Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
Abstract— Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications. Recently the bilinear pairing such as Weil Pairing or Tate Pairing on elliptic curves and hyper elliptic curves has been found various applications in cryptography. Several identity-based cryptosystems using bilinear pairings of elliptic curves or hyper elliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the signer’s privacy. The proposed method focuses an ID-based ring signature scheme which is based on the pairings with elliptic curve cryptography. The proposed method is used to reduce the number of computation of the pairing for the verification of the id based signature and also decoding of the id based public key cryptosystems with authentication by factor of 2.
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkIJCNCJournal
Coding Opportunistically (COPE) is a simple but very effective data coding mechanism in the wireless network.
However, COPE leaves risks for attackers easily getting the private information saved in the packets,
when they move through the network to their destination nodes. Hence, a lightweight cryptographic approach,
namely SCOPE, was proposed to consolidate COPE against the honest-but-curious and malicious
attacks. Honest-but-curious attack serves adversaries who accurately obey the protocol but try to learn as
much private information as possible for their curiosity. Additionally, this kind of attack is not destructive
consequently. However, it may leave the backdoor for the more dangerous attacks carrying catastrophes
to the system. Malicious attack tries to learn not only the private information but also modifies the packet
on harmful purposes. To cope with this issue, in this work, a lightweight cryptographic approach improves
COPE, namely SCOPE, that is defensive to the both attacks. The private information in the COPE packet
are encrypted by Elliptic Curve Cryptography (ECC), and an additional information is inserted into SCOPE
packets served for the authentication process using the lightweight hash Elliptic Curve Digital Signature Algorithm
(ECDSA). We then prove our new protocol is still guaranteed to be a secure method of data coding,
and to be light to effectively operate in the peer-to-peer wireless network.
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
Abstract— Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications. Recently the bilinear pairing such as Weil Pairing or Tate Pairing on elliptic curves and hyper elliptic curves has been found various applications in cryptography. Several identity-based cryptosystems using bilinear pairings of elliptic curves or hyper elliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the signer’s privacy. The proposed method focuses an ID-based ring signature scheme which is based on the pairings with elliptic curve cryptography. The proposed method is used to reduce the number of computation of the pairing for the verification of the id based signature and also decoding of the id based public key cryptosystems with authentication by factor of 2.
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkIJCNCJournal
Coding Opportunistically (COPE) is a simple but very effective data coding mechanism in the wireless network.
However, COPE leaves risks for attackers easily getting the private information saved in the packets,
when they move through the network to their destination nodes. Hence, a lightweight cryptographic approach,
namely SCOPE, was proposed to consolidate COPE against the honest-but-curious and malicious
attacks. Honest-but-curious attack serves adversaries who accurately obey the protocol but try to learn as
much private information as possible for their curiosity. Additionally, this kind of attack is not destructive
consequently. However, it may leave the backdoor for the more dangerous attacks carrying catastrophes
to the system. Malicious attack tries to learn not only the private information but also modifies the packet
on harmful purposes. To cope with this issue, in this work, a lightweight cryptographic approach improves
COPE, namely SCOPE, that is defensive to the both attacks. The private information in the COPE packet
are encrypted by Elliptic Curve Cryptography (ECC), and an additional information is inserted into SCOPE
packets served for the authentication process using the lightweight hash Elliptic Curve Digital Signature Algorithm
(ECDSA). We then prove our new protocol is still guaranteed to be a secure method of data coding,
and to be light to effectively operate in the peer-to-peer wireless network.
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have
become increasingly reliant on. The main research in computer security domain is how to enhance the
speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the
CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo
value that can process large power of numbers which otherwise are not supported by built-in data types.
First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using
CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime
number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or
small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical
soundness can be alleviated by this algorithm.
Quantum cryptography for secured communication networksIJECEIAES
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum cryptography are Shor’s algorithm and the Grover’s’s algorithm. For finding the number of integer factorization of each photon, Shor’s algorithm is used. Grover’s’s algorithm used for searching the unsorted data. Shor’s algorithm overcomes RSA algorithm by high security. By the implementation of quantum cryptography, we are securing the information from the eavesdropper and thereby preventing data in the communication channel.
Searchable Encryption remain to be one of the most widely required functionality of cloud storage. In this paper, we provide a security analysis of the popular schemes including the study of their implementation and security definitions. We cover Order Preserving Symmetric Encryption, Order Revealing Encryption and Partial Order Preserving Encoding.
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
Because of lack of infrastructure and Central Authority(CA), secure communication is
a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its
nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET
because the network is managed by the nodes themselves without any fixed infrastructure and centralized
authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using
Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private
key. The traditional PKI protocols require centralized authority and heavy computing power to
manage public and private keys, thus making them not suitable for MANETs. To establish a secure
communication for the MANET nodes, we proposed a lightweight crypto protocol which requires
limited resources, making it suitable for MANETs.
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
“SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. In the real world as opposed to the cyber world information gathering often precedes an attack. Today the illicit activities of the hackers are growing by leaps and bounds. However; fortunately, the antagonists reacted promptly and resurrected the internet world from the brink of prostration. Tersely quoting some security ditherers - hijackers, Eavesdropping, hacking, mapping, packet sniffing, spoofing, etc.
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
This is a project dealing with securing images over a network.
Image is a delicate piece of information shared between clients across the world.Cryptography plays a huge role during secure connections.Applying simple Gaussian elimination to achieve highly secured image encryption decryption technique is a interesting challenge.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have
become increasingly reliant on. The main research in computer security domain is how to enhance the
speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the
CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo
value that can process large power of numbers which otherwise are not supported by built-in data types.
First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using
CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime
number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or
small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical
soundness can be alleviated by this algorithm.
Quantum cryptography for secured communication networksIJECEIAES
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum cryptography are Shor’s algorithm and the Grover’s’s algorithm. For finding the number of integer factorization of each photon, Shor’s algorithm is used. Grover’s’s algorithm used for searching the unsorted data. Shor’s algorithm overcomes RSA algorithm by high security. By the implementation of quantum cryptography, we are securing the information from the eavesdropper and thereby preventing data in the communication channel.
Searchable Encryption remain to be one of the most widely required functionality of cloud storage. In this paper, we provide a security analysis of the popular schemes including the study of their implementation and security definitions. We cover Order Preserving Symmetric Encryption, Order Revealing Encryption and Partial Order Preserving Encoding.
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
Because of lack of infrastructure and Central Authority(CA), secure communication is
a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its
nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET
because the network is managed by the nodes themselves without any fixed infrastructure and centralized
authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using
Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private
key. The traditional PKI protocols require centralized authority and heavy computing power to
manage public and private keys, thus making them not suitable for MANETs. To establish a secure
communication for the MANET nodes, we proposed a lightweight crypto protocol which requires
limited resources, making it suitable for MANETs.
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
“SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. In the real world as opposed to the cyber world information gathering often precedes an attack. Today the illicit activities of the hackers are growing by leaps and bounds. However; fortunately, the antagonists reacted promptly and resurrected the internet world from the brink of prostration. Tersely quoting some security ditherers - hijackers, Eavesdropping, hacking, mapping, packet sniffing, spoofing, etc.
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
This is a project dealing with securing images over a network.
Image is a delicate piece of information shared between clients across the world.Cryptography plays a huge role during secure connections.Applying simple Gaussian elimination to achieve highly secured image encryption decryption technique is a interesting challenge.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
Secure Checkpointing Approach for Mobile Environmentidescitation
Mobile nodes such as mobile phones, laptops etc are widely used nowadays. The
services must be always available, reliable and uninterrupted. The communication must be
secure. Fault tolerance is the most important feature of these systems. To make a system
fault tolerant at operating system level we apply check pointing. Security threats like
information leakage, information theft, information change can be done by a malicious node
at the time of communication between two legitimate nodes. Elliptic curve cryptography is
used to provide authentication, confidentiality, non repudiation etc. Main objective of our
work is to design a low overhead secured fault tolerant system which makes the
computation and communication secure. The saving of system state is needed to recover
from failure. The reliable backing store is also needed for recovery from failure.
Data Security Using Elliptic Curve CryptographyIJCERT
Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Connector Corner: Automate dynamic content and events by pushing a button
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata Rules
1. International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 708
A New Security Level for Elliptic Curve Cryptosystem
Using Cellular Automata Rules
Fatima Amounas
R.O.I Group, Computer Sciences Department
Moulay Ismaïl University,
Faculty of Sciences and Technics,
Errachidia, Morocco.
El Hassan El Kinani
A.A Group, Mathematical Department
Moulay Ismaïl University,
Faculty of Sciences and Technics,
Errachidia, Morocco.
Abstract: Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
Keywords: Cryptography, Elliptic curve, Cellular automata, Matrix, Scrambling technique, Encryption, Decryption.
1. INTRODUCTION
Security is the important factor in the public network and
cryptography play an important role in this field.
Cryptography is an old art of sending secret messages
between sender and receiver. With the advancement of
internet technologies, cryptography becomes a crucial
aspect for secure communications to protect important
data from eavesdroppers. In fact, cryptography is the
science of devising methods that allow information to be
sent in a secure form in such a way that the only person able
to retrieve this information is the intended recipient.
Cryptography is broadly divided into two categories
depending upon the key, which is defined as the rules used to
convert an original text into encrypted text: - Symmetric Key
Encryption and Asymmetric Key Encryption. Symmetric
Key Encryption uses the same key for encryption and
decryption processes. This technique is simple yet
powerful but key distribution is the chief problem that
needs to be addressed Whereas, Asymmetric Key
Encryption use two mathematically associated keys: Public
Key & Private Key for encryption. The public key is available
to everyone but the data once encrypted by public key of any
user can only be decrypted by private key of that
particular user.
Elliptic curve cryptography is effective security solution to
provide secure communication. Elliptic curve cryptography
transforms a mathematical problem in to an applicable
computer algorithm. Intractable problems are the center of
public key cryptography and bring computationally
demanding operations into a cryptosystem. Elliptic curve
cryptography (ECC) is based upon the algebraic structure of
elliptic curves over finite field. Elliptic curve cryptography is
the most efficient public key encryption scheme based on
elliptic curve concepts that can be used to create faster,
smaller, and efficient cryptographic keys. As result
researchers are engaged to develop different cryptographic
techniques based ECC to enhance network security [1, 2, 3].
Recently, more applications propose to use the elliptic curve
in encryption process and improve their efficiency using
cellular automata [4, 5]. In our previous works [6, 7, 8, 9], we
have proposed cryptographic algorithm for text encryption
using elliptic curve. Basically this paper is proposing a new
encryption algorithm based ECC using the concept of cellular
automata. Finally, expected results are showing the
performance of the proposed algorithm.
The rest of the paper is structured as follows. Section 2 gives
detailed description of commonly employed security concepts
and terminology. In particular, we present basic idea of
elliptic curve cryptography. Section 3 a detailed description of
Cellular automata is presented. In section 4, the proposed
method is introduced. A detailed example is presented that
outlines the working procedure of the proposed method in
section 5. Section 6 presents an implementation of ECCCA
for encryption/decryption process, using Visual Basic as the
implementation tool. Section 7 concludes the paper.
2. CRYPTOGRAPHIC TERMINOLOGY
In this section, we introduce some basics security
terminologies and concepts connected with cryptography. A
message present in a clear form, which can be understood by
any casual observer, is known as the plaintext. The encryption
process converts the plaintext to a form that hides the meaning
of the message from everyone except the valid
communicating parties, and the result is known as the cipher
text. Decryption is the inverse of encryption. The processes
of encryption and decryption are controlled on a quantity
known as the key, which is ideally known only to the valid
users. Strength of a security scheme depends on the secrecy of
the keys used.
A security protocol formally specifies a set of steps to be
followed by communicating parties, so that the mutually
desired security objectives are satisfied. The four main
security objectives include:
2. International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 709
- Confidentiality: This means that the secrecy of the data
being exchanged by the communicating parties is maintained,
i.e., no one other than the legitimate parties should know
the content of the data being exchanged.
- Authentication: It should be possible for the receiver to
ensure that the sender of the message is who he claims to be,
and the message was sent by him.
- Integrity: It provides a means for the receiver of a
message to verify that the message was not altered in
transit. It checks originality of message.
- Non-repudiation: The sender of a message should not be
able to falsely deny later that he sent the message, and
this fact should be verifiable independently by an
independent third-party without knowing too much about
the content of the disputed message(s).
Security protocols realize the security objectives through the
use of appropriate cryptographic algorithms. Security
objectives thus provide trust on the Web. They are realized
through the use of cryptographic algorithms which are
divided into two categories depending on their characteristics:
Symmetric algorithms and Asymmetric algorithms.
2.1 Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) was first
introduced by Victor Miller and Neil Koblitz in 1985. The
principal attraction of ECC compared to RSA is that it offers
equal security for a far smaller key size, thereby
reducing processing overhead [10]. The advantage of ECC
over other public key cryptography techniques such as RSA
is that the best known algorithm for solving ECDLP the
underlying hard mathematical problem in ECC takes the
fully exponential time and so far there is a lack of sub
exponential attack on ECC. ECC is based on the
Discrete Logarithmic problem over the points on an
elliptic curve [11].
2.2 Mathematics Background of ECC
Let E be an elliptic curve over Fp, given by an affine
Weierstrass equation of the form:
E: y2
= x3
+ax+b (1)
with coefficients a, b Fp such that 4a3
+27b2
0. We recall
that the set E(Fp) of points of any elliptic curve E in affine Fp-
valued coordinates form an Abelian group (with a point at
infinity denoted by as the neutral element).
To encrypt a message, Alice and Bob decide on an
elliptic curve and take a affine point (P) that lies on the
curve. Plaintext M is encoded into a point PM. Alice chooses
a random prime integer nA and Bob chooses a random
prime integer nB. nA and nB are Alice and Bob’s private
key respectively. To generate the public key,
Alice computes,
PA= nAP
and Bob Computes.
PB= nBP
To encrypt a message point PM for Bob, Alice chooses
another random integer named k and computes the
encrypted message PC using Bob’s Public key (PB). PC is a
pair of points:
PC= [(kP), (PM+kPB)]
Alice Sends PC to Bob as a cipher message. Bob, receiving
the encrypted message PC and using his private key, nB,
multiplying with kP and add with second point in the
encrypted message to compute PM, which is corresponding
to the plaintext message M,
PM= (PM+kPB) -[ nB (kP)]
Addition operation for two points P( 1x , 1y ) and Q
( 2x , 2y ) over an elliptic group, if P+Q= ( 3x , 3y ) is
given by (2) and (3) and the parameter s is calculated by
(4):
pxxsx mod21
2
3 (2)
pyxxsy mod)( 1313 (3)
12
12
xx
yy
if PQ
s= (4)
1
2
1
2
3
y
ax if PQ
Multiplication kP over an elliptic group is computed by
repeating the addition operation k times [12, 13]. The
strength of an ECC-based cryptosystem is depends on
difficulty of finding the number of times that P is added to
itself to get Q=kP. Reverse operation known as Elliptic Curve
Discrete Logarithm Problem (ECDLP).
3. CELLULAR AUTOMATA
Cellular Automata (CA) is a discrete computing model which
provides simple, flexible and efficient platform for simulating
complicated systems and performing complex computation
based on the neighborhood’s information. CA consists of two
components 1) a set of cells and 2) a set of rules. Researchers,
scientists and practitioners from different fields have
exploited the CA paradigm for modelling different
applications [14, 15].
A cellular automaton consists of a graph where each node is a
cell. The state of each cell is updated simultaneously at
discrete time steps, based on the states in its
neighborhood at the preceding time step. The algorithm
used to compute the next cell state is referred to as the
CA local rule.
3. International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 710
Figure 1. Model Diagram of Encryption Technique.
For 2-state 3-neighborhood cellular automata there are 23
=8
distinct neighbourhood configurations and 28
=256 distinct
mappings from all these neighbourhood configurations to the
next state, each mapping representing a CA rule [16].
A cellular automaton (CA) is a dynamic system defined by the
following 4-tuple: dimension, set of finite states,
neighborhood and set of rules. Dimension defines number of
cells. Cells are updated accordingly to some rule. Such rule is
based on the state of the cell and the neighborhood [17, 18].
Figure 2 shows two typical neighborhood options (a) Von
Neumann Neighborhood (b) Moore Neighborhood.
Figure 2. (a) Von Neumann Neighborhood (b) Moore Neighborhood
By applying the transition rule the current state of CA moves
to new state by considering the neighborhood states.
For example:
- Rule 90:
- Rule 153:
4. PROPOSED METHOD
A new encryption method based ECC using cellular
automata is presented in Figure 1. This method tries to use
some asymmetric algorithm to encrypt or decrypt data using
elliptic curve. The proposed scheme noted ECCCA combines
the advantage of Automata theory and asymmetric encryption
based ECC into a total scheme. The overall module design
shows the different levels of security used (Figure 1).
In the proposed system, the first level of security starts with
ECC technique, where the plaint text is used as the set of
points to encrypt [19, 20, 21]. In this work, the resulting
output is sent to the next process based cellular automata. In
fact, the encrypted message is scrambled using the principle of
spiral rotation. The proposed method explains the usage of
second level of security using cellular automata since one
level of security is not enough.
Let CA be the Cellular Automata, which used to scramble
secure key applying the Local Rule.
4.1 Encryption procedure
The encryption is done through the following steps:
Step 1: start
Step 2: Divide the plain text into blocks of characters and
embed the characters in into points on elliptic curve.
Step 3: Generate randomly one number d. Then, Compute Kd
and Ke, which serve as secure keys (e is the x-coordinate of
Kd).
Step 4: Generate a cellular automata rule and convert the
compressed key to binary form.
Step 5: Select b=bit (j), where j is bit position (LSBMSB),
which decides which operation has to be performed.
If b = 0 compute Qi=Mi + Kd
If b=1 Compute Qi= Mi + Kd + Ke.
4. International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 711
Step 6: Convert the result blocks into binary sequence and
generate a compressed blocks by using CA technique.
Step 7: Arrange the first bit of all the blocks in the first row
and second bits of all block in the second row and continuing
this process arrange the remaining bit of all the blocks in the
corresponding row of matrix.
Step 8: Apply spiral technique to scramble the data matrix and
to get the cipher text.
Step 9: Stop
4.2 Decryption procedure
The decryption process involves converting the encrypted data
back to its original form for the receiver’s understanding. The
cipher text is decrypted using the reverse process of the
technique explained in encryption algorithm. The steps in
decryption algorithm are as follows:
Step 1. start
Step 2. Divide the cipher text to blocks and the bits are
arranged into a square matrix.
Step 3. Generate a reversible transition rule. Convert the
compressed blocks to a normal form using reversible CA rule.
Step 4. Apply the corresponding reversible principle of spiral
process.
Step 5. Defuse it to get the encrypted points on elliptic curve.
Step 6. Find the equivalent characters by decrypting each
point.
Step 7. Accumulate characters to form the secret message.
Step 8. Stop.
5. EXPLANATION WITH EXAMPLE
We have following example on which we have applied our
new encryption algorithm ECCCA, the explanation has been
provided below.
For the system parameters, we used the following data:
- p and n: two prime numbers (p=29 , n=31).
- E29 (-1, 16) an elliptic curve defined on finite field F29.
- P (5, 7): a point on elliptic curve E with order n.
- Key values:
k= 19 and PB=(16, 6).
d=13 and PA=(7, 27).
Kd = (5,22) and Ke= (6, 20).
- CA Rule chosen: ‘90’
Phase 1:
Plain Text: “ENCRYPTION”
Charact
er
Point on
EC
Bit selected
Encrypted
point Qi
E (6,20) 1 (23, 3)
N (1, 4) 0 (7, 27)
C (18, 1) 1 (2, 14)
R (7, 25) 0 (1, 25)
Y (13,24) 1 (28, 25)
P (0, 25) 0 (0, 4)
T (14, 7) 0 (2, 15)
I (23, 3) 1 (21, 11)
O (0, 4) 1 (16, 6)
N (1, 4) 0 (7, 27)
Phase2:
Therefore, the final encrypted text is compressed as follow:
01011011000001110100111001100111010001.
This algorithm compresses the data to reduce its length
without compromising the compression efficiency and the
information security.
1 0 0 0 1 0 0 1 1 0
0 0 0 0 1 0 0 0 0 0
1 1 0 0 1 0 0 1 0 1
1 1 1 0 0 0 1 0 0 1
1 1 0 1 0 0 0 1 0 1
0 1 0 1 1 0 0 0 0 1
0 1 1 1 1 0 1 1 0 1
0 0 1 0 0 1 1 0 1 0
1 1 1 0 0 0 1 1 1 1
1 1 0 1 1 0 1 1 0 1
1 0 0 0 1 0 0 1 1 0
0 1 1 1 1 1 0 1 1 0
1 1 0 1 1 0 1 1 1 0
0 0 1 1 1 0 0 0 0 1
0 0 0 0 0 0 0 0 0 1
1 1 1 0 0 0 1 1 0 1
1 1 1 1 0 0 1 0 0 1
0 1 0 1 0 1 1 0 0 1
1 0 0 1 0 0 0 1 0 0
1 0 1 1 1 1 0 0 0 1
5. International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 712
6. RESULTS
In this section we proceed with our implementation using
Visual Basic as tool. Winsock Control has been used for
connecting two systems. Messages are transmit from user A to
user B when a socket is created. In our implementation, we
have used the curve E29 (-1, 16) in entire process.
Figure 3. Shows the Key generated using CAT
Figure 4. Encryption process
Figure 5. Decryption process
7. CONCLUSION
In this paper, we introduced the concept of cellular
automata as a promising approach to enhance the security
of the elliptic curve cryptosystem. By using two different
levels of security, the transmitted message is much secure as
compared to simple encryption method. From the above
results it is clearly found that the security against few
Attacks have been enhanced. Thus the proposed work of
joining the elliptic curve cryptography and Cellular
Automata has desirably increased the security level of the
encrypted data. Our algorithm, being based on concept of
CA, helps scrambling process due to rule-90. The Strength of
the algorithm due to the difficulty level used in secure key
generated. In fact, Cellular Automata is the strengthen
method to generate strong keys. Also integration of elliptic
curve cryptosystems and the concept of cellular automata has
improved the security level provided by ECCCA. Therefore, it
can be consider as a good alternative to some applications. In
future, we are interested to extend the proposed system to
image encryption and multimedia encryption.
8. REFERENCES
[1] M Shanmugasundaram and R Shanmugasundaram,
“Elliptic Curve Cryptography (ECC) for Security in
Mobile Communication”, European Journal of Advances
in Engineering and Technology, 1(2), 93-101, 2014.
[2] Moncef Amara and Amar Siad, “Elliptic Curve
Cryptography and its Applications”, 7th International
Workshop on Systems, Signal Processing and their
Applications (WOSSPA), 2011.
[3] Ikshwansu Nautiyal, Madhu Sharma, “Encryption using
Elliptic Curve Cryptography using Java as
Implementation tool”, International Journal of Advanced
Research in Computer Science and Software Engineering
4 (1), pp. 620-625, 2014.
6. International Journal of Computer Applications Technology and Research
Volume 5–Issue 11, 708-713, 2016, ISSN:-2319–8656
www.ijcat.com 713
[4] MD Sadiq and Bhupalam Harish Kumar, “Efficient
Cryptography using Cellular Automata Rules”,
International Journal of Emerging Engineering Research
and Technology, Vol 3, Issue 12, 2015.
[5] Warakorn Srichavengsup and Wimol San-Um, “Data
Encryption Scheme Based on Rules of Cellular Automata
and Chaotic Map Function for Information Security”,
International Journal of Network Security, Vol.18, No.6,
pp.1130-1142, 2016.
[6] F.Amounas and E.H. El Kinani, ”Elliptic curve digital
signature algorithm using boolean permutation based
ECC”, International Journal of Information & Network
Security, vol. 1, no. 3, pp. 216-222, 2012.
[7] F.Amounas and E.H. El Kinani, ”An efficient elliptic
curve cryptography protocol based on matrices,
”International Journal of Engineering Inventions, vol. 1,
no. 9, pp. 49-54, 2012.
[8] F.Amounas, E.H. El Kinani and H.sadki, ” An Efficient
Signcryption Scheme based on The Elliptic Curve
Discrete Logarithm Problem”, International Journal of
Information & Network Security, vol. 2, no. 3, pp. 253-
259, 2013.
[9] F.Amounas, “Efficient methodology for Encrypting
Amazigh Alphabet using Modified Knapsack Algorithm
based ECC ", International Journal on Recent and
Innovation Trends in Computing and Communication
vol. 4, Issue 3, pp. 502-506, 2016.
[10] Andrej Dujella “Applications of elliptic curves in
public key cryptography”, Basque Center for Applied
Mathematics and Universidad del Pais Vasco / Euskal
HerrikoUnibertsitatea, Bilbao, 2011.
[11] Lokesh Giripunje and Sonali Nimbhorkar,
“Comprehensive Security System for Mobile Network
Using Elliptic Curve Cryptography over GF (p)”, Vol 3,
Issue 5, 2013.
[12] D. Sravana Kumar, CH. Suneetha and A. Chandrasekhar,
“Encryption of data using Elliptic Curve over Finite
Field”, International Journal of Distributed and Parallel
Systems, Vol. 3, No. 1, 2012.
[13] Sonali U. Nimbhorkar, and Dr. L. G. Malik “A Survey
On Elliptic Curve Cryptography (ECC)” International
Journal of Advanced Studies in Computers, Science and
Engineering, vol.1 ,issue 1 pp. 1-5, 2012.
[14] M Phani Krishna Kishore, S Kanthi Kiran, B Bangaru
Bhavya and S Harsha Chaitanya S, “A Novel Encryption
System using Layered Cellular Automata”, Proceedings
of the world congress on Engineering, Vol 1, 2011.
[15] G.Shanmugasundaram, P.Thiyagarajan and S.Pavithra,
“A Novel DNA Encryption System using Cellular
Automata”, International Journal of Security, Privacy and
Trust Management, Vol 4, No 3/4, 2015.
[16] G. S. Khedkar, A.O. Amalkar and S.S.Tawani, “An
Efficient Implementation of Cryptographic Algorithm
Using High Speed Cellular Automata Techniques”,
International Journal of Engineering Research and
Applications, Vol. 2, Issue 3, 2012.
[17] M. Tomassini and M. Sipper, “On the Generation of
High-Quality Random Numbers by Two-Dimensional
Cellular Automata”, IEEE Trans. on Computers, vol. 49,
No.10, pp. 1140-l151, 2000.
[18] Petre Anghelescu, SilviuIonitaand EmilSofron “Block
Encryption Using Hybrid Additive Cellular Automata,”
Seventh International Conference on Hybrid Intelligent
Systems, pp. 132- 137, 2007.
[19] F.Amounas, E.H. El Kinani, and A. Chillali, ”An
application of discrete algorithms in asymmetric
cryptography”, International Mathematical Forum, vol. 6,
no. 49, pp. 2409-2418, 2011.
[20] F.Amounas and E.H. El Kinani, ” Fast Mapping
Method based on Matrix Approach For Elliptic
Curve Cryptography”, International Journal of
Information & Network Security, vol. 1, no. 2, pp. 54-59,
2012.
[21] Laiphrakpam Dolendro Singh and Khumanthem
Manglem Singh, “Implementation of Text Encryption
using Elliptic Curve Cryptography”, International Multi-
Conference on Information Processing-2015, Procedia
Computer Science 54 , pp: 73- 82, 2015.