure in comparison to DES. RSA is used to encrypt the key of triple DES.  ...  Message digest Algorithm MD5 is adopted in this mechanism to verify the integrity of the message.  ...  Li juan Chen Bin, Li Kun, 2009[3] proposed the solution to the limitations of the E0 stream cipher that is used in Bluetooth System, the proposed system uses DES algorithm.  ... 
doi:10.5120/7787-0884 fatcat:xf4doaha2zhszpgn5ke5koaxnu

Improving wireless security through network diversity

Tao Ye, Darryl Veitch, Jean Bolot
2008 Computer communication review  
them, on top of the availability or strength of underlying encryption techniques.  ...  Second, in an effort towards provable security, we analyze the security of our model in the wiretap channel framework of information theory and characterize the secrecy capacity of our system.  ...  Thus conceptually the overlay sits between the encryption and decryption functions of the underlying cipher E0.  ... 
doi:10.1145/1496091.1496096 fatcat:jlm3vjatbvdd7frxhiu73q3umq

Image Encryption Algorithm Based on a Novel Six-Dimensional Hyper- Chaotic System

Sadiq A. Mehdi, Zaydon Latif Ali
2020 Mustansiriyah Journal of Science  
In recent years, the chaotic system of image encryption becomes an efficient way to encrypt images due to its high security.  ...  The performance of the algorithm has been analyzed through analyzes statistical such as Histogram Analysis, Correlation Coefficient Analysis, Information Entropy Analysis, Key Space Analysis, Key Sensitivity  ...  Therefore, the equilibrium E0(0,0,0,0,0,0) is a saddle point, and the hyperchaotic system is unstable at the point 1.  ... 
doi:10.23851/mjs.v31i1.739 fatcat:qoufntyqivfxrejrbdpfqove4i

Performance Analysis of AES Algorithm on MPC Processor

Gao Haifeng, Han You, Song Yapeng, Chen Shuizhong
2015 Open Cybernetics and Systemics Journal  
Test results show that the maximum encryption speed of AES algorithm is nearly 21MB/s under the circumstance of our experiment.  ...  In this paper, we firstly study the theory of AES algorithm and then conduct performance analysis of AES algorithm on MPC processor whose frequency is 800MHz according to the superscalar pipeline of E600  ...  ,r12,4 D I - - E0 E0 Analysis of Execution Time based on Superscalar Pipeline In this fraction, we analyze the execution time of memory access instruction of AES algorithm basing on superscalar pipeline  ... 
doi:10.2174/1874110x01509012248 fatcat:gnb6ivzqdfcpxhd5ggpundefry

Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model

Shoichi HIROSE, Hidenori KUWAKADO, Hirotaka YOSHIDA
2021 IEICE transactions on information and systems  
In this paper, we analyze the security of Lae0 in the ideal cipher model. Our result implies about 120-bit security for instantiation with the block cipher of Lesamnta-LW.  ...  Unfortunately, their result implies only about 64-bit security for instantiation with the dedicated block cipher of Lesamnta-LW.  ...  Acknowledgments The first author was supported in part by JSPS KAKENHI Grant Number JP18H05289.  ... 
doi:10.1587/transinf.2021ngp0008 fatcat:ftvt4azxgrgezlineh6ybdbvkq

Design and Analysis of a Novel Six-Dimensional Hyper Chaotic System

Sadiq A. Mehdi, Shatha Jassim Muhamed
2020 Mustansiriyah Journal of Science  
gives an analysis of the new systems.  ...  The results of the analysis exhibit that the new system contains three unstable equilibrium points and the six Lyapunov exponents.  ...  The speed analysis shows that the proposed encryption algorithm is highly encrypted, consistent with the best solutions in a region.  ... 
doi:10.23851/mjs.v31i4.901 fatcat:63sa24iexnbb7ck3zwmiacoctq

Privacy preserving electronic data gathering

E.C. Laskari, G.C. Meletiou, D.K. Tasoulis, M.N. Vrahatis
2005 Mathematical and computer modelling  
Analysis of these databases can be very beneficial to the owner organizations, as it contributes to knowledge discovery, rib extract broader and more accurate conclusions, knowledge discovery techniques  ...  need to be applied on a collection of databases of different organizations involved in the same field.  ...  The public key E0 is used by all Aliees for the encryption of all packages A s to zj = Eo(Aj).  ... 
doi:10.1016/j.mcm.2005.09.003 fatcat:ysnhb5xn5zbpjnqk4vijbbef2y

Static validation of security protocols

Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
2005 Journal of Computer Security  
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol.  ...  We then apply static analysis technology to develop an automatic validation procedure for protocols.  ...  We show the semantic correctness of the analysis and demonstrate that best solutions (in the manner of principal types for type systems) always exist.  ... 
doi:10.3233/jcs-2005-13302 fatcat:clyyodohf5hyznyz45fun2ysga

Non-repudiation analysis using LySa with annotations

Mayla Brusò, Agostino Cortesi
2010 Computer languages, systems & structures  
This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LySa, using an extended syntax with annotations.  ...  Non-repudiation is verified using a Control Flow Analysis, following the same approach of Buchholtz and Gao for authentication and freshness analyses.  ...  ,E k g E0 Symmetric encryption fjE 1 , . . . ,E k jg E0 Asymmetric encryption P :: ¼ Processes /E 1 , . . . ,E k S:P Output (E 1 ,y,E j ; x j + 1 ,y,x k ).P Input decrypt E as fE 1 , . . .  ... 
doi:10.1016/ fatcat:zgnelkafpzcujlypauerihaaoq


Elyorion Kurbonov
2019 Bulletin of the Novosibirsk Computing Center Series Computer Science  
Over the last three decades of research and development in stream ciphers, a number of designs have been proposed and analyzed by the cryptology community.  ...  The most important and cryptographically significant goal of a stream cipher is to produce a pseudorandom sequence of bits or words using a fixed length secret key, often paired with a fixed length public  ...  Later, the public description was verified by comparing the outputs of the leaked design with those of the licensed systems using proprietary versions of the original cipher.  ... 
doi:10.31144/bncc.cs.2542-1972.2019.n43.p53-60 fatcat:qnv7twhmwnczdjevlhksgznjru
« Previous Showing results 1 — 15 out of 854 results