Filters








55,859 Hits in 6.2 sec

COMPUTATIONAL SCIENCE GUIDED SOFT COMPUTING BASED CRYPTOGRAPHIC TECHNIQUE USING ANT COLONY INTELLIGENCE FOR WIRELESS COMMUNICATION (ACICT)

Arindam Sarkar, J. K. Mandal
2020 Zenodo  
The key stream length always be less than or equal to the plaintext to be encrypt. The keystream generation is based on distribution of characters in the plaintext.  ...  Instead of transmitting the plain keystream to the receiver, further encryption is done on keystream and encrypted keystream get transmitted to the receiver.  ...  key stream guided Encrypted text Generation Table ACI based key stream Blocks based on ACI based key stream Length Value of the ACI based keys Metamorphosed Encoded Cipher text Value ACI based key stream  ... 
doi:10.5281/zenodo.3997111 fatcat:kafrrurxzrghxat4x2tydnalo4

A computationally efficient hybrid approach for engineering optimization problems

Devasish Pal, Raju Ejjagiri, Vinaya Babu A
2012 International Journal of Advances in Computing and Information Technology  
The strength of cryptography is generally based on parameters such as encryption algorithm and key. Larger the key size, greater is the security of data.  ...  One of the parameter used for determining the complexity of a language is the frequency analysis and the percentage retrieval of text from cipher text.  ...  The code point streams that are derivative of syllables are converted to bit stream. A key stream is generated using efficient Random number generator.  ... 
doi:10.6088/ijacit.12.14011 fatcat:ag7cvl6xe5h5pj5ewrctcsvzpa

A stream cipher method for RGB image encryption using PSO base key generation

Sepideh Bahri-Laleh, Mohammad Ali Balafar, Mohammad-Reza Feizi-Derakhshi
2017 International Journal of Security and Its Applications  
A method named PSO Key Generation Color image Encryption (PKGCE) algorithm uses 3 character code tables for each of the 3 channels of RGB image in order to encode the keys and the plain texts showing correspondent  ...  In this regard, a Particle Swarm Optimization (PSO) based algorithm is used to generate the keystream for encryption.  ...  Making Character Code Table in Order to Encode the Plain Text Defining Encoded RGB Image Channels and the Keystream To generate the character code tables, based on the distribution of the characters of  ... 
doi:10.14257/ijsia.2017.11.9.06 fatcat:ghcybqschbf7zooucmdvyqnzb4

Computational Intelligence based Triple Layer Perceptron Model Coordinated PSO Guided Metamorphosed based Application in Cryptographic Technique for Secured Communication (TLPPSO)

Arindam Sarkar, J.K. Mandal
2013 Procedia Technology - Elsevier  
PSO based key stream is used to produce level 1 encoded text by decrypting the level 2 encoded text Finally, metamorphosed based decryption is performed to further decode the text and generate plain text  ...  PSO key stream based encryption. Finally, Triple Layer Perceptron (TLP) generated session key based encryption get performed to produce final cipher text.  ...  Generate level 1 based encoded plain text by performing XOR operation between level 2 encoded cipher text and key stream generated from step 6. Step 9.  ... 
doi:10.1016/j.protcy.2013.12.380 fatcat:nkihgwhqxnhihn3aqe2libbx3y

Symmetric Stream Cipher Based On Chebyshev Polynomial

D. Sravana Kumar
2017 International Journal Of Engineering And Computer Science  
For making the algorithm more secure the key for the first round of encryption is generated from the main key (agreed upon by the sender and the receiver) and the subsequent round keys are concatenated  ...  The stream cipher proposed here has several advantages over conventional cryptosystems.  ...  Subhas BarmanEt.al. [11]used concatenation to generate cryptographic keys for finger print based biometric system.  ... 
doi:10.18535/ijecs/v6i6.17 fatcat:7ppdwraik5hrzprhi453hvj3oq

Group Session Key Exchange Multilayer Perceptron Based Simulated Annealing Guided Automata and Comparison Based Metamorphosed Encryption in Wireless Communication (GSMLPSA)

Arindam Sarkar, J. K. Mandal
2013 International Journal of Wireless & Mobile Networks  
In GSMLPSA technique plain text is encrypted using metamorphosed code table for producing level 1 encrypted text.  ...  As a results both perceptrons generates identical weight vectors which is consider as an one time session key.  ...  Generate plain text by performing metamorphosed character code based decryption on level1 encoded plain text SIMULATED ANNEALING (SA) BASED KEY GENERATION Simulated Annealing (SA) algorithm which is  ... 
doi:10.5121/ijwmn.2013.5415 fatcat:raire6umzzc3zoub67pj7r35ji

Advanced Symmetric Key Cryptography Algorithm: Application of Pseudo Biotic DNA Method(ASKCA VER-1.0)

Asoke Nath, Ankita Kedia, Sunanda Pal, Moumita Sen
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
In our work we will be trying to design an encryption and corresponding decryption algorithm based on pseudo biotic DNA cryptography method.  ...  will make use of basic concepts of DNA cryptography, crossover, mutation, transcription, splicing system for get spliced key, DNA Vigenere table and also a lot of steps to perform randomization of the plain  ...  Convert this bit pattern to ASCII code to generate plain text 25. Print the Plain Text.  ... 
doi:10.32628/cseit2063210 fatcat:wj25sizamva4joqrl7m34e2c5u

Medical Image Encryption Scheme Based on Multiple Chaos and DNA Coding

Joshua C. Dagadu, Jianping Li, Emelia Opoku Aboagye, Faith K. Deynu
2019 International Journal of Network Security  
The chaotic tent map is used to generate chaotic key stream and the logistic map is used to randomly select DNA encoding and decoding rules.  ...  In this paper, an encryption scheme based on multiple chaos and DNA coding is proposed for gray scale medical images.  ...  We generated the initial condition from an external input key of size 128 bits.  ... 
dblp:journals/ijnsec/DagaduLAD19 fatcat:56jprigujzerbhqkbgux4gauxy

Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes [chapter]

Bodo Möller
2003 Lecture Notes in Computer Science  
from appendix A.1 is composed as follows: stream 1,R plain 1 K 2 M 2 stream 2,L plain 2 K 3 M 3 stream 3,L plain 3 payload The string plain 1 is directed to M 1 .  ...  ,Mn (plain i+1 , . . ., plain n ; payload ; C i+1 ), and let C i = stream i,L ⊕ (plain i || prefix |stream i,L |−PlainLen M i (x i )) || C i . 5. Compute M i = MAC i (K i,MAC , C i ). 6.  ... 
doi:10.1007/3-540-36563-x_17 fatcat:666be75uy5ckxggbftxvtatlde

A Comparative Analysis of Encryption Algorithms for Better Utilization

Anuj Kumar, Sapna Sinha, Rahul Chaudhary
2013 International Journal of Computer Applications  
Based on following experimental it can be seen that TDES in general perform better than other algorithms.  ...  General Terms Algorithms  ...  stream to recover the plain text bits. i i i K C P   The system security depend s entirely on the inside of keys team generator.  ... 
doi:10.5120/12426-8934 fatcat:iek56vkffvelzjagewznalirwe

DNA Secret Writing with Laplace Transform

Sukalyan Som, Moumita Som
2012 International Journal of Computer Applications  
The input string converted to DNA nucleotides using DNA coding and then the DNA codes are converted to positive integers.  ...  DSWLT consider the plain text (i.e. the input file) as binary string with finite no of bits.  ...  Bit binary stream 00 01 10 11 Base nucleotide A C G T Table 4 : Lookup table mapping numeric value to base nucleotide 4 A -10 C -20 G -30 T -40 And the corresponding integer coded text is shown in table  ... 
doi:10.5120/7771-0853 fatcat:etuf3t2ztfbl3fjunjaxt4q2u4

Hybrid Architecture to overcome the Error Propagation Effect of AES

B. Sarkar, C. T. Bhunia, U. Maulik
2012 International Journal of Computer Applications  
The input data and the keys of different rounds are all generated from the original source data and the source key respectively.  ...  General terms Information security, Cryptography.  ...  First the LRC code, say L 1 , is generated from the input state (plain text) P and then P is encrypted (by the key, say K) through the Encryptor-1 to generate the cipher text C which is then again decrypted  ... 
doi:10.5120/8131-1610 fatcat:ilyh23knhffm3cvkeo3nhsseem

Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding) [chapter]

Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar
2009 Communications in Computer and Information Science  
Generally, a stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudorandom Keystream bits to achieve desired cipher text.  ...  To implement stream cipher with help of Biometric images, we extract Initial condition for LFSR from iriscode. We extracted iriscode using CASIA Iris database with help of Gabor Wavelet equation.  ...  First permutation takes two variable Plain text (P) and Cipher Text (C). The second permutation takes considers Plain Text (P) and Key Stream (K).  ... 
doi:10.1007/978-3-642-10616-3_14 fatcat:742g5zt7lnaybjbkj3o5tzj66m

Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key

P Anuradha Kameswari, R Chaya Kumari, L Praveen Kumar
2011 International journal of network security and its applications  
In this paper we propose a scheme of encryption for Block ciphers in N-alphabet, where every member of any m-block of plain text is enciphered by different permutations which are generated by the help  ...  of any block of the plain text that generates a function e from P to C given as ( ) ( ) word agreed upon then define the function Π : : Basic Codes: Let S be the secret sentence of m words each of length  ...  the plain text is encrypted by a different code and the multi codes generated are determined by the secret key which is a secret sentence agreed upon.  ... 
doi:10.5121/ijnsa.2011.3610 fatcat:yzfplvh4hrfsdfqlykcctb53um

Proxy System with JPEG Bitstream-Based File-Size Preserving Encryption for Cloud Photo Streams [article]

Hiroyuki Kobayashi, Hitoshi Kiya
2021 arXiv   pre-print
In this paper, we propose a proxy system with JPEG bitstream-based file-size preserving encryption to securely store compressed images in cloud environments.  ...  The proposed system, which is settled between client's device and the Internet, allows us not only to have exact the same file size as that of original JPEG streams but also to maintain a predetermined  ...  . [5] [6] [7] For JPEG 2000 images, bitstream-based encryption methods can maintain the same file size before and after encryption by considering the generation of special marker codes. 3, 4 n contrast  ... 
arXiv:2201.03469v1 fatcat:h4a7i5ruezfefddgpx4b4bejbe
« Previous Showing results 1 — 15 out of 55,859 results