To see the other types of publications on this topic, follow the link: ElGamal cryptographic system.

Journal articles on the topic 'ElGamal cryptographic system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 20 journal articles for your research on the topic 'ElGamal cryptographic system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.

Full text
Abstract:
Encryption is a well known technology for protecting sensitive data. ElGamal encryption and RSA algorithm is made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mails from mail server. This system is implemented to secure mail server system for local government’s important mail messages. These algorithms consume a considerable amount of time and resources such as memory, CPU time, and computation time to encrypt and decrypt data. In this paper, the results are comparison of these algorithms in term of encryption time, decryption time, and memory usage over variable file sizes. After processing, it is proven that RSA performs a faster encryption process than ElGamal. However, ElGamal decryption process is faster than RSA. This system is also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographic public-key algorithms but have functions in different ways. This system is using C# programming language and SQL Server to store mail messages.
APA, Harvard, Vancouver, ISO, and other styles
2

Narasimha Nayak, V., M. Ravi Kumar, K. Anusha, and Ch Kranthi Kiran. "FPGA based asymmetric crypto system design." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 612. http://dx.doi.org/10.14419/ijet.v7i1.1.10788.

Full text
Abstract:
In the network security system cryptography plays a vital role for the secure transmission of information. Cryptography is a process of integrating and transferring the data to the genuine users against any attacks. There are two types of Cryptographic algorithm: Symmetric and Asymmetric algorithms. In the symmetric type cryptography, single key is used for both encryption and decryption. Symmetric algorithms are fast and simple. Asymmetric cryptographic algorithm uses different keys such as public key to encrypt the message at sender and private key which is known only to receiver for decrypting the encrypted message. Asymmetric algorithms are more secure and difficult, to decrypt the message unless hacker acquires the knowledge of private key. A new Asymmetric algorithm with Error Detection and Correction mechanism is proposed that can reduce hardware, and improves decryption time and security. Proposed Asymmetric algorithm uses the few properties of: RSA, Diffie-Hellman and ElGamal Algorithms. Performance of asymmetric algorithms is compared with proposed algorithm, which is designed using Verilog HDL. Algorithms are synthesized, simulated, implemented using Vivado and targeted for Artix-7 XC7A100T-1CSG324Carchitecture.Chipscope Pro logic analyzer-Virtual Input Output core is binded to design for hardware debugging, to monitor and capture the output signals at selected specified state by applying random input stimuli at runtime in Nexys4 DDR FPGA Board.
APA, Harvard, Vancouver, ISO, and other styles
3

Rofiq, Muhammad, and Bambang Tri Wahjo Utomo. "IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID." Jurnal Ilmiah Informatika 1, no. 1 (June 9, 2016): 7–16. http://dx.doi.org/10.35316/jimi.v1i1.437.

Full text
Abstract:
Most of Safes lock system is still using conventional methods nowadays. The conventional method leads to the safes’ burglary. Some of the causes are the safes’ code that can be tracked easily and the key can be duplicated. Previous research on safes’ security has ever been done. The weakness of the study is there is no security system using cryptographic algorithms for data security. The development of a safes security system by implementing ElGamal algorithms is done by following the engineering approach with the stages of methods analysis and design system, implementation and testing of the analysis and the discussion of the overall system. In the analysis and design of mathematical models using ElGamal algorithms, uses fast powering theorems and applications design uses Object OrientedProgramming. In the analysis of hardware refers to the datasheet and calculation of the value of electrical characteristics of the circuit. In the safes lock system, the outcome of the research is a safes prototype which is equipped with enhancements that include a series of processing algorithms, the data viewer, a wireless data transfer device, the Android smartphone as a system of user authorization. For the lock safes systems is using a locked solenoid. The control system is done by a lock safes android smartphone via Bluetooth communication. The test results also indicate the system will open the safes if the code and the public key is entered correctly, and the system will not open if one of the codes or the public-keys are wrong or both are wrong.
APA, Harvard, Vancouver, ISO, and other styles
4

Seo, Hwa-Jeong, and Ho-Won Kim. "EC-ELGAMAL Homomorphic Cryptography based E-voting System." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (April 30, 2013): 909–16. http://dx.doi.org/10.6109/jkiice.2013.17.4.909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sann, Zarni, Thi Thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance comparison of asymmetric cryptography (case study-mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (January 27, 2020): 105–11. http://dx.doi.org/10.34306/csit.v4i3.98.

Full text
Abstract:
Data encryption is well known as essential for today’s technology. ElGamal encryption and RSA algorithmis made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mailsfrom mail server. This system is implemented to secure mail server system for local government’s important mailmessages. These algorithms consume a considerable amount of time and resources of memory, CPU time, andcomputation time to encrypt and decrypt data. This paper discuss the results comparison of these algorithms in termof encryption time, decryption time, and memory usage over variable file sizes. The results show that RSA does fasterencryption process in compare with ElGamal. However, ElGamal decryption process is quicker than RSA. This systemis also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographicpublic-key algorithms but have roles in different techniques. This system is using C# programming language and SQLServer to store mail messages.
APA, Harvard, Vancouver, ISO, and other styles
6

Saputro, Triyas Hevianto, Nur Hidayati Hidayati, and Erik Iman H. Ujianto. "SURVEI TENTANG ALGORITMA KRIPTOGRAFI ASIMETRIS." Jurnal Informatika Polinema 6, no. 2 (March 8, 2020): 67–72. http://dx.doi.org/10.33795/jip.v6i2.345.

Full text
Abstract:
Keamanan merupakan salah satu faktor penting dalam penyimpanan dan pengiriman data atau pesan. Salah satu cara untuk mengamankan dokumen adalah dengan menggunakan algoritma kriptografi. Kriptografi berdasarkan jenis kuncinya dibedakan menjadi dua yaitu kriptografi simetris dan asimetris. Algoritma enkripsi asimetris termasuk Rivest–Shamir–Adleman (RSA), Diffie-Hellman, Digital Secure Algorithm (DSA), XTR, Elliptic Curve Cryptography (ECC), dan Elgamal Encryption System (ESS). Dalam makalah ini akan melakukan survei paper terkait algoritma-algoritma enkripsi asimetris. Implementasi kriptografi asimetris dapat dikembangkan menggunakan algoritma-algoritma tersebut. Kata kunci : cryptography, encryption, decryption, public key
APA, Harvard, Vancouver, ISO, and other styles
7

Sapna Kumari, C., C. N. Asha, U. Rajashekhar, and K. Viswanath. "Performance Analysis of Cloud-based Health Care Data Privacy System Using Hybrid Techniques." International Journal of Biology and Biomedical Engineering 16 (January 3, 2022): 46–63. http://dx.doi.org/10.46300/91011.2022.16.7.

Full text
Abstract:
At present, due to the various hacking approaches, the protection for any data transmitted through any channel or mode is one of the important issues. Nowadays, providing data security is satisfactory, developments are extended for obtaining data among the transceivers. Security level depends on the size of a symmetric key which is employed for encryption and decryption using various cryptography systems management and in modern approaches like block and RF codes including AES use a larger size of key simultaneously and there exists security problems due to hacking approaches. To illustrate the protection level and hacking problems, a new ECC is presented as well as by employing scalar duplication, the synchronous key is generated and consists of point doubling and point addition. The created focuses are encrypted before transmission by using ECC-Elgamal-Holomorphic (ECCEH) and transferred through a distant channel and encipher data is failed at the receiver using ECCEH which includes the reverse process. The unique standards of cryptography context have been generated by MATLAB; the defined framework has endeavored to the extent that speed, delay as well as control, and many others are accepted in MATLAB 2017a. The user of the sender, the original information is transformed into integer value by employing Holomorphic and encodes it by utilizing the Elgamal ECC algorithm which employs point doubling and point addition. The encoded information is uploaded into the cloud for storage, here www.thingspeak.com is utilized for storage. When the user presents at the receiver request the cloud to access from it, initially the cloud server authenticates the access control strategies of the requester, and then access is provided by the cloud server. If the user authenticates the strategies, then encoded data can download and the original data is decoded by synchronous key employing ECC- Elgamal algorithm. Using original and decrypted data, various performance factors are calculated in terms of execution time, packet delivery ratio, throughput, latency and compare these results with conventional methods and found to be 12%, 31%, 24%, and 8% progress concerned with packet delivery ratio, latency, outturn and execution time.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Yingjie, Jianhua Li, and Ling Tie. "A simple protocol for deniable authentication based on ElGamal cryptography." Networks 45, no. 4 (2005): 193–94. http://dx.doi.org/10.1002/net.20062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ramadani, Suci. "Hybird Cryptosystem Algoritma Hill Cipher Dan Algoritma ElGamal Pada Keamanan Citra." METHOMIKA: Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (April 1, 2020): 1–9. http://dx.doi.org/10.46880/jmika.v4i1.138.

Full text
Abstract:
The development of technology at this time allows everyone to exchange information without any limitation of time and distance. The possibility that data leakage will occur during the process of exchanging information is carried out, therefore in sending data especially images, security aspects, confidentiality and efficiency of data storage is very necessary. If the important information falls into the wrong hands, it will cause unwanted things, for example manipulation of images with negative shapes and can harm the owner of the image. One method used to maintain data security is cryptography using one of the techniques, Elgamal. The strength of this algorithm lies in the difficulty of calculating discrete algorithms on prime integers in which multiplication operations are performed. In this research, the writer combines Hill Cipher to do image encryption and Elgamal Algorithm to decrypt the key of Hill Cipher. The image is first encrypted using the Hill Cipher, then the Hill Cipher key is encrypted using the Elgamal Algorithm. The implementation of the system uses the programming language Visual Basic Net 2010. The results of the implementation with the initial encrypted image has 4282.85 milliseconds with random images, while the encrypted image will be re-described as having 20442.84 milliseconds with the image returned to the beginning.
APA, Harvard, Vancouver, ISO, and other styles
10

Putra, Eko. "Implementation Of Eliptic Curve Cryptography Using The Elgamald Algorithm And Primary Number Generating Method Rabin-Miller For Text File Security." Journal Basic Science and Technology 11, no. 1 (February 28, 2022): 32–39. http://dx.doi.org/10.35335/jbst.v11i1.1773.

Full text
Abstract:
The biggest weakness of Elliptic Curve Cryptography is the difficulty of points counting in elliptic curve which affects the process time. This paper considers a method of simplifying the counting in Elliptic Curve Cryptography and quickening the process time without decreasing the security level. Using ElGamal Algorithm as method of encryption, the implementation also involves Rabin-Miller Prime Number Generator to generate the public key. The system is tested using five different text files with different sizes and lengths. The result shows that by limiting the value of a and b to 1 in the elliptic curve function and also limiting the prime number down to two digits, successfully quicken the process time, the encryption process also takes only a small amount of time.
APA, Harvard, Vancouver, ISO, and other styles
11

Dr. Pasumponpandian. "Development of Secure Cloud Based Storage Using the Elgamal Hyper Elliptic Curve Cryptography with Fuzzy Logic Based Integer Selection." Journal of Soft Computing Paradigm 2, no. 1 (March 15, 2020): 24–35. http://dx.doi.org/10.36548/jscp.2020.1.003.

Full text
Abstract:
The technological advancements in the field of the information and communication technology led to the development of more promising cloud paradigm that allows online provision of services such as platform, software and infrastructure. The infrastructure services provided by the cloud allows the user data to be stored and accessed ubiquitously unlike the arrays that are available on the premises. However the security of the data that are being stored in the internet are still under research. This remains as major inhibitor for the adoption of cloud service in spite of its reliability, elasticity, high computational capabilities and the pay as you go possibilities. So the paper puts forth the construction of a secure storage as service in the cloud computing by utilizing the cryptography system based on Elgamal. The proposed method encrypts the data to be stored using the Elgamal that incorporates the hyper elliptic curve cryptography for twofold encryption and further utilizes the fuzzy logic to perform the integer selection that serves as the significant attribute in defining the cloud storage security. The point addition and the double based ECC is used for generating the keys for the hyper elliptic curve cryptography. The twofold security model put forth is validated using the MATLAB on the terms of efficiency observed on securing the data stored in cloud as well as the cost and the execution time endured by the proposed twofold security. The results shows that the protection offered by the twofold security is much better compared to the prevailing.
APA, Harvard, Vancouver, ISO, and other styles
12

Prabhdeep Kaur and Sheetal Kalra. "On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography." Journal of Technology Management for Growing Economies 6, no. 1 (April 27, 2015): 39–52. http://dx.doi.org/10.15415/jtmge.2015.61004.

Full text
Abstract:
Secure and efficient mutual authentication and key agreement schemes form the basis for any robust network communication system. Elliptic Curve Cryptography (ECC) has emerged as one of the most successful Public Key Cryptosystem that efficiently meets all the security challenges. Comparison of ECC with other Public Key Cryptosystems (RSA, Rabin, ElGamal) shows that it provides equal level of security for a far smaller bit size, thereby substantially reducing the processing overhead. This makes it suitable for constrained environments like wireless networks and mobile devices as well as for security sensitive applications like electronic banking, financial transactions and smart grids. With the successful implementation of ECC in security applications (e-passports, e-IDs, embedded systems), it is getting widely commercialized. ECC is simple and faster and is therefore emerging as an attractive alternative for providing security in lightweight device, which contributes to its popularity in the present scenario. In this paper, we have analyzed some of the recent password based authentication and key agreement schemes using ECC for various environments. Furthermore, we have carried out security, functionality and performance comparisons of these schemes and found that they are unable to satisfy their claimed security goals.
APA, Harvard, Vancouver, ISO, and other styles
13

Li, Qi, Hongbo Zhu, Zuobin Ying, and Tao Zhang. "Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud." Wireless Communications and Mobile Computing 2018 (June 6, 2018): 1–12. http://dx.doi.org/10.1155/2018/1701675.

Full text
Abstract:
In cloud-assisted electronic health care (eHealth) systems, a patient can enforce access control on his/her personal health information (PHI) in a cryptographic way by employing ciphertext-policy attribute-based encryption (CP-ABE) mechanism. There are two features worthy of consideration in real eHealth applications. On the one hand, although the outsourced decryption technique can significantly reduce the decryption cost of a physician, the correctness of the returned result should be guaranteed. On the other hand, the malicious physician who leaks the private key intentionally should be caught. Existing systems mostly aim to provide only one of the above properties. In this work, we present a verifiable and traceable CP-ABE scheme (VTCP-ABE) in eHealth cloud, which simultaneously supports the properties of verifiable outsourced decryption and white-box traceability without compromising the physician’s identity privacy. An authorized physician can obtain an ElGamal-type partial decrypted ciphertext (PDC) element of original ciphertext from the eHealth cloud decryption server (CDS) and then verify the correctness of returned PDC. Moreover, the illegal behaviour of malicious physician can be precisely (white-box) traced. We further exploit a delegation method to help the resource-limited physician authorize someone else to interact with the CDS. The formal security proof and extensive simulations illustrate that our VTCP-ABE scheme is secure, efficient, and practical.
APA, Harvard, Vancouver, ISO, and other styles
14

Pradeep, K. V., V. Vijayakumar, and V. Subramaniyaswamy. "An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment." Journal of Computer Networks and Communications 2019 (June 27, 2019): 1–8. http://dx.doi.org/10.1155/2019/9852472.

Full text
Abstract:
Cloud computing is a platform to share the data and resources used among various organizations, but the survey shows that there is always a security threat. Security is an important aspect of cloud computing. Hence, the responsibility underlines to the cloud service providers for providing security as the quality of service. However, cloud computing has many challenges in security that have not yet been addressed well. The data accessed or shared through any devices from the cloud environment are not safe because they are likely to have various attacks like Identity Access Management (IAM), hijacking an account or a service either by internal/external intruders. The cryptography places a major role to secure the data within the cloud environment. Therefore, there is a need for standard encryption/decryption mechanism to protect the data stored in the cloud, in which key is the mandatory element. Every cloud provider has its own security mechanisms to protect the key. The client cannot trust the service provider completely in spite of the fact that, at any instant, the provider has full access to both data and key. In this paper, we have proposed a new system which can prevent the exposure of the key as well as a framework for sharing a file that will ensure security (CIA) using asymmetric key and distributing it within the cloud environment using a trusted third party. We have compared RSA with ElGamal and Paillier in our proposed framework and found RSA gives a better result.
APA, Harvard, Vancouver, ISO, and other styles
15

-, Basyiah, and Fahmy Syahputra. "Perancangan Aplikasi Penyandian Pesan Teks Menggunakan Vigenere Chiper Dan Algoritma Elgamal." MEANS (Media Informasi Analisa dan Sistem), January 11, 2018, 80–87. http://dx.doi.org/10.54367/means.v2i2.142.

Full text
Abstract:
The development of technology and information, especially in the field of information communication, is very rapidly developing, one of them is the communication media of smart phones. one of the facilities provided by smart phones is the exchange of information in the form of sending text messages through Short Message Service (SMS). This information can be in the form of important data that not all parties can find out. Some risks that can threaten message security in SMS services include SMS Spoofing, Snooping SMS and SMS Interception. The message security system in the form of text is one of them with a cryptographic system. Cryptography is a message security science that aims to maintain the confidentiality of information contained in data so that information cannot be known by irresponsible parties. Cryptography changes the meaningful writing to be meaningless by using various kinds of cryptographic algorithms. The algorithms used are ElGamal and Vigenere Chiper. The ElGamal algorithm uses 2 different keys in encrypting and decrypting the public key for encryption and the private key for decryption. While Vigenere chipers only use one key that is the same for encryption and description. With the text message encoding application using the ElGamal and Vigenere Chiper algorithms, it is expected to help smart phone users with the operating system.
APA, Harvard, Vancouver, ISO, and other styles
16

Murali Krishna, B., Chella Santhosh, Shruti Suman, and SK Sadhiya Shireen. "Evolvable Hardware-Based Data Security System Using Image Steganography Through Dynamic Partial Reconfiguration." Journal of Circuits, Systems and Computers, August 5, 2021, 2250014. http://dx.doi.org/10.1142/s0218126622500141.

Full text
Abstract:
A highly secure communication method is essential for end users for the exchange of information which is not interpreted by an intruder. Cryptography plays a crucial role in the current and upcoming digital worlds, for secure data transmission in wired and wireless networks. Asymmetric and symmetric cryptographic algorithms encrypt data against vulnerable attacks and transfer to authenticated users. Steganography is a method for providing secure information with the help of a carrier file (text, video, audio, image, etc.). This paper proposes Deoxyribonucleic Acid (DNA)-based asymmetric algorithm which is used to encrypt the patient’s secret information and its performance is compared with ElGamal, RSA and Diffie–Hellman (DH) cryptographic algorithms. The proposed asymmetric algorithm is applied to image steganography which is used for encrypting and concealing the patient’s secret information in a cover image. The proposed method consumes less hardware resources with improved latency. Dynamic Partial Reconfiguration (DPR) allows to transform a selective area rather than complete shutdown of the entire system during bitstream configuration. Cryptosystem with DPR is designed, synthesized in Xilinx Vivado and simulated in Vivado simulator. The design is targeted at Basys3, Nexys4 DDR and Zync-7000 all-programmable SOC (AP SoC) architectures and programmed with secure partial bit files to avoid vulnerable attacks in the channel.
APA, Harvard, Vancouver, ISO, and other styles
17

Roman’kov, Vitaly. "Two general schemes of algebraic cryptography." Groups Complexity Cryptology, October 11, 2018. http://dx.doi.org/10.1515/gcc-2018-0009.

Full text
Abstract:
AbstractIn this paper, we introduce two general schemes of algebraic cryptography. We show that many of the systems and protocols considered in literature that use two-sided multiplications are specific cases of the first general scheme. In a similar way, we introduce the second general scheme that joins systems and protocols based on automorphisms or endomorphisms of algebraic systems. Also, we discuss possible applications of the membership search problem in algebraic cryptanalysis. We show how an efficient decidability of the underlined membership search problem for an algebraic system chosen as the platform can be applied to show a vulnerability of both schemes. Our attacks are based on the linear or on the nonlinear decomposition method, which complete each other. We give a couple of examples of systems and protocols known in the literature that use one of the two introduced schemes with their cryptanalysis. Mostly, these protocols simulate classical cryptographic schemes, such as Diffie–Hellman, Massey–Omura and ElGamal in algebraic setting. Furthermore, we show that, in many cases, one can break the schemes without solving the algorithmic problems on which the assumptions are based.
APA, Harvard, Vancouver, ISO, and other styles
18

"A Novel Authentication Method for Big Data Environment." International Journal of Recent Technology and Engineering 8, no. 3 (September 30, 2019): 3614–19. http://dx.doi.org/10.35940/ijrte.c5319.098319.

Full text
Abstract:
Security is essential for any networks. As the essential communication mode, the security mechanism for multicast isn't just the measure to guarantee verified communications, yet additionally the precondition for other security services. Attacks are one of the most significant worries for security experts. Attackers more often than not access an enormous number of computers by misusing their vulnerabilities to set up attack armed forces. This paper shows a twofold way validation mechanism which uses the usefulness of Elliptical Curve Cryptography, Kerberos System, and ElGamal algorithm. ECC algorithm used to encrypt the user information, whereas ElGamal used to encrypt the secret key itself to ensure more security in the networks.
APA, Harvard, Vancouver, ISO, and other styles
19

"A Prototype Model of Virtual Authenticated Key Exchange Mechanism over Secured Channel in Ad-Hoc Environment." International Journal of Recent Technology and Engineering 8, no. 5 (January 30, 2020): 5526–32. http://dx.doi.org/10.35940/ijrte.e6684.018520.

Full text
Abstract:
Key exchange protocols play a vital role in symmetric key cryptography. The transfer of private key through the secured medium is a challenging task because every day the intruders are evolved and the attacks are increasing constantly. The existing key exchange protocols such as Diffie-Hellman, Elgamal, and MQV, etc. are the old methods and many attacks happened on those protocols. That challenges demanding new protocol or methodology of transferring secret key between the parties. The paper proposes a new, secured, less computational overhead key exchange mechanism using short message service available in the cellular networks. GSM-SMS is a highly established secured channel and the research uses this facility to transfer the key between senders to a receiver of the symmetric key cryptosystem. The private key no need to reveal to third parties or even the receiver because the sender can directly communicate to the decryption system through the mobile SMS. After the decryption process, the secret key will be destroyed immediately. There is no possible attack during the key transfer and loss and error of the communication are very less.
APA, Harvard, Vancouver, ISO, and other styles
20

Shajin, Francis H., and P. Rajesh. "FPGA Realization of a Reversible Data Hiding Scheme for 5G MIMO-OFDM System by Chaotic Key Generation-Based Paillier Cryptography Along with LDPC and Its Side Channel Estimation Using Machine Learning Technique." Journal of Circuits, Systems and Computers 31, no. 05 (October 29, 2021). http://dx.doi.org/10.1142/s0218126622500931.

Full text
Abstract:
Multiple-Input and Multiple-Output (MIMO) technology is a significant and timely subject, which is highly motivated by the needs of 5G wireless communications. Data transmission performs MIMO, which is highly sensitive. There are several security issues while transmitting the data such as loss of data and code injection. Two efficient methods are Encryption and Data Hiding protection of data in wireless communication. This dissertation suggests FPGA Implementation of RDHS by Chaotic Key Generation-Based Paillier Cryptography with LDPC using machine learning technique. RDHS stands for Reversible Data Hiding Scheme. In a reversible method, the initial stage of preprocessing is to shrink the histogram of image before the process of encryption. Hence, the plaintext domain changing the encrypted images to data embedding cannot result from any pixel repletion. A little distortion data embedding may be taken as the original image may recover the directly decrypted image. Here, the performance metrics of throughput, area consumed, latency, delay, packet delivery, network life and overhead are calculated. The proposed Paillier homomorphic cryptosystem proposes higher network throughput as 99%, higher network life 98%, lower delay rate as 60%, packet delivery as 74%, overhead as 66%, latency as 55% and area consumed as 61% with the existing method such as McEliece, Elgamal and Elliptic curve cryptosystem in the security analysis of the proposed method providing decryption time 94% and encryption time 98% better than the existing method.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography