41 results on '"Cryptograph"'
Search Results
2. Neural Network-Based Cryptography: A Primary Study on the Performances and Techniques
- Author
-
Foo, Jia-Lin, Ng, Kok-Why, Naveen, Palanichamy, Li, Kan, Editor-in-Chief, Li, Qingyong, Associate Editor, Fournier-Viger, Philippe, Series Editor, Hong, Wei-Chiang, Series Editor, Liang, Xun, Series Editor, Wang, Long, Series Editor, Xu, Xuesong, Series Editor, Haw, Su-Cheng, editor, and Sonai Muthu, Kalaiarasi, editor
- Published
- 2022
- Full Text
- View/download PDF
3. On the universality and isotopy-isomorphy of (r, s, t)-inverse quasigroups and loops with applications to cryptography.
- Author
-
Ilemobade, Richard, George, Olufemi, and Jaíyéolá, Tèmítópé Gbóláhàn
- Abstract
This paper introduced a condition called R-condition under which (r, s, t)- inverse quasigroups are universal. Middle isotopic (r, s, t)-inverse loops, satisfying the R-condition and possessing a trivial set of r-weak inverse permutations were shown to be isomorphic; isotopy-isomorphy for (r, s, t)-inverse loops. Isotopy-isomorphy for (r, s, t)- inverse loops was generally characterized. With the R-condition, it was shown that for positive integers r, s and t, if there is a (r, s, t)-inverse quasigroup of order 3k with an inverse-cycle of length gcd(k, r+s+t) > 1, then there exists an (r, s, t)-inverse quasigroup of order 3k with an inverse-cycle of length gcd k(r + s + t),(r + s + t) ² ) . The procedure of application of such (r, s, t)-inverse quasigroups to cryptography was described and explained, while the feasibility of such (r, s, t)-inverse quasigroups was illustrated with sample values of k, r, s and t. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. الكتابات القبطية المعماة (المنهج والتطبيق)
- Author
-
نسمة إبراهيم محمد, نسمة إب ا رىيم
- Subjects
CIPHERS - Abstract
Copyright of Bulletin of the Center Papyrological Studies (BCPS) is the property of Ain Shams University, Faculty of Archaeology and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
5. Digitization: Learnings from Ancient Disruptions, AI and the Digital Trio’s Functional Stage, and AI Superpowers Disrupting Us
- Author
-
Vieweg, Stefan H. and Vieweg, Stefan H., editor
- Published
- 2021
- Full Text
- View/download PDF
6. A review on different types of cryptography techniques' should be replaced by 'exploring the potential of steganography in the modern era
- Author
-
Jain, Vipin
- Published
- 2021
- Full Text
- View/download PDF
7. IMPLEMENTASI TEKNIK KRIPTOGRAFI RSA UNTUK PENGAMANAN DATA PENGIRIMAN SMS
- Author
-
Ainafatul Nur Muslika, Hardiana Riski Riswanto, Khamaida Safinah, and Khadijah Fahmi Hayati Holle
- Subjects
security ,android ,cryptograph ,rsa ,sms ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Message sending is one activity that is often used by everyone. However, security in this message delivery system needs to be wary of spying or message piracy during the process of sending messages. Surely someone who sent the message does not know if someone's personal message has been stolen. With this initiative builds a security message using cryptographic RSA algorithm where the message sender or recipient of the message can send the message safely without being known to the message hijacker or spy. Cryptography that uses the RSA algorithm to secure messages. This RSA algorithm message will be decrypted with the public key and to encrypt the message. This application was built on the Android platform because the dominant person has an Android smartphone with a system that runs the length of the message character does not affect the speed at the time of sending the message to the recipient, and there is no limit on the length of the message character during the encryption process so that any length of the massage character can be encrypted well.
- Published
- 2020
- Full Text
- View/download PDF
8. On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
- Author
-
Mariot, L. (author), Picek, S. (author), R Yorgova, R.A. (author), Mariot, L. (author), Picek, S. (author), and R Yorgova, R.A. (author)
- Abstract
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a McEliece-type cryptosystem using large minimum distance error-correcting codes derived from self-dual codes. To the best of our knowledge, such codes have not been implemented in a code-based cryptosystem until now. Moreover, we modify the decryption step of the system by introducing a decryption algorithm based on two private keys. We determine the parameters of binary codes with large minimum distance, which, if implemented into a McEliece-type cryptosystem, would provide a security level respectively of 80, 128, and 256 bits. For the 80-bit security case, we construct a large minimum distance self-dual code of length 1064, and use it to derive a random punctured code to be used in the corresponding McEliece-type cryptosystem. Compared to the original McEliece cryptosystem, the key size is reduced by about 38.5%, although an optimal decoding set is yet to be constructed to make the new system fully defined and usable., Cyber Security
- Published
- 2023
- Full Text
- View/download PDF
9. Cryptanalysis of a Cryptographic Algorithm that Utilizes Chaotic Neural Networks
- Author
-
Qin, Ke, Oommen, B. J., Czachórski, Tadeusz, editor, Gelenbe, Erol, editor, and Lent, Ricardo, editor
- Published
- 2014
- Full Text
- View/download PDF
10. Baby Careware: A Online Secured Health Consultant
- Author
-
Cui, Yanjun, Zhou, Yanping, Mei, Huan, Zhao, Zheng, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Sheng, Quan Z., editor, Wang, Guoren, editor, Jensen, Christian S., editor, and Xu, Guandong, editor
- Published
- 2012
- Full Text
- View/download PDF
11. Research on Secure Multi-party Computational Geometry
- Author
-
Geng, Tao, Luo, Shoushan, Xin, Yang, Du, Xiaofeng, Yang, Yixian, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Liu, Baoxiang, editor, and Chai, Chunlai, editor
- Published
- 2011
- Full Text
- View/download PDF
12. Mutual-Authentication Mechanism for RFID Systems
- Author
-
Toiruul, Batbold, Lee, KyungOh, Lee, HyunJun, Lee, YoungHan, Park, YoonYoung, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Cao, Jiannong, editor, Stojmenovic, Ivan, editor, Jia, Xiaohua, editor, and Das, Sajal K., editor
- Published
- 2006
- Full Text
- View/download PDF
13. Novel and secure encoding and hiding techniques using image steganography: A survey.
- Author
-
Ashwin, S., Ramesh, J., Kumar, S. Aravind, and Gunavathi, K.
- Abstract
Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. The recent growth in computational power and technology has propelled it to the forefront of today's security techniques. This paper presents a review of the literature on different types of contemporary steganography techniques for image in spatial and transform domains and steganalysis techniques for the detection of secret message in the image. In addition, research trends and challenges are identified and directions for future research are discussed. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
14. A Persistent Conversation Protocol Supporting Anonymity and Security.
- Author
-
Changjie Wang, Chiu, Dickson K. W., and Ho-fung Leung
- Subjects
ANONYMITY ,DATA security failures ,CRYPTOGRAPHY ,COMPUTER security ,INFORMATION sharing - Published
- 2008
15. Pym and Unreadability
- Author
-
Weinstein, Cindy, Kennedy, J. Gerald, book editor, and Peeples, Scott, book editor
- Published
- 2019
- Full Text
- View/download PDF
16. A standard cell-based leakage power analysis attack countermeasure using symmetric dual-rail logic.
- Author
-
Zhu, Nian-hao, Zhou, Yu-jie, and Liu, Hong-ming
- Abstract
Leakage power analysis (LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static (leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor (CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic (SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
17. A mixed scrambling operation for hiding image.
- Author
-
Liu, Zhengjun, Zhang, Yu, Liu, Wei, Meng, Fanyi, Wu, Qun, and Liu, Shutian
- Subjects
- *
SCRAMBLING systems (Telecommunication) , *DIGITAL image processing , *RANDOM matrices , *PIXELS , *DATA encryption , *COMPUTER simulation - Abstract
Abstract: A mixed scrambling operation is defined by the use of Arnold transform and Baker mapping. Following a designed sequence, the combined scrambling operation is utilized for changing the pixel position of secret image under the control of a random matrix. At the same time, the pixel value is altered by random bit shift for obtaining an encrypted image encoded in N-bit data. The operations mentioned above are employed for all pixels of original secret image. Finally an encrypted image is obtained and encoded into N-bit data being from the input image. Some numerical simulations have been achieved for checking the performance of the image hiding scheme. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
18. Secure Identity-Based Blind Signature Scheme in the Standard Model.
- Author
-
XIAO-MING HU and SHANG-TENG HUANG
- Subjects
CRYPTOGRAPHY ,SECURITY management ,BILINEAR transformation method ,BILINEAR forms ,IDENTIFICATION - Abstract
The only known construction of identity-based blind signature schemes that are secure in the standard model is based on the generic approach of attaching certificates to ordinary (i.e. non-identity-based) blind signature schemes, and thus the identity-based blind signature schemes constructed using this method are somewhat inefficient and have long signature size. In this paper, we present the first direct construction of an identity-based blind signature scheme based on Waters' recently proposed identity-based encryption scheme and Paterson-Schuldt's ID-based signature. Our identity-based blind signature scheme is communicationally efficient and only needs two data exchanges between the signer and the user, and the signatures are short. We prove that our scheme is concurrently secure in the standard model assuming that the computational Diffie-Hellman problem is hard. [ABSTRACT FROM AUTHOR]
- Published
- 2010
19. Factoring based proxy signature schemes
- Author
-
Xue, Qingshui and Cao, Zhenfu
- Subjects
- *
CRYPTOGRAPHY , *SYMBOLISM , *ALGEBRA , *LOGARITHMS - Abstract
Abstract: In proxy signature schemes, original signers delegate proxy signers to sign messages on behalf of original signers. Currently, most proxy signature schemes are based on the difficulty of discrete logarithms over finite field or ellipse curve addition group. Based on the difficulty of factorings of large integers, one normal proxy signature scheme and one multi-proxy signature scheme are proposed. The security properties of strong unforgeability, verifiability, strong nonrepudiation, strong identifiability, distinguishability and prevention of misuse of proxy signing power can be fulfilled by the proposed schemes. In addition, the performance of the proposed schemes is analysed as well. [Copyright &y& Elsevier]
- Published
- 2006
- Full Text
- View/download PDF
20. Improved authenticated multiple-key agreement protocol without using conventional one-way function
- Author
-
Chien, Hung-Yu and Jan, Jinn-Ke
- Subjects
- *
VARIATE difference method , *SECURITY systems , *MATHEMATICAL analysis - Abstract
An authenticated multiple-key agreement protocol enables two entities to authenticate each other and establish multiple common keys in a two-pass interaction, and a protocol without using a conventional hash function simplifies its security assumption on only public hard problem. In 2001, Yen et al. proposed an improved multiple-key agreement protocol to overcome the attacks that break the previous variants. However, the authors show that an impersonator can easily forge message without being detected, and can establish common session keys with the communicating party. To overcome all the weakness, we propose an improved scheme that also achieves better key utilization, compared to the previous variants. [Copyright &y& Elsevier]
- Published
- 2004
- Full Text
- View/download PDF
21. Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar: Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar
- Author
-
Wahyuni, Juli, Gunawan, Indra, Kirana, Ika Okta, Dewi, Rafiqa, and Solikhun, Solikhun
- Subjects
Triple DES ,Employee ,Data_CODINGANDINFORMATIONTHEORY ,Cryptograph ,DES - Abstract
In this era, technology is increasingly advanced and rapid, where data confidentiality is one of the things that is very important for a company. Employee data is data that is very important for the company. So it needs a system that can secure a database of employees from various types of hecker attacks or eavesdroppers who can steal and damage data. Cryptography is a science based on mathematical techniques that deal with information security such as data confidentiality. Triple DES algorithm is a development of DES algorithm, the algorithm used is the same, only in Triple DES algorithm, the encryption and decryption process is done 3 times. Triple DES also has three different keys. The three keys used can be mutually independent (K1 ? K2 ? K3) or only two keys are mutually independent and one other key is the same as the first key (K1 ? K2 and K3 = K1). This algorithm can generate encryption that cannot be read or understood by humans and results in the exact decryption of the initial plaintext input.
- Published
- 2020
22. Mobile Banking Authentication Based on Cryptographically Secured Iris Biometrics
- Author
-
Maček, Nemanja, Adamović, Saša, Milosavljević, Milan, Jovanović, Miloš, Gnjatović, Milan, Trenkić, Branimir, Maček, Nemanja, Adamović, Saša, Milosavljević, Milan, Jovanović, Miloš, Gnjatović, Milan, and Trenkić, Branimir
- Abstract
This paper presents an approach to designing secure modular authentication framework based on iris biometrics and its’ implementation into mobile banking scenario. The system consists of multiple clients and an authentication server. Client, a smartphone with accompanying application, is used to capture biometrics, manage auxiliary data and create and store encrypted cancelable templates. Bank’s authentication server manages encryption keys and provides the template verification service. Proposed system keeps biometric templates encrypted or at least cancelable during all stages of storage, transmission and verification. As templates are stored on clients in encrypted form and decryption keys reside on bank's authentication server, original plaintext templates are unavailable to an adversary if the phone gets lost or stolen. The system employs public key cryptography and pseudorandom number generator on small-sized templates, thus not suffering from severe computational costs like systems that employ homomorphic encryption. System is also general, as it does do not depend on specific cryptographic algorithms. Having in mind that modern smartphones have iris scanners or at least high- quality front cameras, and that no severe computational drawbacks exist, one may conclude that the proposed authentication framework is highly applicable in mobile banking authentication.
- Published
- 2019
23. Construction of 2-designs.
- Author
-
Chuankun, Wu and Likuan, Zhao
- Abstract
This paper presents a construction of 2-(2
n −1, n,λ) designs and gives the polynomial description of this class of designs. The construction applies to the cases of all integer n≥2. [ABSTRACT FROM AUTHOR]- Published
- 1999
- Full Text
- View/download PDF
24. Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture.
- Author
-
Vijaya Kumar, V, Devi, M, Vishnu Raja, P, Kanmani, P, Priya, V, Sudhakar, Sengan, and Sujatha, Krishnamoorthy
- Subjects
- *
INTERNET of things , *INTERNET , *COMPUTER network architectures , *PEER-to-peer architecture (Computer networks) - Abstract
In recent times, Internet connected technologies and applications have seen tremendous growth as everyone is inclined to enjoy the benefits offered by them. An upcoming technology called Internet of Things (IoT) has increased the capacity of internet to take in numerous computing devices. With respect to the prevailing IP-based Security Protocol (Sec P) suites, which rely on the conventions of Network Topology (NT) and device and network (n/w) abilities to decide on the designs of the employed Security Mechanisms (Sec M). In this work, we address by putting forth a unified IoT framework model dependent on the Mobile Security IP IoT Architecture (MSIP-IoT-A) which exclusively concentrates on supporting Sec for the IoT. The model suggested by us, brings together local IoT systems with the global Internet with no loss in its usage, ability of cross operation and protecting the Sec. An Internet of Things (IOT) – Name Determination Check (NDC) is proposed as the main part of the middleware layer by us in this article and we also generate a We propose an IoT-NDC as a core component of the, and develop a not so heavy but light keying protocol capable of establishing a trust amid an IoT device and the IoT-NDC. Moreover, we attempt of identify and fix this issue by suggesting a peer-to-peer SecP for fulfilling a range of environment. We have applied safe communication (comm.) upon an open sourced platform for the IoT. Ultimately, with assessment and studies with the help of models and data from the SecPlogic, we conclude that the suggested methodology is effective to fulfill the mentioned objective and can be used for the platform. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
25. Bitcoin, παραστατικό χρήμα και αποκρατικοποίηση του χρήματος
- Author
-
Βολιώτης, Δημήτριος, Σχολή Χρηματοοικονομικής και Στατιστικής. Τμήμα Χρηματοοικονομικής και Τραπεζικής Διοικητικής, and Χρηματοοικονομική και Τραπεζική με κατεύθυνση στην Χρηματοοικονομική Ανάλυση για Στελέχη
- Subjects
Decentralized ,Fiat standard ,Competitive note issue ,Χρήμα ,Cryptograph - Abstract
Στην παρούσα εργασία αρχικά θα αναλύσουμε τα βασικά χαρακτηριστικά του bitcoin, τον τρόπο παραγωγής bitcoins μέσα από την διαδικασία mining καθώς και τα πλεονεκτήματα και μειονεκτήματα της χρήσης του αποκεντρωμένου, διεθνώς διαδεδομένου ψηφιακού κρυπτονομίσματος. Στην συνέχεια εξετάζουμε την εξέλιξη του χρήματος από commodity money σε τωρινό παραστατικό χρήμα το οποίο δεν έχει εσωτερική αξία, αλλά ονομάζεται έτσι επειδή υπάρχει ένα κυβερνητικό διάταγμα ( "Fiat") που δηλώνει ότι αποτελεί νόμιμο νόμισμα για πληρωμές και συναλλαγές. Εξετάζουμε τις κοινωνικές και οικονομικές συνέπειες του παραστατικού χρήματος αφού οι κυβερνήσεις έχουν κίνητρο να αυξάνουν την νομισματική προσφορά για να λύνουν πιεστικά βραχυπρόθεσμα οικονομικά προβλήματα. Ολοκληρώνοντας, παρουσιάζουμε τη θέση του Hayek που θεωρεί ότι το χρήμα δεν διαφέρει από τα άλλα αγαθά και ότι η παροχή χρήματος θα ήταν πιο αποτελεσματική μέσω του ανταγωνισμού μεταξύ ιδιωτικών τραπεζών από το κρατικό μονοπώλιο έκδοσης χρήματος. Πως το σύστημα του free banking επιτυγχάνει μεγαλύτερη σταθερότητα στην αξία του νομίσματος; Παράλληλα αναλύουμε τις απόψεις μεγάλων οικονομολόγων πάνω στην πρόταση του Hayek και συγκρίνουμε τον κανόνα του χρυσού με το σύστημα της αποκρατικοποίησης νομίσματος. Στην τεχνολογική εποχή που ζούμε το επιχείρημα των competitive private currencies αποκτά νέα σημασία καθώς συνεχίζει με αμείωτο ρυθμό η εξερεύνηση της αγοράς στον κόσμο των ψηφιακών νομισμάτων.
- Published
- 2016
26. Data Security and access management in Cloud Computing: capability list-based cryptography
- Author
-
Aissaoui, Khalid, Belhadaoui, Hicham, ZAKARI, Abdelouahed, Rifi, Mounir, ZAKARI, Abdelouahed, Réseaux Informatique Télécom Multimédia [Casablanca] (RITM), Ecole Supérieure de Technologie de Casablanca (ESTC), Laboratoire d'Informatique Théorique et Appliquée (LITA), and Université de Lorraine (UL)
- Subjects
cryptograph ,Hadoop DFS ,Cloud computing secu rity ,access management ,[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] ,confidentiality ,virtualization - Abstract
International audience; A new paradigm in information technology has emerged this last years and continues to grow. Cloud computing is quite a new concept that has potential advantages; computing capacity provided as needed, much lower cost than in-house infrastructure, better reliability depending on the S ervice Level Agreement (S LA)… However, some drawbacks, mainly data security and access control concerns, remain a real setback to a wider utilization of this technology. In fact, storing sensitive data in a remote server owned by an external entity (the cloud provider) could lead to substantial risks. A malicious user or operator can identify and exploit the vulnerabilities of this system. Numerous works are being done in order to reinforce the cloud capacities in term of protecting data and managing access control using cryptography, data fragmentation, access control policies... In this paper, we introduce a new approach in which we exclude the cloud provider from any involvement in the access management with the aim of minimizing the leaks. We developed and tested programs based on a capability-list and using both symmetric and asymmetric cryptography
- Published
- 2016
27. Short Paper: 'A peer to peer security protocol for the internet of things': Secure communication for the sensiblethings platform
- Author
-
Zhang, H., Zhang, T., Zhang, H., and Zhang, T.
- Abstract
Nowadays, the Internet of Things is able to provide more advanced services to people, which connects a variety of devices, systems and applications. However, it covers a variety of devices, protocols and applications, which makes it much more complex. In the main application areas, wireless sensor networks with a frequent but short communication character, it requires an efficient and flexible protocol to protect the information. To protect the traffic of the Internet of Things is the focal point of this research work. Although many protocols for the Internet have been put forward, it is still not enough to meet the increasingly complex requirements from applications. Many of them are not efficient enough to adapt the device diversity and timely communication environment. This paper is trying to address this problem, by proposing a peer-to-peer security protocol to satisfy this varied environment. Secure communication is implemented on an open sourced platform for the Internet of Things. Its less handshake in future sessions and dynamic security level adjustment feature satisfies the realistic demand on this platform. Finally, with a comparison test, the result shows that the proposed protocol is efficient to meet the specific goals and applicable for the Internet of Things applications. © 2015 IEEE., Export Date: 23 September 2015
- Published
- 2015
- Full Text
- View/download PDF
28. Statistical detection of hidden information in natural images
- Author
-
Zitzmann, Cathel, Institut Charles Delaunay (ICD), Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS), Université de Technologie de Troyes, Igor Vladimirovitch Nikiforov, Lionel Fillatre, and STAR, ABES
- Subjects
Statistical hypothesis testing ,Digitization ,Numérisation ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,JPEG (norme de codage d’images) ,Cryptographie ,Cryptograph ,JPEG (image coding standard) ,Tests d’hypothèses (statistique) ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
The need of secure communication is not something new: from ancient, methods exist to conceal communication. Cryptography helped make unintelligible message using encryption, steganography can hide the fact that a message is exchanged.This thesis is part of the project "Hidden Information Research" funded by the National Research Agency, Troyes University of Technology worked on the mathematical modeling of a natural image and creating detectors of hidden information in digital pictures.This thesis proposes to study the steganalysis in natural images in terms of parametric statistical decision. In JPEG images, a detector based on the modeling of quantized DCT coefficients is proposed and calculations of probabilities of the detector are established theoretically. In addition, a study of the number of shrinkage occurring during embedding by F3 and F4 algorithms is proposed. Finally, for the uncompressed images, the proposed tests are optimal under certain constraints, a difficulty overcome is the data quantization, La nécessité de communiquer de façon sécurisée n’est pas chose nouvelle : depuis l’antiquité des méthodes existent afin de dissimuler une communication. La cryptographie a permis de rendre un message inintelligible en le chiffrant, la stéganographie quant à elle permet de dissimuler le fait même qu’un message est échangé. Cette thèse s’inscrit dans le cadre du projet "Recherche d’Informations Cachées" financé par l’Agence Nationale de la Recherche, l’Université de Technologie de Troyes a travaillé sur la modélisation mathématique d’une image naturelle et à la mise en place de détecteurs d’informations cachées dans les images. Ce mémoire propose d’étudier la stéganalyse dans les images naturelles du point de vue de la décision statistique paramétrique. Dans les images JPEG, un détecteur basé sur la modélisation des coefficients DCT quantifiés est proposé et les calculs des probabilités du détecteur sont établis théoriquement. De plus, une étude du nombre moyen d’effondrements apparaissant lors de l’insertion avec les algorithmes F3 et F4 est proposée. Enfin, dans le cadre des images non compressées, les tests proposés sont optimaux sous certaines contraintes, une des difficultés surmontées étant le caractère quantifié des données
- Published
- 2013
29. A Peer to Peer Security Protocol for the Internet of Things : Secure Communication for the SensibleThings Platform
- Author
-
Zhang, Hao and Zhang, Hao
- Abstract
With the rapid development of the Internet connected technologies and applications, people are keen on embracing the convenience and practi-‐‑ calities they brings. As all kinds of technologies improve, the Internet of Things matures and is able to provide more advanced services to people, which connects a variety of devices, systems and applications beyond traditional machine-‐‑to-‐‑machine. However, it covers a variety of devices, protocols and applications, which makes it much more complex than a normal network. Nevertheless, equipped with appropriate security solutions, the Internet of Things is promising to bring us more conven-‐‑ iences and be widely applied in our daily life. And like the main appli-‐‑ cation areas, wireless sensor networks with a frequent but short com-‐‑ munication character, it requires an efficient and flexible protocol to protect the information. To protect the traffic of the Internet of Things is the focal point of this research work. Although many protocols for the Internet have been put forward, it is still not enough to meet the increas-‐‑ ingly complex requirements from applications. Many of them are not efficient enough to adapt the device diversity and timely communica-‐‑ tion environment. This research work is trying to address this problem, by proposing a peer-‐‑to-‐‑peer security protocol to satisfy this varied environment. Secure communication is implemented on an open sourced platform for the Internet of Things. The philosophy of the platform it implemented on is also inherited to this protocol and the implementation. It avoids unnecessary handshakes between entities, which makes it more efficient in a wireless sensor network. Modulariza-‐‑ tion and unit test are adapted in implementation to enhance the robust of the system. Its dynamic security level adjustment feature satisfies the realistic demand on one platform this protocol is implemented on. Finally, with a comparison test and an analysis using the BAN logic, SensibleThings Platform
- Published
- 2014
30. A structure preserving approach for securing XML documents
- Author
-
Nabeel, Mohamed, Bertino, Elisa, Nabeel, Mohamed, and Bertino, Elisa
- Abstract
With the widespread adoption of XML as the message format to disseminate content over distributed systems including Web Services and Publish-Subscribe systems, different methods have been proposed for securing messages. We focus on a subset of such systems where incremental updates are disseminated. The goal of this paper is to develop an approach for disseminating only the updated or accessible portions of XML content while assuring confidentiality and integrity at message level. While sending only the updates greatly reduces the bandwidth requirements, it introduces the challenge of assuring security efficiently for partial messages disseminated to intermediaries and clients. We propose a novel localized encoding scheme based on conventional cryptographic functions to enforce security for confidentiality and content integrity at the granularity of XML node level. We also address structural integrity with respect to the complete XML document to which clients have access. Our solution takes every possible measure to minimize indirect information leakage by making the rest of the structure of XML documents to which intermediaries and clients do not have access oblivious. The experimental results show that our scheme is superior to conventional techniques of securing XML documents when the percentage of update with respect to original documents is low.
- Published
- 2007
31. Ochrana osobních údajů v informačním systému
- Author
-
Soukup, Tomáš, Bašná, Romana, Opletalová, Vendula, Soukup, Tomáš, Bašná, Romana, and Opletalová, Vendula
- Abstract
Pojmy osobní údaje a ochrana osobních údajů doprovázejí běžný společenský život v České republice teprve pár let. V oblasti ochrany osobních údajů je nutné přijímat opatření k zamezení zneužití osobních údajů a tím se vyvarovat následnému postihu. Problematika ochrany osobních údajů je složitá, diskuse a polemiky jsou vedeny i ve sdělovacích prostředcích., The terms personal data and personal data protection have accopmanied ordinary social life of people in the Czech Republic only for several years. In the area of personal data protection it is necessary to receive measures to prevent misuse of personal data and thereby to avoid resulting sanction. Problems of personal data protection is complicated, discussion and polemics are held even in media.
32. Postranní kanály v kryptografii
- Author
-
Martinásek, Zdeněk, Sobotka, Jiří, Budík, Lukáš, Martinásek, Zdeněk, Sobotka, Jiří, and Budík, Lukáš
- Abstract
Tato práce se zabývá problematikou postranních kanálu v kryptografii. Úvodní část popisuje základní členění oboru kryptologie. Dále jsou zmíněné požadavky na kryptografický systém z hlediska bezpečnosti. V další kapitole jsou popsány základní algoritmy a protokoly, které se používají v kryptografii. Hlavní část práce se zaměřuje na problematiku postranních kanálů. Závěr práce demonstruje útok časovým postraním kanálem na algoritmus RSA., This work deals with a problem called sidelong cannals in cryptografy. First part describes basic segmentation of cryptografy branch. In addition to this the document mentions some requirements for cryptology system from security angle. In another section basic algorithms and protocols are described which are used in cryptology. Main part of this work is aimed at sidelong cannals problem. Conclusion of this task demonstrates an attack by time-side canal to algorithm RSA.
33. Ochrana osobních údajů v informačním systému
- Author
-
Soukup, Tomáš, Bašná, Romana, Opletalová, Vendula, Soukup, Tomáš, Bašná, Romana, and Opletalová, Vendula
- Abstract
Pojmy osobní údaje a ochrana osobních údajů doprovázejí běžný společenský život v České republice teprve pár let. V oblasti ochrany osobních údajů je nutné přijímat opatření k zamezení zneužití osobních údajů a tím se vyvarovat následnému postihu. Problematika ochrany osobních údajů je složitá, diskuse a polemiky jsou vedeny i ve sdělovacích prostředcích., The terms personal data and personal data protection have accopmanied ordinary social life of people in the Czech Republic only for several years. In the area of personal data protection it is necessary to receive measures to prevent misuse of personal data and thereby to avoid resulting sanction. Problems of personal data protection is complicated, discussion and polemics are held even in media.
34. Postranní kanály v kryptografii
- Author
-
Martinásek, Zdeněk, Sobotka, Jiří, Budík, Lukáš, Martinásek, Zdeněk, Sobotka, Jiří, and Budík, Lukáš
- Abstract
Tato práce se zabývá problematikou postranních kanálu v kryptografii. Úvodní část popisuje základní členění oboru kryptologie. Dále jsou zmíněné požadavky na kryptografický systém z hlediska bezpečnosti. V další kapitole jsou popsány základní algoritmy a protokoly, které se používají v kryptografii. Hlavní část práce se zaměřuje na problematiku postranních kanálů. Závěr práce demonstruje útok časovým postraním kanálem na algoritmus RSA., This work deals with a problem called sidelong cannals in cryptografy. First part describes basic segmentation of cryptografy branch. In addition to this the document mentions some requirements for cryptology system from security angle. In another section basic algorithms and protocols are described which are used in cryptology. Main part of this work is aimed at sidelong cannals problem. Conclusion of this task demonstrates an attack by time-side canal to algorithm RSA.
35. Postranní kanály v kryptografii
- Author
-
Martinásek, Zdeněk, Sobotka, Jiří, Martinásek, Zdeněk, and Sobotka, Jiří
- Abstract
Tato práce se zabývá problematikou postranních kanálu v kryptografii. Úvodní část popisuje základní členění oboru kryptologie. Dále jsou zmíněné požadavky na kryptografický systém z hlediska bezpečnosti. V další kapitole jsou popsány základní algoritmy a protokoly, které se používají v kryptografii. Hlavní část práce se zaměřuje na problematiku postranních kanálů. Závěr práce demonstruje útok časovým postraním kanálem na algoritmus RSA., This work deals with a problem called sidelong cannals in cryptografy. First part describes basic segmentation of cryptografy branch. In addition to this the document mentions some requirements for cryptology system from security angle. In another section basic algorithms and protocols are described which are used in cryptology. Main part of this work is aimed at sidelong cannals problem. Conclusion of this task demonstrates an attack by time-side canal to algorithm RSA.
36. Ochrana osobních údajů v informačním systému
- Author
-
Soukup, Tomáš, Bašná, Romana, Soukup, Tomáš, and Bašná, Romana
- Abstract
Pojmy osobní údaje a ochrana osobních údajů doprovázejí běžný společenský život v České republice teprve pár let. V oblasti ochrany osobních údajů je nutné přijímat opatření k zamezení zneužití osobních údajů a tím se vyvarovat následnému postihu. Problematika ochrany osobních údajů je složitá, diskuse a polemiky jsou vedeny i ve sdělovacích prostředcích., The terms personal data and personal data protection have accopmanied ordinary social life of people in the Czech Republic only for several years. In the area of personal data protection it is necessary to receive measures to prevent misuse of personal data and thereby to avoid resulting sanction. Problems of personal data protection is complicated, discussion and polemics are held even in media.
37. Ochrana osobních údajů v informačním systému
- Author
-
Soukup, Tomáš, Bašná, Romana, Soukup, Tomáš, and Bašná, Romana
- Abstract
Pojmy osobní údaje a ochrana osobních údajů doprovázejí běžný společenský život v České republice teprve pár let. V oblasti ochrany osobních údajů je nutné přijímat opatření k zamezení zneužití osobních údajů a tím se vyvarovat následnému postihu. Problematika ochrany osobních údajů je složitá, diskuse a polemiky jsou vedeny i ve sdělovacích prostředcích., The terms personal data and personal data protection have accopmanied ordinary social life of people in the Czech Republic only for several years. In the area of personal data protection it is necessary to receive measures to prevent misuse of personal data and thereby to avoid resulting sanction. Problems of personal data protection is complicated, discussion and polemics are held even in media.
38. Postranní kanály v kryptografii
- Author
-
Martinásek, Zdeněk, Sobotka, Jiří, Martinásek, Zdeněk, and Sobotka, Jiří
- Abstract
Tato práce se zabývá problematikou postranních kanálu v kryptografii. Úvodní část popisuje základní členění oboru kryptologie. Dále jsou zmíněné požadavky na kryptografický systém z hlediska bezpečnosti. V další kapitole jsou popsány základní algoritmy a protokoly, které se používají v kryptografii. Hlavní část práce se zaměřuje na problematiku postranních kanálů. Závěr práce demonstruje útok časovým postraním kanálem na algoritmus RSA., This work deals with a problem called sidelong cannals in cryptografy. First part describes basic segmentation of cryptografy branch. In addition to this the document mentions some requirements for cryptology system from security angle. In another section basic algorithms and protocols are described which are used in cryptology. Main part of this work is aimed at sidelong cannals problem. Conclusion of this task demonstrates an attack by time-side canal to algorithm RSA.
39. Ochrana osobních údajů v informačním systému
- Author
-
Soukup, Tomáš, Bašná, Romana, Soukup, Tomáš, and Bašná, Romana
- Abstract
Pojmy osobní údaje a ochrana osobních údajů doprovázejí běžný společenský život v České republice teprve pár let. V oblasti ochrany osobních údajů je nutné přijímat opatření k zamezení zneužití osobních údajů a tím se vyvarovat následnému postihu. Problematika ochrany osobních údajů je složitá, diskuse a polemiky jsou vedeny i ve sdělovacích prostředcích., The terms personal data and personal data protection have accopmanied ordinary social life of people in the Czech Republic only for several years. In the area of personal data protection it is necessary to receive measures to prevent misuse of personal data and thereby to avoid resulting sanction. Problems of personal data protection is complicated, discussion and polemics are held even in media.
40. Ochrana osobních údajů v informačním systému
- Author
-
Soukup, Tomáš, Bašná, Romana, Opletalová, Vendula, Soukup, Tomáš, Bašná, Romana, and Opletalová, Vendula
- Abstract
Pojmy osobní údaje a ochrana osobních údajů doprovázejí běžný společenský život v České republice teprve pár let. V oblasti ochrany osobních údajů je nutné přijímat opatření k zamezení zneužití osobních údajů a tím se vyvarovat následnému postihu. Problematika ochrany osobních údajů je složitá, diskuse a polemiky jsou vedeny i ve sdělovacích prostředcích., The terms personal data and personal data protection have accopmanied ordinary social life of people in the Czech Republic only for several years. In the area of personal data protection it is necessary to receive measures to prevent misuse of personal data and thereby to avoid resulting sanction. Problems of personal data protection is complicated, discussion and polemics are held even in media.
41. Postranní kanály v kryptografii
- Author
-
Martinásek, Zdeněk, Sobotka, Jiří, Budík, Lukáš, Martinásek, Zdeněk, Sobotka, Jiří, and Budík, Lukáš
- Abstract
Tato práce se zabývá problematikou postranních kanálu v kryptografii. Úvodní část popisuje základní členění oboru kryptologie. Dále jsou zmíněné požadavky na kryptografický systém z hlediska bezpečnosti. V další kapitole jsou popsány základní algoritmy a protokoly, které se používají v kryptografii. Hlavní část práce se zaměřuje na problematiku postranních kanálů. Závěr práce demonstruje útok časovým postraním kanálem na algoritmus RSA., This work deals with a problem called sidelong cannals in cryptografy. First part describes basic segmentation of cryptografy branch. In addition to this the document mentions some requirements for cryptology system from security angle. In another section basic algorithms and protocols are described which are used in cryptology. Main part of this work is aimed at sidelong cannals problem. Conclusion of this task demonstrates an attack by time-side canal to algorithm RSA.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.