To see the other types of publications on this topic, follow the link: To ensure the security analysis of the algorithm.

Journal articles on the topic 'To ensure the security analysis of the algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'To ensure the security analysis of the algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gong, Qianru. "Application Research of Data Encryption Algorithm in Computer Security Management." Wireless Communications and Mobile Computing 2022 (July 14, 2022): 1–7. http://dx.doi.org/10.1155/2022/1463724.

Full text
Abstract:
In order to promote the research process of information security in the whole society, improve the safety factor of computer data communication, strengthen computer security management, the author proposes a computer data encryption strategy that combines the strong security of the 3DES encryption algorithm and the asymmetric encryption advantages of the RSA algorithm. Through the detailed analysis of DES encryption algorithm and 3DES encryption, creatively uses the RSA encryption algorithm to improve the single 3DES algorithm, consolidates the performance of the 3DES encryption algorithm to e
APA, Harvard, Vancouver, ISO, and other styles
2

Fasila, Kasfa Ali, and Mathew Sheena. "An efficient lightweight key exchange algorithm for internet of things applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5609–18. https://doi.org/10.11591/ijece.v12i5.pp5609-5618.

Full text
Abstract:
Internet of things (IoT) gained wide popularity in recent years, and this is proved by tremendous increase in use of IoT applications worldwide. Distributed IoT applications can be implemented securely with the support of blockchain. By default, blockchain will ensure authentication of involved entities as well as integrity of data. Due to storage restrictions, use of hybrid system is preferred, and this involves cloud server for storage and blockchain for other functionalities. Data kept in cloud has to be encrypted by a strong encryption algorithm. Even though core security objectives are ac
APA, Harvard, Vancouver, ISO, and other styles
3

Sevin, Abdullah, and Ünal Çavuşoğlu. "Design and Performance Analysis of a SPECK-Based Lightweight Hash Function." Electronics 13, no. 23 (2024): 4767. https://doi.org/10.3390/electronics13234767.

Full text
Abstract:
In recent years, hash algorithms have been used frequently in many areas, such as digital signature, blockchain, and IoT applications. Standard cryptographic hash functions, including traditional algorithms such as SHA-1 and MD5, are generally computationally intensive. A principal approach to improving the security and efficiency of hash algorithms is the integration of lightweight algorithms, which are designed to minimize computational overhead, into their architectural framework. This article proposes a new hash algorithm based on lightweight encryption. A new design for the lightweight ha
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Er Song, Lin You, Zhen Dong Wu, and Wang Ke Yu. "Massive Data Hybrid Encryption Algorithm Based on Cloud Computing." Applied Mechanics and Materials 651-653 (September 2014): 1864–67. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1864.

Full text
Abstract:
In order to ensure the security of massive data and user’s privacy in cloud computing, encrypting is a preferred method to protect their security. Due to some characteristics of massive data,such as large scale and structural complexity, it makes that the traditional encryption algorithms cannot be directly used to protect the security of massive data in cloud computing. Considering the real-time and reliability of encryption algorithms, we propose a hybrid algorithm, which combines DES algorithm and one-dimensional logistic map by using the parallel computing architecture of the MapReduce. Ou
APA, Harvard, Vancouver, ISO, and other styles
5

Kasfa Ali, Fasila, and Sheena Mathew. "An efficient lightweight key exchange algorithm for internet of things applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5609. http://dx.doi.org/10.11591/ijece.v12i5.pp5609-5618.

Full text
Abstract:
<p><span>Internet of things (IoT) gained wide popularity in recent years, and this is proved by tremendous increase in use of IoT applications worldwide. Distributed IoT applications can be implemented securely with the support of blockchain. By default, blockchain will ensure authentication of involved entities as well as integrity of data. Due to storage restrictions, use of hybrid system is preferred, and this involves cloud server for storage and blockchain for other functionalities. Data kept in cloud has to be encrypted by a strong encryption algorithm. Even though core secur
APA, Harvard, Vancouver, ISO, and other styles
6

Muhammad, Aina’u Shehu, and Fatih Özkaynak. "SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs." Symmetry 13, no. 5 (2021): 824. http://dx.doi.org/10.3390/sym13050824.

Full text
Abstract:
One of the general problems in modern digital society is undoubtedly the information security topic. It is critical to ensure the security of information transferred, processed, and stored throughout digital channels. Among this information, digital images draw attention in terms of frequency of use in digital channels. In this study, a new image encryption algorithm is proposed to address the security problems of digital images. The aspect that differentiates the proposed algorithm from thousands of image encryption algorithms in the literature is that it is designed within the framework of t
APA, Harvard, Vancouver, ISO, and other styles
7

Sholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh, and Gilang Aji Setiawan. "Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security." Edu Komputika Journal 9, no. 1 (2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.

Full text
Abstract:
There are many ways to ensure data security, one of the classic way but still effective is to use encryption. Encryption itself has two techniques or algorithms: symmetric-key (also called secret-key) and asymmetric-key encryption (also called public key). In this paper, we proposed an analysis of two algorithm of encryption: RSA and AES algorithm in term of securing digital data. The method used in this research are: RSA and AES analysis, then retrieving the result. The two algorithm is deeply and thoroughly analyzed to discover the effectiveness to secure the data. The Technological Readines
APA, Harvard, Vancouver, ISO, and other styles
8

Harfoushi, Osama, and Ruba Obiedat. "Security in Cloud Computing Using Hash Algorithm: A Neural Cloud Data Security Model." Modern Applied Science 12, no. 6 (2018): 143. http://dx.doi.org/10.5539/mas.v12n6p143.

Full text
Abstract:
Cloud computing is the delivery of computing resources over the Internet. Examples include, among others, servers, storage, big data, databases, networking, software, and analytics. Institutes that provide cloud computing services are called providers. Cloud computing services were primarily developed to help IT professionals through application development, big data storage and recovery, website hosting, on-demand software delivery, and analysis of significant data patterns that could compromise a system’s security. Given the widespread availability of cloud computing, many companies have beg
APA, Harvard, Vancouver, ISO, and other styles
9

Santoso, Zikri Akmal, Mohammad Andri Budiman, and Syahril Efendi. "A Hybrid Cryptosystem Using Rprime RSA And Extended Tiny Encryption (XTEA) For Securing Message." Data Science: Journal of Computing and Applied Informatics 9, no. 1 (2025): 18–31. https://doi.org/10.32734/jocai.v9.i1-16574.

Full text
Abstract:
Abstract. Ensuring the security of messages in sending message publicly is very important, we must ensure the security of messages with one of security method called cryptography. Focusing solely on security can affect the speed of message delivery processes. Therefore, this research is conducted to provide solutions to both of these issues. Thus, this research will discuss the Analysis of Hybrid Cryptography Scheme in the combination of RPrime RSA and XTEA (Extended Tiny Encryption) in securing instant messages. Hybrid cryptography is one of the methods in cryptography that allows to enhance
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Runyu, Lunwen Wang, Chuang Peng, and Rangang Zhu. "An Effective Sharding Consensus Algorithm for Blockchain Systems." Electronics 11, no. 16 (2022): 2597. http://dx.doi.org/10.3390/electronics11162597.

Full text
Abstract:
Sharding is the widely used approach to the trilemma of simultaneously achieving decentralization, security, and scalability in traditional blockchain systems. However, existing schemes generally involve problems such as uneven shard arithmetic power and insecure cross-shard transaction processing. In this study, we used the Practical Byzantine Fault Tolerance (PBFT) as the intra-shard consensus and, here, we propose a new sharding consensus mechanism. Firstly, we combined a jump consistent hash algorithm with signature Anchorhash to minimize the mapping of the node assignment. Then, we improv
APA, Harvard, Vancouver, ISO, and other styles
11

Yang, Bin, Ren Yi Fu, Jian Zhong Diao, and Hui Rong Liu. "Security Mechanisms Analysis for ZigBee Standard Based on AES-CCM*." Advanced Materials Research 468-471 (February 2012): 1359–62. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1359.

Full text
Abstract:
The security of wireless sensor networks is very important. ZigBee technology offers an optional security system to ensure the wireless sensor network runs safely and reliably. This article analysis of the ZigBee security mechanisms, key management, encryption algorithm and its data integrity mechanism, ZigBee security based on the CCM* mode of the AES-128, has several security scheme, which is a relatively reliable wireless sensor network standard.
APA, Harvard, Vancouver, ISO, and other styles
12

Shi, Qiaolian, and Yan Liu. "Data Encryption Technology Analysis of Robot Computer Network Information." Journal of Sensors 2022 (July 15, 2022): 1–7. http://dx.doi.org/10.1155/2022/5127989.

Full text
Abstract:
In order to ensure the security of robot computer network information, a data encryption technology is proposed. Through the comprehensive research of symmetric cryptography algorithm, open cryptography algorithm, hybrid encryption algorithm, AES algorithm, quantum cryptography technology, and ECC algorithm, a data encryption method suitable for robot computer network information is proposed. It is found that when analyzing the entanglement characteristics of the four-particle cluster state, the anomaly will inevitably disturb its state. In the eavesdropping detection, the communication partie
APA, Harvard, Vancouver, ISO, and other styles
13

Anjaneyulu, Endurthi, and Khare Akhil. "Design and Analysis of Efficient Consensus Algorithms to Enhance the Security and Performance of Blockchain." International Journal of Novel Research in Computer Science and Software Engineering 11, no. 3 (2024): 41–56. https://doi.org/10.5281/zenodo.14012653.

Full text
Abstract:
<strong>Abstract:</strong> Blockchain is a transformative technology that enables secure, transparent, and decentralized digital transactions by storing data across a distributed network of computers. It eliminates the need for intermediaries by using cryptographic techniques to ensure the integrity and immutability of records. Blockchain is revolutionizing various industries, from finance to supply chain management. Consensus algorithms are the foundational protocols in blockchain networks that ensure all participating nodes agree on the validity of transactions, maintaining the system's secu
APA, Harvard, Vancouver, ISO, and other styles
14

Ge, Xin, Bin Lu, Fenlin Liu, and Daofu Gong. "An Image Encryption Algorithm Based on Information Hiding." International Journal of Bifurcation and Chaos 26, no. 11 (2016): 1650192. http://dx.doi.org/10.1142/s0218127416501923.

Full text
Abstract:
Aiming at resolving the conflict between security and efficiency in the design of chaotic image encryption algorithms, an image encryption algorithm based on information hiding is proposed based on the “one-time pad” idea. A random parameter is introduced to ensure a different keystream for each encryption, which has the characteristics of “one-time pad”, improving the security of the algorithm rapidly without significant increase in algorithm complexity. The random parameter is embedded into the ciphered image with information hiding technology, which avoids negotiation for its transport and
APA, Harvard, Vancouver, ISO, and other styles
15

Tahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.

Full text
Abstract:
Cryptography algorithms are becoming more necessary to ensure secure data transmission, which can be used in several applications. Increasing use of images in industrial process therefore it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well- known block cipher that has many benefits in data encryption process. In this paper, proposed some modification to the Advanced Encryption Standard (M-AES) to increase and reaching high level security and enhance image encryption. The modification is done by modifying the ShiftRow Tr
APA, Harvard, Vancouver, ISO, and other styles
16

Azarenko, O., Yu Honcharenko, M. Diviziniuk, R. Shevchenko, and O. Shevchenko. "CONTROL ALGORITHM FOR IMPLEMENTING THE MATHEMATICAL MODEL OF SCENARIO MANAGEMENT AS A TOOL FOR ENSURING SECURITY OF A STRATEGIC FACILITY." Municipal economy of cities 3, no. 184 (2024): 196–203. http://dx.doi.org/10.33042/2522-1809-2024-3-184-196-203.

Full text
Abstract:
The article first considers the mathematical model of scenario management as a security tool for a strategic object. Then, it develops the structure of the control algorithm for implementing this mathematical model. The study concludes with the structure of the algorithm and the need to establish basic procedures for its application. Ukraine at war faces a wide range of tasks to protect the state, including ensuring the safety of critical infrastructure objects (CIO). Many methods, namely scenario analysis methods, can be applied to ensure the security of the CIO and other strategic objects. B
APA, Harvard, Vancouver, ISO, and other styles
17

Somnath, Dey *1 Somnath Basak 2. "ACHIEVING SECURITY IN CLOUD COMPUTING THROUGH ADVANCED RSA ALGORITHM AND PERFORMANCE ANALYSIS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 12 (2017): 519–25. https://doi.org/10.5281/zenodo.1130846.

Full text
Abstract:
Now a days security of data become a large concern to insure various attributes like confidentiality, integrity,&nbsp; authentication etc. Cryptography techniques are used for this purpose. It plays a major role in protecting the data in those applications which are running in a network environment. Cloud computing is a large amount of easily and accessible virtualized resources such as hardware, development platforms and services. Main goal of cloud computing is to provide easily scalable access to computing resources to improve organization performance. But one of the barriers for cloud adop
APA, Harvard, Vancouver, ISO, and other styles
18

Zhang, Daike, Junyang Chen, Yihui He, et al. "A Chunked and Disordered Data Privacy Protection Algorithm: Application to Resource Platform Systems." Applied Sciences 13, no. 10 (2023): 6017. http://dx.doi.org/10.3390/app13106017.

Full text
Abstract:
This paper provides a systematic analysis of existing resource platforms, evaluating their advantages and drawbacks with respect to data privacy protection. To address the privacy and security risks associated with resource platform data, we propose a novel privacy protection algorithm based on chunking disorder. Our algorithm exchanges data within a specific range of chunk size for the position and combines the chunked data with the MD5 value in a differential way, thus ensuring data privacy. To ensure the security of the algorithm, we also discuss the importance of preventing client and serv
APA, Harvard, Vancouver, ISO, and other styles
19

Muthumarilakshmi, S., G. Mahalakshmi, R. Poornima Lakshmi, and C. S. Dhanalakshmi. "Boosting 6G Network Security Using a High-Performance Adaptive Threat Detection Algorithm (ATDA)." Journal of Neonatal Surgery 14, no. 5 (2025): 238–48. https://doi.org/10.52783/jns.v14.2929.

Full text
Abstract:
With the advent of 6G communications, the demand for robust security mechanisms has become paramount to safeguard against increasingly sophisticated cyber threats. This research article introduces an innovative Adaptive Threat Detection Algorithm (ATDA) designed to enhance security in 6G communication networks. The ATDA leverages adaptive strategies and real-time data analysis to detect and mitigate potential security breaches more effectively. To validate the efficacy of the ATDA, a comprehensive comparative analysis was conducted against four well-established security algorithms: Intrusion D
APA, Harvard, Vancouver, ISO, and other styles
20

Jiao, Wen Zhe, and Xiao Xue Ye. "A Cloud Architecture for Service Security Management." Applied Mechanics and Materials 416-417 (September 2013): 1413–17. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1413.

Full text
Abstract:
Cloud computing is revolutionizing how resources and services are used and managed, but the revolution comes with new security problems. This paper identifies current security issues in cloud computing environments. To manage service security, we propose a new architecture based on Service Level Agreements (SLAs). To ensure the integrity of data service and relieve the security concerns of users, we implement a new data auditing algorithm in this architecture. Furthermore, we present four-layer cryptography analysis to ensure data security.
APA, Harvard, Vancouver, ISO, and other styles
21

Hussain, Munir, Amjad Mehmood, Muhammad Altaf Khan, Rabia Khan, and Jaime Lloret. "Reputation-Based Leader Selection Consensus Algorithm with Rewards for Blockchain Technology." Computers 14, no. 1 (2025): 20. https://doi.org/10.3390/computers14010020.

Full text
Abstract:
Blockchain technology is an emerging decentralized and distributed technology that can maintain data security. It has the potential to transform many sectors completely. The core component of blockchain networks is the consensus algorithm because its efficiency, security, and scalability depend on it. A consensus problem is a difficult and significant task that must be considered carefully in a blockchain network. It has several practical applications such as distributed computing, load balancing, and blockchain transaction validation. Even though a lot of consensus algorithms have been propos
APA, Harvard, Vancouver, ISO, and other styles
22

Salankar, Pritam, Vinay Avasthi, and Ashutosh Pasricha. "Analysis and Validation of Lightweight Authentication Algorithm." Ingénierie des systèmes d information 27, no. 4 (2022): 637–43. http://dx.doi.org/10.18280/isi.270414.

Full text
Abstract:
The Constrained Application Protocol (CoAP) is extensively used in several industrial Internet of Things (IoT) applications. Using heavy-weight algorithms is not feasible in resource-constrained IoT environments, and lightweight solutions are vulnerable to security attacks. The trade-off between computing cost and security strength plays a significant role in deciding the right solution. Therefore, developing a lightweight security mechanism with a higher security level is paramount. Therefore, a lightweight authentication with Two-way Encryption for Secure Transmission in CoAP Protocol (LATES
APA, Harvard, Vancouver, ISO, and other styles
23

Khan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Malik Arman Morshidi, Roohie Naaz Mir, Miss Laiha Binti Mat Kiah, and Abdul Mobeen Khan. "EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY." Malaysian Journal of Computer Science 35, no. 3 (2022): 179–200. http://dx.doi.org/10.22452/mjcs.vol35no3.1.

Full text
Abstract:
With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem of advanced and interconnected communications. Cryptographic hash functions have been extensively employed to ensure data integrity in insecure environments. Hash functions are also combined with digital signatures to offer identity verification mechanisms and non-repudiation services. The federal or
APA, Harvard, Vancouver, ISO, and other styles
24

Jaiswal, Shruti, Himani Bansal, Shiv Naresh Shivhare, and Gulshan Shrivastava. "A Novel IoT Framework for Identifying and Mitigating Security Threats." Scalable Computing: Practice and Experience 26, no. 5 (2025): 2165–83. https://doi.org/10.12694/scpe.v26i5.4909.

Full text
Abstract:
The popularity of Internet of Things (IoT) devices has surged due to their applications in diverse areas such as e-Health, smart vehicles, and smart cities. However, the rapid deployment of these devices has led to an exponential increase in security attacks targeting IoT systems, making security a prime concern for the community. Securing IoT-based systems is challenging because the devices involved are often resource-constrained. Providing security to these systems requires a thorough understanding of their specific security needs, along with a systematic security engineering approach. Previ
APA, Harvard, Vancouver, ISO, and other styles
25

Li, Ming, and Yange Yue. "Security Analysis and Improvement of Dual Watermarking Framework for Multimedia Privacy Protection and Content Authentication." Mathematics 11, no. 7 (2023): 1689. http://dx.doi.org/10.3390/math11071689.

Full text
Abstract:
The demand for using multimedia network infrastructure for transmission grows with each passing day. Research scholars continue to develop new algorithms to strengthen the existing network security framework in order to ensure the privacy protection and content authentication of multimedia content and avoid causing huge economic losses. A new technology for multimedia image copyright protection and content authentication has been proposed. The innovations lie in the use of an inter-block coefficient difference algorithm to embed robust watermarking in the transform domain, and the same fragile
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Xing, Shaoyu Tang, Tianning Li, Xiaowei Li, and Changda Wang. "GFRX: A New Lightweight Block Cipher for Resource-Constrained IoT Nodes." Electronics 12, no. 2 (2023): 405. http://dx.doi.org/10.3390/electronics12020405.

Full text
Abstract:
The study of lightweight block ciphers has been a "hot topic". As one of the main structures of block ciphers, the Feistel structure has attracted much attention. However, the traditional Feistel structure cipher changes only half of the plaintext in an iterative round, resulting in slow diffusion. Therefore, more encryption rounds are required to ensure security. To address this issue, a new algorithm, GFRX, is proposed, which combines a generalized Feistel structure and ARX (Addition or AND, Rotation, XOR). The GFRX algorithm uses an ARX structure with different non-linear components to deal
APA, Harvard, Vancouver, ISO, and other styles
27

Baranov, Igor. "Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity." Cybernetics and Computer Technologies, no. 1 (March 28, 2025): 64–73. https://doi.org/10.34229/2707-451x.25.1.6.

Full text
Abstract:
Introduction. Nowadays, computer networks are gaining more and more importance for information exchange. Cryptography plays a vital role in the security of computing, mobile phone communication, passwords in computing and even engineering, unlike in the olden days when cryptography was only about encrypting and decrypting messages with keys. One of the most important requirements of these networks is to ensure the safe transfer of information from one place to another. Cryptography is one of the methods that provide the most secure way of transferring confidential information from the sender t
APA, Harvard, Vancouver, ISO, and other styles
28

ALTAF HUSSAIN, SAKIINAH, AZNI HASLIZAN AB HALIM, and NAJWA HAYAATI MOHD ALWI. "SYSTEMATIC LITERATURE REVIEW FOR LIGHTWEIGHT AUTHENTICATION ALGORITHM IN THE IoT." JOURNAL OF SUSTAINABILITY SCIENCE AND MANAGEMENT 17, no. 9 (2022): 162–78. http://dx.doi.org/10.46754/jssm.2022.09.011.

Full text
Abstract:
The Internet of Things (IoT) being a promising technology of the future is expected to generate a tremendous amount of data that may be exposed to security flaws. Hence, to protect IoT applications from hackers, lightweight cryptography has been identified as one of the suitable mechanisms since it is designed to fulfil security demands in resource-constrained hardware and software. This paper aims to analyse the current security requirements in designing lightweight cryptography for IoT applications, specifically for integrity and authentication algorithms. There are three objectives to focus
APA, Harvard, Vancouver, ISO, and other styles
29

Кныш, Александр Викторович, Дмитрий Александрович Кобзев, Оксана Николаевна Давиденко, et al. "Application of source code static analysis methods to ensure security of APCS." SCIENCE & TECHNOLOGIES OIL AND OIL PRODUCTS PIPELINE TRANSPORTATION, no. 3 (August 25, 2021): 346–56. http://dx.doi.org/10.28999/2541-9595-2021-11-3-346-356.

Full text
Abstract:
В условиях существующего многообразия автоматизированных систем управления технологическими процессами (АСУТП), возрастающих рисков компьютерных инцидентов, обусловленных развитием информационных технологий, неизменно актуальными являются вопросы повышения качества программного обеспечения (ПО) АСУТП. В настоящей статье на примере АСУТП организаций системы «Транснефть» представлена возможность использования методов статического анализа исходного кода ПО с целью обеспечения информационной безопасности АСУТП. Рассмотрены причины низкого качества ПО и подходы к его повышению. Проанализированы мет
APA, Harvard, Vancouver, ISO, and other styles
30

Saidi, Riad, Tarek Bentahar, Nada Cherrid, Atef Bentahar, and Hichem Mayache. "Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes." International Journal on Electrical Engineering and Informatics 12, no. 4 (2020): 912–32. http://dx.doi.org/10.15676/ijeei.2020.12.4.13.

Full text
Abstract:
This paper falls within the framework of the security of satellite images, in particular interferograms from an Interferometric Synthetic Aperture Radar (inSAR) system. The innovation of this work consists in the application of a cryptosystem based on two algorithms Advanced Encryption Standard (AES) and the Rivest, Shamir and Adleman (RSA) encryption algorithm for securing interferograms of inSAR systems. AES employs five encryption modes Electronic Code Book (ECB), Cipher Bloc Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and counter-mode encryption (CTR). The use of the AES
APA, Harvard, Vancouver, ISO, and other styles
31

Goel, Vikas, and Amit Kumar Goyal. "An Improved Analysis of Secured Permutation and Substitution based Image Encryption." Journal of Cybersecurity and Information Management 12, no. 1 (2023): 30–40. http://dx.doi.org/10.54216/jcim.120103.

Full text
Abstract:
The transmission and storage of digital data raises serious security concerns as information technology evolves at a breakneck pace. To ensure the safety of the transferred data, security methods must be put in place. Encrypting an image is a method of protecting sensitive data by converting it into an unrecognizable format. The procedure includes access control, privacy, validation, and copyright protection. Cryptography, steganography, and watermarking are three distinct methods to prevent unauthorized access to digital data. Of these three methods, cryptography has emerged as one of the mos
APA, Harvard, Vancouver, ISO, and other styles
32

Meng, Fanqi, and Zhenglan Gu. "A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System." Fractal and Fractional 7, no. 11 (2023): 795. http://dx.doi.org/10.3390/fractalfract7110795.

Full text
Abstract:
With the advancement of information technology, the security of digital images has become increasingly important. To ensure the integrity of images, a novel color image-encryption algorithm based on extended DNA coding, Zig-Zag transform, and a fractional-order laser system is proposed in this paper. First, the dynamic characteristics of the fractional-order laser chaotic system (FLCS) were analyzed using a phase diagram and Lyapunov exponent spectra. The chaotic sequences generated by the system were used to design image-encryption algorithms. Second, a modified Zig-Zag confusing method was a
APA, Harvard, Vancouver, ISO, and other styles
33

Xiao, Shenyong, ZhiJun Yu, and YaShuang Deng. "Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism." Security and Communication Networks 2020 (March 16, 2020): 1–12. http://dx.doi.org/10.1155/2020/7913061.

Full text
Abstract:
Chaos has been widely used in image encryption due to its rich properties. However, it remains an irreconcilable contradiction for security and implementation efficiency for image encryption schemes. In this paper, a novel chaos-based image encryption scheme has been proposed, where the Lorenz chaotic system is applied to generate pseudorandom sequences with good randomness, and a random switch control mechanism is introduced to ensure the security of the encryption scheme. Experimental results demonstrate the effectiveness and superiority of the algorithm.
APA, Harvard, Vancouver, ISO, and other styles
34

Sable, Nilesh P., Vijay U. Rathod, Pallavi Parlewar, Smita B. Rathod, Santosh T. Waghmode, and Rahul R. Rathod. "Efficient lightweight cryptography for resource-constrained WSN nodes." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 349–59. http://dx.doi.org/10.47974/jdmsc-1888.

Full text
Abstract:
In Wireless Sensor Networks (WSN), where resources are scarce, lightweight cryptography is crucial and difficult. The Constrained Application Protocol (CoAP), Field-Programmable Gate Array (FPGA) technology, and a modified RC5 algorithm are used in this study to achieve efficient encryption for WSN nodes. WSN are essential for monitoring temperature, humidity, vibrations, and seismic activity. However, processing capacity, memory, and energy constraints make data security difficult in these networks. CoAP, FPGA, and a modified RC5 algorithm provide security, computational load reduction, and e
APA, Harvard, Vancouver, ISO, and other styles
35

Hu, Fang, and Yuhua Liu. "Multi-index algorithm of identifying important nodes in complex networks based on linear discriminant analysis." Modern Physics Letters B 29, no. 03 (2015): 1450268. http://dx.doi.org/10.1142/s0217984914502686.

Full text
Abstract:
The evaluation of node importance has great significance to complex network, so it is important to seek and protect important nodes to ensure the security and stability of the entire network. At present, most evaluation algorithms of node importance adopt the single-index methods, which are incomplete and limited, and cannot fully reflect the complex situation of network. In this paper, after synthesizing multi-index factors of node importance, including eigenvector centrality, betweenness centrality, closeness centrality, degree centrality, mutual-information, etc., the authors are proposing
APA, Harvard, Vancouver, ISO, and other styles
36

MS., NAMITA GEORGE GONSALVES. "PERFORMANCE ANALYSIS OF SECURED COMMUNICATION WITH CRYPTOGRAPHY USING FIBONACCI SERIES." IJIERT - International Journal of Innovations in Engineering Research and Technology 4, no. 7 (2017): 42–46. https://doi.org/10.5281/zenodo.1459057.

Full text
Abstract:
<strong>Data security has been a major concern in the today�s information technology era. Especially it becomes serious in the cloud environment because the data is located in different places all over the world. Encryption has come up as a solution and different encryption algorithms p lay an important role in data security on cloud. Encryption algorithms are used to ensure the security of data in cloud. The purpose of securing data is that only concerned and authorized users can access it. In this paper we describes the basic characteri stics (Key Length,File size) of symmetric Fibonacci Cry
APA, Harvard, Vancouver, ISO, and other styles
37

Razaq, Abdul, Louai A. Maghrabi, Musheer Ahmad, and Qamar H. Naith. "Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare." AIMS Mathematics 9, no. 3 (2024): 6207–37. http://dx.doi.org/10.3934/math.2024303.

Full text
Abstract:
&lt;abstract&gt; &lt;p&gt;With the increasing need for secure transmission and storage of medical images, the development of robust encryption algorithms is of paramount importance. Securing sensitive digital medical imagery information during transmission has emerged as a critical priority in the e-Healthcare systems. Recent research has highlighted the significance of developing advanced medical image encryption algorithms to ensure secure transmission during telediagnosis and teleconsultations. In this study, we propose a novel medical image encryption algorithm which is based on a novel su
APA, Harvard, Vancouver, ISO, and other styles
38

Lahraoui, Younes, Saiida Lazaar, Youssef Amal, and Abderrahmane Nitaj. "Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance." Cryptography 8, no. 2 (2024): 23. http://dx.doi.org/10.3390/cryptography8020023.

Full text
Abstract:
To ensure the security of sensitive data, elliptic curve cryptography (ECC) is adopted as an asymmetric method that balances security and efficiency. Nevertheless, embedding messages into elliptic curve (EC) points poses a significant challenge. The intricacies of this process can greatly affect the overall security and efficiency of the cryptosystem, reflecting security vulnerabilities observed in many existing schemes that utilize ElGamal ECC-based encryption. In this paper, we introduce an innovative hash-based technique for securely embedding messages into EC points before encryption. A ra
APA, Harvard, Vancouver, ISO, and other styles
39

Zhang, Xinyue, Daoguang Mu, Wenzheng Zhang, and Xinfeng Dong. "Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework." Cryptography 9, no. 1 (2025): 18. https://doi.org/10.3390/cryptography9010018.

Full text
Abstract:
Authenticated encryption with associated data (AEAD) schemes based on stream ciphers, such as ASCON and MORUS, typically use nonlinear feedback shift registers (NFSRs) and linear feedback shift registers (LFSRs) to generate variable-length key streams. While these methods ensure message confidentiality and authenticity, they present challenges in security analysis, especially when automated evaluation is involved. In this paper, we present MLOL, a novel AEAD algorithm based on the LOL framework. MLOL combines authenticated encryption with optimizations to the LFSR structure to enhance both sec
APA, Harvard, Vancouver, ISO, and other styles
40

Liu, Weigang. "Computer Network Confidential Information Security Based on Big Data Clustering Algorithm." Wireless Communications and Mobile Computing 2022 (June 9, 2022): 1–10. http://dx.doi.org/10.1155/2022/4927504.

Full text
Abstract:
Attacks on network systems are becoming more and more common, the current state of increasingly sophisticated attack methods, the emergence of intrusion prevention technology is the inevitable result of the development of computer technology and network technology, and research on intrusion prevention has become a new focus of network security technology research in recent years. In order to ensure the security of computer network confidential information, the authors propose a semisupervised clustering intrusion detection algorithm. An overview of machine learning, followed by an explanation
APA, Harvard, Vancouver, ISO, and other styles
41

Shibaikin, Sergei, Vladimir Nikulin, and Andrei Abbakumov. "Analysis of machine learning methods for computer systems to ensure safety from fraudulent texts." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 1 (2020): 29–40. http://dx.doi.org/10.24143/2072-9502-2020-1-29-40.

Full text
Abstract:
IT Security is an essential condition for functioning of each company whose work is related to the information storage. Various models for detecting fraudulent texts including a support vector machine, neural networks, logistic regression, and a naive Bayes classifier, have been analyzed. It is proposed to increase the efficiency of detection of fraudulent messages by combining classifiers in ensembles. The metaclassifier allows to consider the accuracy values of all analyzers, involving in the work the construction of the weight matrix and the characteristic that determines the minimum accura
APA, Harvard, Vancouver, ISO, and other styles
42

Wishah, Raed, and Azmi Shawkat Abdulbaqi. "Security and integrity of medical log records management in the cloud storage." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 7 (2023): 1961–70. http://dx.doi.org/10.47974/jdmsc-1784.

Full text
Abstract:
Logs of medicinal events in Cloud Computing management have become crucial, particularly for medical event logs. Medical auditing, medical analysis, medical evidence, forensic medicine, and other reasons need the safe storage of medical log data in any hospital or medical facility for a certain time. At each level of the medical record management process, including the log creation stage, the transmission phase, and the storage step, the integrity and security of the medical Log record data are maintained in this work. Furthermore, medical log records often include patient information that sho
APA, Harvard, Vancouver, ISO, and other styles
43

Bo, Jiao, and Manual Selvaraj Bexci. "New algorithm to ensure virtual simulation data security based on deep learning using applied innovation design." International Journal of Applied Science and Engineering 21, no. 1 (2023): 1–9. http://dx.doi.org/10.6703/ijase.202403_21(1).002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

B M, Chandrakala, and S. C. Lingareddy. "Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography)." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (2019): 1455. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1455-1463.

Full text
Abstract:
&lt;p&gt;In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data security and this has led the researcher to research in this area. To provide the security several Proxy re-encryption scheme has been introduced, however all these method lacks of efficiency. Hence In this paper, we propose a scheme known as ALBC (Adaptive Lattice Based Cryptography), this
APA, Harvard, Vancouver, ISO, and other styles
45

Li, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.

Full text
Abstract:
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of t
APA, Harvard, Vancouver, ISO, and other styles
46

Sihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.

Full text
Abstract:
Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman) algorithm. The advantages of hybrid cryptography is the speed in processing data using
APA, Harvard, Vancouver, ISO, and other styles
47

Priya, Chandrasekar, Kesavan Kumuthapriya, Savarimuthu Sagayamary, L. M. Merlin Livingston, and Marimuthu Venkatesan. "To ensure public safety internet of things and convolutional neural network algorithm for a surveillance system enabled with 5G." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 4 (2025): 4268. https://doi.org/10.11591/ijece.v15i4.pp4268-4278.

Full text
Abstract:
Public safety and security are top priorities in the constantly urbanizing society and research develops and implements a smart surveillance system using fifth generation (5G) of wireless communication technology and internet of things (IoT) technologies to improve public safety. It developed a comprehensive and responsive monitoring solution using machine learning methods, especially convolutional neural networks (CNNs). IoT devices, including high-definition cameras, environmental sensors, and drones, are carefully deployed in urban centers, transit hubs, and essential infrastructure. These
APA, Harvard, Vancouver, ISO, and other styles
48

Akilan Selvaraj Saroja. "Advancing Security in Lightweight S-WBSN for E-Healthcare." Journal of Electrical Systems 20, no. 10s (2024): 8187–211. http://dx.doi.org/10.52783/jes.7059.

Full text
Abstract:
Wireless body sensor networks (WBSNs) are a critical component of e-healthcare, enabling continuous monitoring of vital signs and other health parameters. However, the limited capacity of WBSNs poses a significant challenge to securing data transmission. A novel architecture for Secure Wireless Body Sensor Networks (S-WBSN) has been introduced, focusing on efficiency and robust security. The S-WBSN architecture employs a combination of the OTP-Q stream block cipher and the Diffie-Hellman key exchange algorithm to ensure secure data transmission and mutual authentication between critical compon
APA, Harvard, Vancouver, ISO, and other styles
49

Saurabh. "Security Enhancement for IoT using Mutual Authentication Based Lightweight Algorithm." Advances in Nonlinear Variational Inequalities 28, no. 1s (2024): 479–505. https://doi.org/10.52783/anvi.v28.2448.

Full text
Abstract:
Internet of Things (IoT) has revolutionized communication technology by enabling seamless data exchange between devices. As the proliferation of sensors and smart devices grows, IoT services become increasingly accessible, impacting our lives in diverse areas such as homes, offices, agriculture, and healthcare. However, the widespread adoption of IoT also raises critical concerns regarding data security, device privacy, and the integrity of underlying infrastructure. To address these challenges, robust authentication mechanisms are essential. Mutual authentication between IoT devices establish
APA, Harvard, Vancouver, ISO, and other styles
50

Yang, Xiaodong, Aijia Chen, Zhisong Wang, and Shudong Li. "Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption." Security and Communication Networks 2022 (May 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/2204832.

Full text
Abstract:
Cloud storage is a popular model of the application in various fields, and the security of storage data and access permission have been widely considered. Attribute-based encryption (ABE) provides fine-grained user access control and ensures data confidentiality. However, current ABE access control schemes rely on trusted cloud servers and provide a low level of security. To solve these problems of traditional encryption schemes, we propose a blockchain-based and ABE cloud storage data access control scheme. In this article, blockchain and smart contract technology are the core elements to ens
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!