Filters








4,940 Hits in 3.1 sec

On the Security of RSA Screening [chapter]

Jean -Sebastien Coron, David Naccache
1999 Lecture Notes in Computer Science  
In eurocrypt'98, Bellare et al. [1] presented a fast RSA batch verification scheme, called screening.  ...  The simultaneous processing, called batching, must be provably equivalent to the sequential verification of all signatures.  ...  Since the security of screening is based on the hardness of RSA, we recall the formalization given in [2] . The security of RSA is quantified as a trapdoor permutation f .  ... 
doi:10.1007/3-540-49162-7_15 fatcat:ndbdhym6drdw5iv4hkik5rd36u

Cryptographic Energy Costs Are Assumable in Ad Hoc Networks

Helena RIFÀ-POUS, Jordi HERRERA-JOANCOMARTÍ
2009 IEICE transactions on information and systems  
The performance of symmetric and asymmetric cryptography algorithms in small devices is presented.  ...  Both temporal and energy costs are measured and compared with the basic functional costs of a device.  ...  Acknowledgments This work was partially supported by the Spanish Ministry of Science and Education under grants TSI-020100-2008-365 SAT2, TSI2007-65406-C03-03 E-AEGIS and CON-SOLIDER CSD2007-00004 ARES  ... 
doi:10.1587/transinf.e92.d.1194 fatcat:fjsdknl4z5dkrcvdgviakf33ba

How to Disembed a Program? [chapter]

Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
2004 Lecture Notes in Computer Science  
After describing the machine's instruction-set we introduce a public-key oriented architecture design which relies on a new RSA screening scheme and features a relatively low communication overhead.  ...  This paper presents the theoretical blueprint of a new secure token called the Externalized Microprocessor (XµP). Unlike a smartcard, the XµP contains no ROM at all.  ...  Interestingly, the paradigm of signature screening on which Protocols 1 and 2 are based also exists in the symmetric setting, where RSA signatures are replaced by MACs and a few hash functions.  ... 
doi:10.1007/978-3-540-28632-5_32 fatcat:5d4lxwbnundrlkzklirsuppske

Secure SMS System using RSA Encryption Based on Android platform

Zarni Sann, Thi Thi Soe, Moe Moe San
2020 International Journal of Advances in Scientific Research and Engineering  
Asymmetric key cryptography algorithm RSA is used for encryption and decryption of the message. The user can obtain the security of text messages using RSA.  ...  This system provides a secure message on the mobile phone. Every SMS packet contains 140 bytes of effective data.  ...  Download the RSA message application icon. 2. Tap on Install. The welcome screen opens. 3. Delete or cancel Installation Package and Tap Open. 4.  ... 
doi:10.31695/ijasre.2020.33797 fatcat:tujnh5zolrh27necgqmd6r2qmm

Data protection on hadoop distributed file system by using encryption algorithms: a systematic literature review

Meisuchi Naisuty, Achmad Nizar Hidayanto, Nabila Clydea Harahap, Ahmad Rosyiq, Agus Suhanto, George Michael Samuel Hartono
2020 Journal of Physics, Conference Series  
Information security is fundamental concern and new set challenge for the world of big data.  ...  The main purpose of this paper is to protect Hadoop Distributed File System data by using encryption algorithm. This is to ensure data is secured at storage level of HDFS.  ...  Reference of [24] suggests the same solution to apply more than one encryption algorithms knows as hybrid cryptosystem to secure data.  ... 
doi:10.1088/1742-6596/1444/1/012012 fatcat:s4aw65mqlvbkjgekql4ft6qpjm

A study of keep the Secret information of Random Sized Images from using Indestructible Security

Seon-mi Woo, Malrey Lee, Hyang Ran Lee
2016 International journal of advanced smart convergence  
To resolve the security issues, a security mechanism is proposed which hide the sensitive information of images before transmitting to networks.  ...  To provide an indestructible security mechanism, cryptography algorithms are deployed and considered as best solutions to keep the secret information of images.  ...  The below screen shot illustrated the bytes in hexadecimal format, which computed after deploying of RSA algorithm.  ... 
doi:10.7236/ijasc.2016.5.1.23 fatcat:3n3cmhhlrjaidjlguqdilpy7ha

A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks

Qasem Abu Al-Haija, Mashhoor Al Tarayrah, Hasan Al-Qadeeb, Abdulmohsen Al-Lwaimi
2014 Procedia Computer Science  
Arduino Mega2560R3 microcontroller supported with external memory and a screen touch LCD as well as a double keypad has been used under the programming of C language to implement the proposed RSA coprocessor  ...  due to the ease of connecting the MCU to the WSN which as well avoid the processing time of encryption/decryption processes that could be executed by the MCU instead of the life limited sensors.  ...  Acknowledgements Authors appreciate the publication support of College of Engineering at King Faisal University (KFU). Special Thanks due to Prof. Amjad Omar (Chairman of EE Department) and Mr.  ... 
doi:10.1016/j.procs.2014.07.091 fatcat:zcqeidt7ebbitizczkx5hvvgfe

Design of Encrypted Packets for Identification of Missing objects using RF Tags and 32 -Bit Microcontroller

Randeep SinghTaggad, S. V. A. V. Prasad, Arvind Pathak
2013 International Journal of Computer Applications  
The proposed methodologically will find out the identification of the missing objects and transmit the desired information in encrypted packet format for secured communication of the information..  ...  on IDs missing from a group.  ...  All information regarding missing objects is shown on LCD. It can not show any animated display on screen but characters and numbers can be displayed on the same LCD.  ... 
doi:10.5120/12407-8830 fatcat:cfdqlofzpjgdfjvhiex7cuxzw4

Mechanism on Computer Access Permission Management Based on the Proposed Dynamic Password Algorithm

Jiujun Cheng, Yang Yang, Jianyu Shao, Jingxue Liao
2015 International Journal of Security and Its Applications  
Based on RSA encryption algorithm, we design a dynamic password encryption and codec algorithm, and propose a mechanism on computer access permission management which is capable of dealing with situations  ...  The rest of this paper is organized as the following. Section 2 presents our improved RSA-based dynamic password encryption algorithm.  ...  Acknowledgements International Journal of Security and Its Applications Vol. 9, No.11 (2015)  ... 
doi:10.14257/ijsia.2015.9.11.37 fatcat:yolazjo2dfhorjgbkan7fh7kse

Comparative Study of RSA and Probabilistic Encryption/Decryption Algorithms

N. Priya
2017 International Journal Of Engineering And Computer Science  
One of the most important components of network security is cryptography and it consists of many algorithms that protect user from the adversary like trapdoor, eavesdroppers, hackers etc.  ...  The aim of this paper is to outline the key concepts involved in two algorithms namely Goldwasser-Micali encryption and most widely used RSA.  ...  The RSA theme relies on another onerous mathematical downside, the trait of resolving massive integers.  ... 
doi:10.18535/ijecs/v6i1.04 fatcat:txhvcg4lp5gwzedwucsmbu36xu

Introduction of Smart Monitoring and Tracing System Using GPS Information

Choong-Soo Lim, Hwan-Chul Kim, Sang-Kyun Cha, Jung-Hoon Choi
2012 International Journal of Computer and Communication Engineering  
We will develop the SMTS based on wireless network access control for efficient data relay, automatic tracing of a moving object using position recognition, and map based position display.  ...  Also it can do real-time tracing the location of target objects by automatic camera control using location information.  ...  When a security man with a PSST detects an intruder, he can propagate the location of intruder by marking on the LCD screen of the PSST.  ... 
doi:10.7763/ijcce.2012.v1.30 fatcat:q273qu5ebbhinfejiaihlpw4iq

Improve Cloud Computing Security Using RSA Encryption WithFermat's Little Theorem

Balkees Mohamed Shereek
2014 IOSR Journal of Engineering  
Encryption is the one of the most secured way using prevent unauthorized access. Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together.  ...  By using Fermat's theorem can be speed up the RSA Encryption.  ...  The security of RSA algorithm is lies on integer factorization problem.  ... 
doi:10.9790/3021-04260108 fatcat:m72osaqr2ve4hj7o3qk6s53uni

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices

Helena Rifà-Pous, Jordi Herrera-Joancomartí
2011 Future Internet  
on personal agendas, and compare them with the costs of basic operating system functions.  ...  However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms.  ...  Acknowledgments This work is partially supported by the Spanish Ministry of Science and Innovation and the FEDER funds under the grants TSI-020100-2009-374 SAT2, TSI2007-65406-C03-03 E-AEGIS and CONSOLIDER  ... 
doi:10.3390/fi3010031 fatcat:yay25oqaabaizes7dchw6ziglu

Challenges in Cyber Security: Ransomware Phenomenon [chapter]

Vlad-Raul Paşca, Emil Simion
2018 Cyber-Physical Systems Security  
Ransomware is a very severe cyber security threat since its inception. Ransomware has grown to be one of the biggest problems in the era of information technology.  ...  It is a type of malware which blocks a computer or encrypts the data and demands money in the form of virtual currency like Bitcoin for restoration of the functionality.  ...  Subsequently, encrypted AES key (secret key) is stored in each encrypted files on the computer of victim. Whereas attacker controls the RSA private key on the command and control server.  ... 
doi:10.1007/978-3-319-98935-8_15 fatcat:6nw66pfc6va33edp25rzjytrh4

Implementation of mobile APP service in an electronic tax invoice

Myeong Seop Shim
2018 International Journal of Engineering & Technology  
tax invoice and database analysis of electronic tax bill based on existing Web for the purpose of application development in iphone and Android based phone.FindingsSmartphone based functions of how to  ...  development of issuing in electronic tax invoice based on smartphone mobile application against electronic tax invoice based on existing Web.Methods/Statistical analysis: Data analysis of existing electronic  ...  A larger data of application is also encrypted by a high speed of AES and AES private key with low capacities is implemented to encrypt by highly secured RSA 5,6 .  ... 
doi:10.14419/ijet.v7i2.33.13878 fatcat:bjficxbpt5huxbgb324k3gkco4
« Previous Showing results 1 — 15 out of 4,940 results