This document summarizes and analyzes several signcryption schemes based on elliptic curves. Signcryption allows for both encryption and digital signing to be performed in one logical step, reducing computational costs compared to traditional signature-then-encryption schemes. The document analyzes schemes by Zheng and Imai, Bao & Deng, Gamage et al, and Jung et al in terms of security goals achieved, communication overhead, and computational costs. It finds that while all schemes achieve confidentiality, integrity, and unforgeability, they differ in supporting features like forward secrecy and public verification. The Zheng & Imai scheme has the lowest computational costs but lacks forward secrecy and public verification.
This document discusses the importance of cryptography and PKI for ensuring security, privacy, and authentication in digital communications. It addresses the three main goals of cryptography - confidentiality, integrity, and availability. The document then provides an overview of cryptographic algorithms, including symmetric and asymmetric encryption as well as hash functions. It also discusses common cryptanalytic attacks and how the strength of encryption increases exponentially with longer key sizes, making brute-force attacks infeasible for sufficiently long keys.
This document summarizes public-key cryptography. It discusses how public-key cryptography uses unique public and private keys to encrypt and decrypt messages securely. It describes how public-key encryption allows a sender to encrypt a message with the recipient's public key, while only the recipient's private key can decrypt it. It also explains how digital signatures allow a sender to encrypt a message with their private key for authentication, while the recipient can decrypt it with the sender's public key to verify identity and integrity. The document notes some vulnerabilities of public-key cryptography like longer key sizes and man-in-the-middle attacks, and how certificate authorities help address these issues.
This seminar report discusses symmetric key cryptography and proposes a new symmetric key algorithm. It begins with an introduction to cryptography and the importance of security. It then describes the two main types of cryptography: symmetric key and asymmetric key. Symmetric key cryptography uses a single key for both encryption and decryption, while asymmetric key uses different public and private keys. The report proposes a new symmetric key algorithm that uses simple steps of generating binary values, reversing numbers, dividing, and adding remainders and quotients. It claims this new algorithm is well-suited for encrypting small amounts of data in a cost-effective way. The report concludes the algorithm is simple but secure due to reverse operations, and the next step is developing a public
A digital signature allows one to verify the identity of the sender of a message and that the message content has not been altered. It involves a key generation algorithm that produces a private key and public key pair. The signing algorithm uses the private key to generate a signature for a message. The signature verification algorithm uses the public key to verify the signature and authenticity of the message. Digital signatures provide security as long as the private key remains confidential to the owner.
The document describes a thesis submitted by Amogh Mahapatra and Rajballav Dash for their Bachelor of Technology degree. It examines using the Hill cipher technique and self-repetitive matrices for data encryption and decryption. Specifically, it proposes an innovation to the conventional Hill cipher method using the concept of self-repetitive matrices. This approach is mathematically derived and implemented to simulate a communication channel with compression techniques. The method aims to address issues with inverting the Hill cipher's multiplicative matrix by using periodically repeating matrices.
The document discusses digital signatures and public key infrastructure (PKI) for building trust in online transactions. It explains symmetric and asymmetric encryption techniques, including how public key encryption works using key pairs to ensure authentication, confidentiality, integrity and non-repudiation. Digital signatures encrypt a hash of a message with the sender's private key to verify authenticity and integrity without revealing the original message. A PKI uses digital certificates issued by a certificate authority to associate users with their public keys.
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
This document proposes and describes a chaos-based direct public verifiable signcryption scheme. It begins with background on chaos theory and how chaotic systems can provide useful properties for cryptography. It then discusses signcryption schemes generally and properties they should satisfy like confidentiality, integrity, and public verifiability. The document proposes a new signcryption scheme that uses a chaotic key generator and the chaotic function f(x) = 3x(1-x^2) to dynamically generate multiple encryption keys, aiming to provide stronger security. It presents the scheme details, including parameters, key generation, and how it can realize single-recipient and multiple-recipient signcryption with public verifiability. The scheme is then analyzed for
This document discusses the importance of cryptography and PKI for ensuring security, privacy, and authentication in digital communications. It addresses the three main goals of cryptography - confidentiality, integrity, and availability. The document then provides an overview of cryptographic algorithms, including symmetric and asymmetric encryption as well as hash functions. It also discusses common cryptanalytic attacks and how the strength of encryption increases exponentially with longer key sizes, making brute-force attacks infeasible for sufficiently long keys.
This document summarizes public-key cryptography. It discusses how public-key cryptography uses unique public and private keys to encrypt and decrypt messages securely. It describes how public-key encryption allows a sender to encrypt a message with the recipient's public key, while only the recipient's private key can decrypt it. It also explains how digital signatures allow a sender to encrypt a message with their private key for authentication, while the recipient can decrypt it with the sender's public key to verify identity and integrity. The document notes some vulnerabilities of public-key cryptography like longer key sizes and man-in-the-middle attacks, and how certificate authorities help address these issues.
This seminar report discusses symmetric key cryptography and proposes a new symmetric key algorithm. It begins with an introduction to cryptography and the importance of security. It then describes the two main types of cryptography: symmetric key and asymmetric key. Symmetric key cryptography uses a single key for both encryption and decryption, while asymmetric key uses different public and private keys. The report proposes a new symmetric key algorithm that uses simple steps of generating binary values, reversing numbers, dividing, and adding remainders and quotients. It claims this new algorithm is well-suited for encrypting small amounts of data in a cost-effective way. The report concludes the algorithm is simple but secure due to reverse operations, and the next step is developing a public
A digital signature allows one to verify the identity of the sender of a message and that the message content has not been altered. It involves a key generation algorithm that produces a private key and public key pair. The signing algorithm uses the private key to generate a signature for a message. The signature verification algorithm uses the public key to verify the signature and authenticity of the message. Digital signatures provide security as long as the private key remains confidential to the owner.
The document describes a thesis submitted by Amogh Mahapatra and Rajballav Dash for their Bachelor of Technology degree. It examines using the Hill cipher technique and self-repetitive matrices for data encryption and decryption. Specifically, it proposes an innovation to the conventional Hill cipher method using the concept of self-repetitive matrices. This approach is mathematically derived and implemented to simulate a communication channel with compression techniques. The method aims to address issues with inverting the Hill cipher's multiplicative matrix by using periodically repeating matrices.
The document discusses digital signatures and public key infrastructure (PKI) for building trust in online transactions. It explains symmetric and asymmetric encryption techniques, including how public key encryption works using key pairs to ensure authentication, confidentiality, integrity and non-repudiation. Digital signatures encrypt a hash of a message with the sender's private key to verify authenticity and integrity without revealing the original message. A PKI uses digital certificates issued by a certificate authority to associate users with their public keys.
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
This document proposes and describes a chaos-based direct public verifiable signcryption scheme. It begins with background on chaos theory and how chaotic systems can provide useful properties for cryptography. It then discusses signcryption schemes generally and properties they should satisfy like confidentiality, integrity, and public verifiability. The document proposes a new signcryption scheme that uses a chaotic key generator and the chaotic function f(x) = 3x(1-x^2) to dynamically generate multiple encryption keys, aiming to provide stronger security. It presents the scheme details, including parameters, key generation, and how it can realize single-recipient and multiple-recipient signcryption with public verifiability. The scheme is then analyzed for
This document provides an introduction to digital signatures, including an overview of encryption, hashing, digital signature creation and verification, and different digital signature schemes like RSA, ElGamal, and Schnorr. It also discusses the legal aspects and advantages/disadvantages of digital signatures.
1 Symmetric Encryption
2 Message Authentication and Hash Functions
3 Public-Key Encryption
4 Digital Signatures and Key Management
5 Random and Pseudo random Numbers
6 Practical Application: Encryption of Stored Data
7 Symmetric vs Asymmetric
The document discusses authentication protocols and digital signatures. It describes mutual authentication protocols that allow two parties to verify each other's identities and exchange session keys. It also discusses one-way authentication protocols. The document focuses on explaining the Digital Signature Standard (DSS) and the Digital Signature Algorithm (DSA). It provides details on how DSA uses public/private key pairs to generate and verify digital signatures for authenticating messages and senders.
This document discusses the history and uses of cryptography and digital certificates. It provides an overview of how public key infrastructure (PKI) uses public and private key pairs to securely exchange information over networks. A certification authority (CA) is responsible for issuing digital certificates which contain a public key and verify identity. PKI and digital certificates are used for applications like encryption, digital signatures, authentication, and secure communication protocols.
This document discusses cryptography and network security. Cryptography is defined as the science of protecting data by converting it into an unreadable format. The goals of cryptography are confidentiality, authentication, integrity, and non-repudiation. The document outlines common cryptographic techniques like encryption, decryption, hashes, and digital signatures. It also discusses security threats to network communication like interception, modification, and repudiation. The importance of network security is growing as more applications move to distributed models and operate over the internet.
The document discusses digital signatures, including how they work using public key cryptography. Digital signatures provide authentication by allowing the signature to be verified using the signer's public key. The document outlines the differences between conventional and digital signatures and describes common digital signature schemes, public key encryption, digital certificates, certifying authorities, and methods for protecting private keys like hardware tokens and smart cards.
Easy for the signer to sign a message
There is no point in having a digital signature scheme that involves the signer needing to use slow and complex operations to compute a digital signature.
Easy for anyone to verify a message
Similarly we would like the verification of a digital signature to be as efficient as possible.
Hard for anyone to forge a digital signature
It should be practically impossible for anyone who is not the legitimate signer to compute a digital signature on a message that appears to be valid. By “appears to be valid” we mean that anyone who attempts to verify the digital signature is led to believe that they have just successfully verified a valid digital signature on a message.
Digital signatures provide a way to verify the authenticity and integrity of digital documents and messages. They use public key cryptography where a document or message is hashed, then encrypted with the sender's private key. The recipient can decrypt the signature with the sender's public key and verify that the message has not been altered by comparing the decrypted hash to a newly computed hash of the received message. Digital certificates typically contain the owner's public key, name, expiration date, issuer information, and digital signature to validate the identity of the owner.
This ppt all about digital signature. In this PPT we cover about the Digital Signature and its Security Service provided by digital signature and different attack on digital signature. In this we also cover some digital signature schemes, including RSA algorithm and at the end some applications of digital signatures.
This document summarizes a research paper on deniable encryption. The paper proposes a receiver-deniable public key encryption scheme with the following properties:
1) It is a one-move scheme that does not require any pre-encryption communication between the sender and receiver.
2) It does not require any pre-shared secrets between parties.
3) It provides strong deniability equivalent to factoring a large composite number.
4) It has no decryption errors.
5) It significantly improves bandwidth efficiency compared to previous schemes.
The proposed scheme uses a mediated RSA infrastructure and relies on oblivious transfer between the receiver and security mediator to enable deniability for the receiver.
The document discusses digital signatures, which provide authentication of electronic documents and messages. Digital signatures use public key cryptography, with each user having a unique private key and corresponding public key. To generate a digital signature, a document's hash value is encrypted with the sender's private key. Recipients can verify the signature by decrypting the hash with the sender's public key and comparing it to a newly generated hash of the received document. This allows confirmation of the sender's identity and ensures the document has not been altered. The document outlines the basic digital signature process and requirements for using digital signatures to authenticate electronic information.
- Cryptography and Security
- Methods of Encryption and Decryption
- What is an Algorithm?
- Symmetric Algorithm
- Asymmetric Algorithm
- Hybrid Encryption
- Hashing Algorithm
- Securing the Algorithm or the Key
- Hash Value and Rainbow Table
- Digital Signature
- PKI
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMsaniacorreya
The document describes a proposed system called "CRYPTO Corner" that aims to securely transfer encrypted messages. It allows users to encrypt messages using cryptographic algorithms like Caesar cipher, Playfair cipher, Hill cipher, and Vigenere cipher. The encrypted messages can then be sent as an email. The system includes user registration and authentication. It also stores encrypted messages in a database for future retrieval and decryption. Diagrams show the system design including entity relationship diagram, class diagram, use case diagram, sequence diagram, and activity diagram. The system is developed using PHP and MySQL.
The document provides information about the members of a group - Abdullah Rashid Baig, Adnan Haider, Muhammad Zakria, and Muhammad Zeeshan Khan. It then provides definitions and explanations of cryptography, cryptographic algorithms, encryption, decryption, plaintext, ciphertext, keys, secret key cryptography, public key cryptography, hashing, digital signatures, and security goals like confidentiality, authentication, integrity, availability, non-repudiation, and access control. It also discusses potential attacks on cryptography like viruses, traffic analysis, electromagnetic detection, and dictionary attacks.
Digital signatures provide a way to validate the authenticity and integrity of digital documents, similar to physical signatures. They use cryptographic techniques including hash functions and asymmetric cryptography. A public key infrastructure (PKI) issues digital certificates that map public keys to users' identities. Digital signatures are created by hashing a document and encrypting the hash with a user's private key. Anyone can validate the signature by decrypting it with the user's public key and comparing hashes. India's PKI follows X.509 standards and uses a hierarchical trust model with the Root CA at the top. Digital Signature Certificates contain a user's identity and public key. eSign allows Aadhaar holders to digitally sign documents using their Aad
Digital signatures provide authentication, integrity, and non-repudiation for digital documents and messages. They work by using public key cryptography where a private key is used to sign a message hash and the corresponding public key can then verify that the signature is valid. Digital signatures are important for electronic transactions and communications where the identity of the sender and the integrity of the message need to be assured. However, digital signatures are only as secure as the private keys used to create them.
Blockchain privacy approaches in hyperledger indyManishKumarGiri2
Hyperledger Indy provides privacy-preserving identity solutions using distributed ledger technology. It uses several cryptographic techniques like elliptic curve cryptography, zero-knowledge proofs, and authenticated encryption. Zero-knowledge proofs allow a prover to prove possession of certain information to a verifier without revealing the information itself. Hyperledger Indy implements zero-knowledge proofs using zk-SNARKs and Idemix to privately verify credential information. It also uses Libsodium's sealed boxes for anonymous messaging and credential revocation features to preserve privacy in credentials over time. These approaches help Hyperledger Indy provide private and decentralized identity solutions on blockchains.
Digital signatures serve the same purpose as handwritten signatures but are more secure. They authenticate the identity of the sender, ensure the original content of the message, and prevent repudiation through verifiability by third parties. Digital signatures are generated by using the sender's private key to encrypt a hash or digest of the message. The receiver can then decrypt the signature using the sender's public key and compare it to a newly generated hash to verify authenticity and integrity. Certification authorities issue digital certificates that associate public keys with identities to facilitate verification by receivers who may not personally know the sender.
CGI White Paper - Key Incryption MechanismAmit Singh
This white paper discusses public key encryption and digital signatures. It begins by defining public key cryptography and explaining how it works using asymmetric key pairs for encryption/decryption and digital signatures. It then discusses how certificates are used to validate identities and keys. Certificates contain a user's public key and identity information, signed by a certificate authority, allowing identities to be verified. The paper also explains how digital signatures, encryption, and certificates are implemented in practice when sending signed and encrypted messages.
This chapter discusses digital signatures, which allow a message to be signed digitally to provide authentication, integrity, and non-repudiation. It compares digital and conventional signatures, explaining the digital signature process involves separately sending the message and signature. Digital signatures provide message authentication, integrity, and non-repudiation, but not confidentiality. The chapter describes various digital signature schemes like RSA, ElGamal, and Schnorr, as well as the Digital Signature Standard. It also covers attacks on digital signatures and applications of digital signatures.
This document summarizes a research paper that models and simulates the behavior of a Doubly Fed Induction Generator (DFIG) during faulty grid conditions using Matlab. It describes how a three-phase fault is created using a fault block, and the converter connected to the rotor is disconnected and the rotor is shorted by dump resistances after the fault occurs. The paper presents the normal and faulty operating equivalent circuits of the DFIG. It also describes the Matlab simulation model developed, including blocks for the DFIG and dump resistor protection. Simulation results are shown graphically comparing stator current with time during a 0.2 to 0.3 second fault period.
Optimization of machining parameters of Electric Discharge Machining for 202 ...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
This document provides an introduction to digital signatures, including an overview of encryption, hashing, digital signature creation and verification, and different digital signature schemes like RSA, ElGamal, and Schnorr. It also discusses the legal aspects and advantages/disadvantages of digital signatures.
1 Symmetric Encryption
2 Message Authentication and Hash Functions
3 Public-Key Encryption
4 Digital Signatures and Key Management
5 Random and Pseudo random Numbers
6 Practical Application: Encryption of Stored Data
7 Symmetric vs Asymmetric
The document discusses authentication protocols and digital signatures. It describes mutual authentication protocols that allow two parties to verify each other's identities and exchange session keys. It also discusses one-way authentication protocols. The document focuses on explaining the Digital Signature Standard (DSS) and the Digital Signature Algorithm (DSA). It provides details on how DSA uses public/private key pairs to generate and verify digital signatures for authenticating messages and senders.
This document discusses the history and uses of cryptography and digital certificates. It provides an overview of how public key infrastructure (PKI) uses public and private key pairs to securely exchange information over networks. A certification authority (CA) is responsible for issuing digital certificates which contain a public key and verify identity. PKI and digital certificates are used for applications like encryption, digital signatures, authentication, and secure communication protocols.
This document discusses cryptography and network security. Cryptography is defined as the science of protecting data by converting it into an unreadable format. The goals of cryptography are confidentiality, authentication, integrity, and non-repudiation. The document outlines common cryptographic techniques like encryption, decryption, hashes, and digital signatures. It also discusses security threats to network communication like interception, modification, and repudiation. The importance of network security is growing as more applications move to distributed models and operate over the internet.
The document discusses digital signatures, including how they work using public key cryptography. Digital signatures provide authentication by allowing the signature to be verified using the signer's public key. The document outlines the differences between conventional and digital signatures and describes common digital signature schemes, public key encryption, digital certificates, certifying authorities, and methods for protecting private keys like hardware tokens and smart cards.
Easy for the signer to sign a message
There is no point in having a digital signature scheme that involves the signer needing to use slow and complex operations to compute a digital signature.
Easy for anyone to verify a message
Similarly we would like the verification of a digital signature to be as efficient as possible.
Hard for anyone to forge a digital signature
It should be practically impossible for anyone who is not the legitimate signer to compute a digital signature on a message that appears to be valid. By “appears to be valid” we mean that anyone who attempts to verify the digital signature is led to believe that they have just successfully verified a valid digital signature on a message.
Digital signatures provide a way to verify the authenticity and integrity of digital documents and messages. They use public key cryptography where a document or message is hashed, then encrypted with the sender's private key. The recipient can decrypt the signature with the sender's public key and verify that the message has not been altered by comparing the decrypted hash to a newly computed hash of the received message. Digital certificates typically contain the owner's public key, name, expiration date, issuer information, and digital signature to validate the identity of the owner.
This ppt all about digital signature. In this PPT we cover about the Digital Signature and its Security Service provided by digital signature and different attack on digital signature. In this we also cover some digital signature schemes, including RSA algorithm and at the end some applications of digital signatures.
This document summarizes a research paper on deniable encryption. The paper proposes a receiver-deniable public key encryption scheme with the following properties:
1) It is a one-move scheme that does not require any pre-encryption communication between the sender and receiver.
2) It does not require any pre-shared secrets between parties.
3) It provides strong deniability equivalent to factoring a large composite number.
4) It has no decryption errors.
5) It significantly improves bandwidth efficiency compared to previous schemes.
The proposed scheme uses a mediated RSA infrastructure and relies on oblivious transfer between the receiver and security mediator to enable deniability for the receiver.
The document discusses digital signatures, which provide authentication of electronic documents and messages. Digital signatures use public key cryptography, with each user having a unique private key and corresponding public key. To generate a digital signature, a document's hash value is encrypted with the sender's private key. Recipients can verify the signature by decrypting the hash with the sender's public key and comparing it to a newly generated hash of the received document. This allows confirmation of the sender's identity and ensures the document has not been altered. The document outlines the basic digital signature process and requirements for using digital signatures to authenticate electronic information.
- Cryptography and Security
- Methods of Encryption and Decryption
- What is an Algorithm?
- Symmetric Algorithm
- Asymmetric Algorithm
- Hybrid Encryption
- Hashing Algorithm
- Securing the Algorithm or the Key
- Hash Value and Rainbow Table
- Digital Signature
- PKI
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMsaniacorreya
The document describes a proposed system called "CRYPTO Corner" that aims to securely transfer encrypted messages. It allows users to encrypt messages using cryptographic algorithms like Caesar cipher, Playfair cipher, Hill cipher, and Vigenere cipher. The encrypted messages can then be sent as an email. The system includes user registration and authentication. It also stores encrypted messages in a database for future retrieval and decryption. Diagrams show the system design including entity relationship diagram, class diagram, use case diagram, sequence diagram, and activity diagram. The system is developed using PHP and MySQL.
The document provides information about the members of a group - Abdullah Rashid Baig, Adnan Haider, Muhammad Zakria, and Muhammad Zeeshan Khan. It then provides definitions and explanations of cryptography, cryptographic algorithms, encryption, decryption, plaintext, ciphertext, keys, secret key cryptography, public key cryptography, hashing, digital signatures, and security goals like confidentiality, authentication, integrity, availability, non-repudiation, and access control. It also discusses potential attacks on cryptography like viruses, traffic analysis, electromagnetic detection, and dictionary attacks.
Digital signatures provide a way to validate the authenticity and integrity of digital documents, similar to physical signatures. They use cryptographic techniques including hash functions and asymmetric cryptography. A public key infrastructure (PKI) issues digital certificates that map public keys to users' identities. Digital signatures are created by hashing a document and encrypting the hash with a user's private key. Anyone can validate the signature by decrypting it with the user's public key and comparing hashes. India's PKI follows X.509 standards and uses a hierarchical trust model with the Root CA at the top. Digital Signature Certificates contain a user's identity and public key. eSign allows Aadhaar holders to digitally sign documents using their Aad
Digital signatures provide authentication, integrity, and non-repudiation for digital documents and messages. They work by using public key cryptography where a private key is used to sign a message hash and the corresponding public key can then verify that the signature is valid. Digital signatures are important for electronic transactions and communications where the identity of the sender and the integrity of the message need to be assured. However, digital signatures are only as secure as the private keys used to create them.
Blockchain privacy approaches in hyperledger indyManishKumarGiri2
Hyperledger Indy provides privacy-preserving identity solutions using distributed ledger technology. It uses several cryptographic techniques like elliptic curve cryptography, zero-knowledge proofs, and authenticated encryption. Zero-knowledge proofs allow a prover to prove possession of certain information to a verifier without revealing the information itself. Hyperledger Indy implements zero-knowledge proofs using zk-SNARKs and Idemix to privately verify credential information. It also uses Libsodium's sealed boxes for anonymous messaging and credential revocation features to preserve privacy in credentials over time. These approaches help Hyperledger Indy provide private and decentralized identity solutions on blockchains.
Digital signatures serve the same purpose as handwritten signatures but are more secure. They authenticate the identity of the sender, ensure the original content of the message, and prevent repudiation through verifiability by third parties. Digital signatures are generated by using the sender's private key to encrypt a hash or digest of the message. The receiver can then decrypt the signature using the sender's public key and compare it to a newly generated hash to verify authenticity and integrity. Certification authorities issue digital certificates that associate public keys with identities to facilitate verification by receivers who may not personally know the sender.
CGI White Paper - Key Incryption MechanismAmit Singh
This white paper discusses public key encryption and digital signatures. It begins by defining public key cryptography and explaining how it works using asymmetric key pairs for encryption/decryption and digital signatures. It then discusses how certificates are used to validate identities and keys. Certificates contain a user's public key and identity information, signed by a certificate authority, allowing identities to be verified. The paper also explains how digital signatures, encryption, and certificates are implemented in practice when sending signed and encrypted messages.
This chapter discusses digital signatures, which allow a message to be signed digitally to provide authentication, integrity, and non-repudiation. It compares digital and conventional signatures, explaining the digital signature process involves separately sending the message and signature. Digital signatures provide message authentication, integrity, and non-repudiation, but not confidentiality. The chapter describes various digital signature schemes like RSA, ElGamal, and Schnorr, as well as the Digital Signature Standard. It also covers attacks on digital signatures and applications of digital signatures.
This document summarizes a research paper that models and simulates the behavior of a Doubly Fed Induction Generator (DFIG) during faulty grid conditions using Matlab. It describes how a three-phase fault is created using a fault block, and the converter connected to the rotor is disconnected and the rotor is shorted by dump resistances after the fault occurs. The paper presents the normal and faulty operating equivalent circuits of the DFIG. It also describes the Matlab simulation model developed, including blocks for the DFIG and dump resistor protection. Simulation results are shown graphically comparing stator current with time during a 0.2 to 0.3 second fault period.
Optimization of machining parameters of Electric Discharge Machining for 202 ...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Acquisition of Long Pseudo Code in Dsss SignalIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
The document discusses using modal analysis and frequency response functions (FRF) to analyze the state of wall elements. Modal analysis involves exciting wall elements and measuring their response over time. The FRF relates the input excitation signal to the output response signal and can reveal differences between intact and damaged wall elements. The author uses software to perform experimental modal analysis on various wall materials like bricks. Frequency response functions are obtained and displayed for intact and damaged bricks in different directions. The results show differences in the FRFs that could help diagnose the state of wall elements nondestructively.
This document summarizes an article about medical malpractice in India. It discusses 25 problems patients face in hospitals and aims to find solutions to reduce malpractice. Medical malpractice occurs when a medical professional's treatment departs from the standard of care and harms a patient. Some common types of malpractice discussed include misdiagnosis, failure to diagnose, unnecessary treatment, and prescribing unnecessary tests or drugs. The document outlines the elements required for a medical malpractice claim under Indian law, including that a duty was owed, the duty was breached, the breach caused injury, and damages resulted. It also discusses provisions in the Indian Penal Code and Consumer Protection Act relevant to medical malpractice cases.
Prediction of groundwater quality in Selected Locations in Imo StateIJMER
The prediction of groundwater quality in selected locations was carried out in Owerri-West
L.G.A. of Imo State. The Physical, chemical and biological parameters of groundwater samples from
Nekede (Ward A), Ihiagwa (Ward B), Eziobodo (Ward C), Obinze (Ward D) and Avu (Ward E) were
analysed using the Atomic Absorption Spectrophotometer (AAS). A total of three replicates of fifteen
different borehole water samples were collected based on distances from closest potential sources of
contamination. All parameters were detected up to 61m from pollution source and most of them
increased in concentration during the periods, pointing to infiltrations from storm water. The results
for Iron, pH and TVC decreased as distance increases while for nitrate and BOD increased as distance
increases. Results also showed that most of the boreholes were polluted and not suitable for human
consumption without adequate treatment, Regular monitoring of groundwater quality, abolishment of
unhealthy waste disposal practices and introduction of modern techniques are recommended.
This document summarizes the development of a remote control system for sprinkler irrigation using GSM technology and a microcontroller. Some key points:
- The system allows farmers to control irrigation from anywhere using a mobile phone to send commands via GSM to a microcontroller on site. This eliminates the need for farmers to manually operate equipment.
- The microcontroller interfaces with sensors, valves, pumps and a display. It can start/stop irrigation, switch valves to water different areas, and monitor parameters based on commands from the mobile phone.
- The system was tested successfully and provides benefits like time and labor savings for farmers compared to conventional irrigation methods. GSM was chosen for its low cost and accessibility on mobile
AC-DC-AC-DC Converter Using Silicon Carbide Schottky DiodeIJMER
This document discusses the advantages of silicon carbide (SiC) diodes compared to silicon diodes for use in power electronic applications. SiC diodes have several benefits including lower leakage current even at high temperatures, faster switching speeds, and negligible reverse recovery current. The document provides details on the crystal structure of SiC and compares static and dynamic characteristics of SiC and silicon diodes. It also presents simulation results of an AC-DC-DC converter using a SiC diode that demonstrate lower power losses compared to using a silicon diode. In conclusion, the SiC diode enables more efficient power conversion due to its material properties and performance advantages over silicon diodes.
This document presents a new control strategy for an islanded microgrid consisting of PV and fuel cell distributed generation units supplying both local and nonlocal unbalanced loads. The control strategy comprises voltage control using a proportional resonance controller, droop-based power sharing, and a negative sequence impedance controller. The voltage controller regulates load voltages while the droop controller shares average power. The negative sequence controller minimizes negative sequence currents in the microgrid lines by adjusting each DG unit's negative sequence output impedance, improving power quality under unbalanced conditions. Time-domain simulations in MATLAB/Simulink validate the control strategy's performance for the PV and fuel cell microgrid.
- The document explores the potential of blacksmithing for rural industrialization in Bauchi State, Nigeria. It finds that most blacksmiths are older than 40 years old, with few youths entering the field. Their educational attainment is generally low.
- Blacksmiths primarily produce agricultural tools in the northern zone and domestic/industrial products in the southern zone. Most use locally produced tools, with some improvising tools from spare parts. Overall, blacksmithing currently employs many people and contributes to the economy, showing potential for further development and rural job creation.
Design of Neural Network Controller for Active Vibration control of Cantileve...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Visual Quality for both Images and Display of Systems by Visual Enhancement u...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
MCDM Techniques for the Selection of Material Handling Equipment in the Autom...IJMER
This document discusses different multi-criteria decision making (MCDM) techniques for selecting material handling equipment in the automobile industry. It first provides background on material handling and the automobile industry. It then reviews literature on relevant criteria for equipment selection: material, move, and method. The document proceeds to describe four MCDM techniques in detail: Analytic Hierarchy Process (AHP), Fuzzy Analytic Hierarchy Process (FAHP), Technique for Order Preference by Similarity to Ideal Solution (TOPSIS), and provides numerical examples of applying each technique to different shops (body, paint, trim, final assembly) to determine the best material handling equipment.
Analyzing the indicators walkability of cities, in order to improving urban ...IJMER
1) The document examines the walkability of an urban highway in Mashhad, Iran in order to improve urban vitality.
2) A survey was conducted and SWOT analysis was used to analyze the results. The SWOT revealed strengths like a dedicated path for pedestrians but also weaknesses like a narrow sidewalk, inadequate lighting, and an unsafe underground space.
3) Recommendations are proposed to address problems like air and noise pollution and improve the urban space quality, identity and vitality along the highway.
Complex test pattern generation for high speed fault diagnosis in Embedded SRAMIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
This study analyzed the water susceptible properties of silt loam subgrade soils in southwest Pennsylvania. Laboratory tests were conducted on 20 soil samples to determine properties like natural moisture content, optimum moisture content, compaction, CBR soaked and unsoaked, and unconfined compression strength. Regression analyses found correlations between various properties. For example, clay content was directly proportional to natural moisture content, void ratio was directly proportional to maximum dry density, and swell percentage was inversely proportional to CBR soaked and unsoaked. The results provide relationships to predict soil performance based on water absorption characteristics.
This document summarizes an experimental investigation of performance parameters of a single cylinder internal combustion (IC) engine using mustard oil biodiesel. The researchers prepared biodiesel from mustard oil through a transesterification process and tested blends of 10-50% biodiesel with diesel. Test results showed that biodiesel blends had higher density and viscosity than diesel. Fuel consumption was also slightly higher for biodiesel blends due to their lower energy content. B10 and B20 blends performed most similar to diesel in terms of brake specific fuel consumption.
This document summarizes a study that analyzed the stresses in a flywheel design using finite element analysis. It describes modeling a Maruti 800 flywheel in CATIA and analyzing it in ANSYS. Two materials were considered - gray cast iron and S-glass epoxy. The flywheel was meshed and appropriate boundary conditions were applied. The results found the maximum normal stress to be 44.07 MPa for gray cast iron and 11.54 MPa for S-glass epoxy. The study demonstrated using FEA to optimize flywheel design and select suitable materials.
Structural Behaviour of Fibrous Concrete Using Polypropylene FibresIJMER
The document summarizes an experimental investigation into the effects of adding polypropylene fibers in varying amounts (0.1-0.4%) along with 0.8% steel fibers to concrete. The main findings are:
1) Adding up to 0.2% polypropylene fibers resulted in a small increase in compressive strength of around 7.5%, but more than 0.2% caused a decrease.
2) Tensile strength measures (split tensile and flexural strength) increased significantly, by up to 47-50%, with an optimum of 0.3% polypropylene fibers.
3) Stress-strain testing showed fibers increased failure strains and the area under
This document discusses a mobile app called "Road Factor" that uses GPS to provide information on road conditions. It allows users to view details of the road they are currently on, like when it was last resurfaced. Government agencies can use the data to monitor roads and make planning/budget decisions to improve road maintenance. The app aims to help build better transportation infrastructure and facilitate governance through electronic monitoring of roadwork. It connects to a centralized database containing road condition details for cities across India.
A Study of Different Partitioning Clustering Techniqueijsrd.com
In the field of software, Data mining is very useful to identify the interesting patterns and trends from the large amount of stored data into different database and data repository. Clustering technique is basically used to extract the unknown pattern from the large set of data for electronic stored data, business and real time applications. Clustering is a division of data into different groups. Data are grouped into clusters with high intra group similarity and low inter group similarity [2]. Clustering is an unsupervised learning technique. Clustering is useful technique that applied into many areas like marketing studies, DNA analysis, text mining and web documents classification. In the large database, the clustering task is very complex with many attributes. There are many methods to deal with these problems. In this paper we discuss about the different Partitioning Based Methods like- K-Means, K-Medoids and Fuzzy K-Means and compare the advantages or disadvantages over these techniques.
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
This document describes a new proposed symmetric key encryption algorithm. It begins with background on cryptography and then describes the new algorithm. The algorithm encrypts text by taking the ASCII value of each character, reversing the 8-bit binary representation, dividing this by a 4-digit key, and storing the remainder in the first 3 digits and quotient in the next 5 digits to form the ciphertext. It provides an example of encrypting the character 'T' using this process. The document suggests this algorithm is easy to implement and more secure than existing algorithms due to using a reversal operation during encryption.
Encryption is a fundamental concept in cryptography that involves the process of converting plaintext (readable and understandable data) into ciphertext (encoded and unintelligible data) using a mathematical algorithm and an encryption key. The primary purpose of encryption is to ensure the confidentiality and privacy of sensitive information during transmission or storage.
In the encryption process:
1. **Plaintext:** This is the original, readable data that is to be protected. It could be a message, a file, or any form of digital information.
2. **Encryption Algorithm:** An encryption algorithm is a set of mathematical rules and procedures that transform the plaintext into ciphertext. Common encryption algorithms include Advanced Encryption Standard (AES), RSA, and Triple DES.
3. **Encryption Key:** The encryption key is a piece of information used by the encryption algorithm to perform the transformation. The key determines the specific pattern and method by which the plaintext is converted into ciphertext. The strength of the encryption often depends on the length and randomness of the key.
4. **Ciphertext:** This is the result of the encryption process—the transformed and encoded data that appears random and is indecipherable without the corresponding decryption key.
Encryption serves several important purposes in the field of cryptography:
- **Confidentiality:** The primary goal of encryption is to keep information confidential and secure from unauthorized access. Even if an unauthorized party intercepts the ciphertext, they should be unable to understand or decipher it without the correct decryption key.
- **Integrity:** Encryption helps ensure the integrity of data by providing a means to detect any unauthorized modifications. If the ciphertext is altered, the decryption process will produce incorrect results, alerting the recipient to potential tampering.
- **Authentication:** In some encryption scenarios, the use of digital signatures or authenticated encryption helps verify the origin and authenticity of the encrypted data.
- **Secure Communication:** Encryption is widely used to secure communication over networks, such as the internet. Protocols like HTTPS (HTTP Secure) use encryption to protect the confidentiality of data transmitted between a web browser and a web server.
- **Data-at-Rest Protection:** Encryption is applied to data stored on devices or servers, ensuring that even if physical access is gained, the data remains protected from unauthorized viewing.
In summary, encryption is a crucial tool in the field of cryptography, providing a means to safeguard the confidentiality, integrity, and authenticity of sensitive information in various digital environments.
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
This document discusses achieving data integrity through digital signatures using the RSA and SHA-1 algorithms. It first provides background on data integrity and cryptography. It then explains the RSA algorithm for public key encryption and digital signatures. The document describes an implementation of RSA and SHA-1 to encrypt messages and generate message digests at the sender and receiver ends to verify data integrity by ensuring the digests match. Graphical interfaces are provided to enhance understanding and the system is designed with client and server architecture to demonstrate the process across different computers.
Cryptography is the study of securing communication and information. It uses protocols, algorithms, and strategies to hide sensitive information from unauthorized access and enable verification of every component of a communication. The primary functions of cryptography are privacy, authentication, integrity, non-repudiation, and key exchange. While cryptography provides advantages in security and verification, it also has limitations such as vulnerability to brute force attacks and risk of losing access to data if secret keys are lost.
The document discusses encryption technology and its importance for securing electronic data. It describes how encryption works using encryption keys to scramble plaintext into ciphertext. Symmetric key algorithms like DES and asymmetric key algorithms like RSA are explained. The document also covers digital signatures, latest encryption methods like virtual matrix encryption, and quantum cryptography. It concludes that encryption technology is an emerging field with better, more secure algorithms being developed to transfer information securely over networks.
This document provides an overview of cryptography, including its history, applications, challenges, and references. It discusses cryptography concepts like ciphertext, plaintext, keys, symmetric and asymmetric algorithms. It covers security requirements like confidentiality, integrity, and authentication. Applications mentioned include protecting ATM transactions, smart cards, cryptography application blocks, and watermarking. Challenges discussed include potential loss of privacy as networks become more digital. Cryptography plays an important role in security for business, e-commerce, banking, the military, and more.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
This document presents information on cryptography. It begins with an introduction to cryptography and its importance for secure internet communications. It then defines cryptography as the practice of hiding information by converting it into unintelligible data and back again. The document outlines some of the main benefits of cryptography including confidentiality, authentication, data integrity, and non-repudiation. It also notes some drawbacks such as reduced availability and additional costs. The document describes the main purposes of cryptography as authentication, privacy, integrity, and non-repudiation. It provides an overview of the architecture of cryptography and the main types: secret key cryptography and public key cryptography. It concludes by noting that different algorithms are used to provide security depending on requirements.
This document presents information on cryptography. It begins with an introduction to cryptography and its importance for secure internet communications. It then defines cryptography as the practice of hiding information and converting intelligible data into unintelligible data. The document outlines some of the main benefits of cryptography including confidentiality, authentication, data integrity, and non-repudiation. It also lists some drawbacks such as reduced availability and increased costs. It describes the main purposes of cryptography as authentication, privacy, integrity, and non-repudiation. It provides an overview of the architecture of cryptography and the main types: secret key cryptography and public key cryptography. It concludes that different algorithms are used to provide security services and that private and public key cryptography are used
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
Cryptography defines different methods and technologies used in ensuring communication between two parties over any communication medium is secure, especially in presence of a third part. This is achieved through the use of several methods, such as encryption, decryption, signing, generating of pseudo-random numbers, among many others. Cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. This is made possible using two classes of key-based encryption and decryption algorithms, namely symmetric and asymmetric algorithms. The best known and the most widely used public key system is RSA. This algorithm comprises of three phases, which are the key generation phase, encryption phase, and the decryption phase. Owing to the advancement in computing technology, RSA is prone to some security risks, which makes it less secure. The following paper preview different proposals on different methods used to enhance the RSA algorithm and increase its security. Some of these enhancements include combining the RSA algorithm with Diffie-Hellman or ElGamal algorithm, modification of RSA to include three or four prime numbers, offline storage of generated keys, a secured algorithm for RSA where the message can be encrypted using dual encryption keys, etc.
This document discusses network security and provides information on several related topics in 3 paragraphs or less:
It begins with an overview of a general model for network security that involves designing secure algorithms, generating and distributing secret information, and specifying communication protocols. It then explains the principles of symmetric and asymmetric cryptography, noting examples like AES and RSA. The document concludes with a brief discussion of digital signatures and their importance in message authentication and ensuring data integrity.
Network security is important for business organizations and educational institutes to protect email communications, data distributions, stock trading, and distance learning from various threats like content theft, manipulation, masquerading, replay attacks, and denial of services. Cryptography provides security services like authentication, confidentiality, integrity, and access control through techniques like encryption, digital signatures, digital envelopes, and digital certificates to embed confidence in online activities like banking, trading, and purchases. Popular applications that use cryptography include PGP, IPsec, and SET, which aim to securely transmit information over the internet.
This document discusses digital signatures and their use for message authentication and integrity. It describes how digital signatures work using asymmetric cryptography like RSA, providing non-repudiation by tying a message to the private key of the signer. MAC techniques are also discussed but are limited by not providing non-repudiation. The RSA digital signature scheme is then outlined, including key generation, signing messages, and verification. Applications of digital signatures are mentioned for email, data storage, payments, and software distribution.
This document discusses securely sharing data in multi-owner cloud environments for dynamic groups. It proposes a method for securely sharing data files with other users in a group on an untrusted cloud. The method supports dynamic groups where new users can access files uploaded before joining without contacting owners. User revocation is achieved through a revocation list without updating other users' secret keys. Encryption overhead is constant, independent of revoked users. The scheme provides secure access control and preserves user privacy by hiding identities from the cloud.
The document discusses cryptography and its applications in security. It covers topics like encryption, decryption, digital signatures, hash algorithms, and their roles in providing confidentiality, integrity and authentication. It also discusses challenges like protecting ATM transactions and discusses the role of cryptography in applications like smart cards, secure cryptoprocessors and watermarking. In the end, it emphasizes the growing importance of cryptography in ensuring privacy and security in the digital world.
Cryptography is used to provide security goals like confidentiality, integrity, authentication and non-repudiation. It involves encryption of messages using algorithms and keys. Symmetric key cryptography uses a shared secret key while public key cryptography uses separate public and private keys. Cryptographic protocols specify the steps entities take to achieve security objectives like key exchange and authentication. Cryptanalysis involves techniques to break cryptographic systems and protocols.
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
This document summarizes research on the fabrication and characterization of bio-composite materials using sunnhemp fibre. The document discusses how sunnhemp fibre was used to reinforce an epoxy matrix through hand lay-up methods. Various mechanical properties of the bio-composites were tested, including tensile, flexural, and impact properties. The results of the mechanical tests on the bio-composite specimens are presented. Potential applications of the sunnhemp fibre bio-composites are also suggested, such as in fall ceilings, partitions, packaging, automotive interiors, and toys.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
This document discusses integrating the Spring, Struts, and Hibernate frameworks to develop enterprise applications. It provides an overview of each framework and their features. The Spring Framework is a lightweight, modular framework that allows for inversion of control and aspect-oriented programming. It can be used to develop any or all tiers of an application. The document proposes an architecture for an e-commerce website that integrates these three frameworks, with Spring handling the business layer, Struts the presentation layer, and Hibernate the data access layer. This modular approach allows for clear separation of concerns and reduces complexity in application development.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
This document introduces and studies the concept of δˆ s-locally closed sets in ideal topological spaces. Some key points:
- A subset A is δˆ s-locally closed if A can be written as the intersection of a δˆ s-open set and a δˆ s-closed set.
- Various properties of δˆ s-locally closed sets are introduced and characterized, including relationships to other concepts like generalized locally closed sets.
- It is shown that a subset A is δˆ s-locally closed if and only if A can be written as the intersection of a δˆ s-open set and the δˆ s-closure of A.
- Theore
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
This document discusses natural language ambiguity and its effect on machine learning. It begins by introducing different types of ambiguity that exist in natural languages, including lexical, syntactic, semantic, discourse, and pragmatic ambiguities. It then examines how these ambiguities present challenges for computational linguistics and machine translation systems. Specifically, it notes that ambiguity is a major problem for computers in processing human language as they lack the world knowledge and context that humans use to resolve ambiguities. The document concludes by outlining the typical process of machine translation and how ambiguities can interfere with tasks like analysis, transfer, and generation of text in the target language.
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
This document describes the implementation of an I2C slave interface using Verilog HDL. It introduces the I2C protocol which uses only two bidirectional lines (SDA and SCL) for communication. The document discusses the I2C protocol specifications including start/stop conditions, addressing, read/write operations, and acknowledgements. It then provides details on designing an I2C slave module in Verilog that responds to commands from an I2C master and allows synchronization through clock stretching. The module is simulated in ModelSim and synthesized in Xilinx. Simulation waveforms demonstrate successful read and write operations to the slave device.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Discrete Model of Two Predators competing for One Prey
Ao318992
1. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-89-92 ISSN: 2249-6645
Cryptanalysis of Signcryption Protocols Based On Elliptic Curve
Sumanjit Das1, Prasant Kumar Sahoo2
1(Department of Computer Science and Engineering, Centurion University of Technology & Management, India)
2 (Department of Computer Science and Engineering, Subas Institute of Technology, India)
ABSTRACT: The security of data become a major issue in the present days, there are different dimensions of security in
this paper we will discuss one of the major properties of security. The signcryption is one of the techniques to secure your
data by encrypting it. It was first introduced by Zheng in 1997 based on DLP. The signcryption combines the techniques of
digital signature and encryption which reduces computational cost and communication overhead. The Signcryption scheme
verifies the integrity of message before decryption of cipher text it also provides how the message can be verify by third party
without reading the content of message. Many researchers have given their signcryption scheme to achieve security goals
like confidentiality, unforgeability, integrity, forward secrecy and public verification every scheme is having their own
limitations. This paper represents the cryptanalysis of popular signcryption scheme in terms of major security goals alpng
with the communication overhead and computational cost.
Keywords: ecc, forward secrecy, public verification, signcryption.
I. INTRODUCTION
The encryption of data and digital signature are two primary cryptographic tools that can guarantee the
unforgeability, integrity, and confidentiality of communications. In public key schemes, a traditional method is to digitally
sign a message then followed by an encryption algorithm (signature-then-encryption) that can have two problems: Low
efficiency and high cost of such summation, and the case that any arbitrary scheme cannot guarantee the security. The
signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of digital signature and
encryption in a single logical step and can effectively decrease the computational costs and communication overheads in
comparison with the traditional signature-then-encryption schemes [1, 2, and 7].
At the time of sending a message to a person over an anxious channel such as internet we must provide
confidentiality, integrity, authenticity and non-repudiation [1]. These are the four major security aspects [2] or goals. Before
the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption) conversion of messages
from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by
interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message). Encryption
was used to (attempt to) ensure secrecy in communications, such as those of spies, military leaders, and diplomats. In recent
decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking,
sender/receiver identity authentication, digital signatures, and interactive proofs and secure computation, among others. In
ancient times, the use of cryptography was restricted to a small community essentially forms by the military and secret
services. The keys were distributed secretly by a courier and the same key is used to encipher and decipher the message. We
have a number of encryption algorithms those can be broadly classified into two categories: Symmetric/Private key
encipherment and Asymmetric/Public key encipherment [3, 4].
In order to send a confidential letter in a way that it can't be forged, it has been a common practice for the sender of
the letter to be sign it, put it in an envelope and then seal it before handing it over to be delivered. Discovering public key
cryptography has made communication between people who have never met before over an open and insecure network such
as Internet [10], in a secure and authenticated way possible. Before sending a message the sender has to do the following:
1. Sign it using a digital signature scheme (DSS)
2. Encrypt the message and the signature using a private key encryption algorithm under randomly chosen encryption key
3. Encrypt the random message encryption key using receiver's public key
4. Send the message following steps 1 to 3
This approach is known as “Signature-Then-Encryption ". It can be shown in the following Fig-1
www.ijmer.com 89 | Page
2. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-89-92 ISSN: 2249-6645
II. SIGNCRYPTION
In the case of public-key cryptography, confidentiality is provided by encryption schemes, while authenticity is
provided by signature schemes. In many applications, both confidentiality and authenticity are needed together. Such
applications include secure email (S/MIME), secure shell (SSH), and secure web browsing (HTTPS). Until recently, the de
facto solution was to use both an encryption scheme and a signature scheme, typically by sequentially composing the
encryption and signature operations. This state of affairs changed in 1997, when Zheng [15] proposed using a single
cryptographic primitive to achieve both confidentiality and authenticity. He called this primitive signcryption. At first
glance, it is not clear why there should be any advantage to combining both goals into a single primitive. However, Zheng
and others have demonstrated, through concrete examples, that signcryption schemes can provide clear benefits over the
traditional sequential composition of encryption and signature schemes.
Public Parameter:
C: an elliptic curve of GF (ph), either with p≥2 150 and h=1 or p=2 and & h≥150.
Q: a large prime number whose size is approximately |ph|.
G: a point with order q, chosen randomly from the points on C.
Hash: a one-way hash function output of 128 bits at least.
KH: a keyed one-way hash function.
ED: the encryption and decryption algorithm of a private key cipher.
Alice’s key:
Va: Alice’s private key, chosen uniformly at random from [1….q-1].
Pa: Alice’s public key (Pa=VaG, a point on C).
Bob’s Key:
Vb: Bob’s private key, chosen uniformly at random from [1….q-1].
Pb: Bob’s public key (Pb=VbG, a point on C).
III. SECURITY GOAL
Confidentiality:
Confidentiality is achieved by encryption. To decrypt the cipher text(c), an adversary needs to have Bob's private
key. Which is the secret key of Bob and he will never disclose it. Therefore it is unknown to third party.
Unforgeability:
It is computationally infeasible to forge a valid signcrypted text (c, R, s) and claim that it is coming from Alice
without having Alice's private key. The private key of Alice is unknown to third party. The computation process of R and s is
very difficult and infeasible to guess the solution of signcryption text.
www.ijmer.com 90 | Page
3. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-89-92 ISSN: 2249-6645
Non-repudiation:
If the sender Alice denies that she sent the signcrypted text (c, R, s), any third party can run the verification
procedure above to check that the message came from Alice.
Public verifiability:
Verification requires knowing only Alice's public key. All public keys are assumed to be available to all system
users through a certification authority or published directly. The receiver of the message does not need to engage in a zero-
knowledge proof communication with a judge or to provide a proof.
Forward secrecy:
An adversary that obtains Private Key of receiver will not be able to decrypt past messages. Previously recorded
values of (c, R, s) that were obtained before the compromise cannot be decrypted because the adversary that has Private Key
will need to calculate r to decrypt. Calculating r requires solving the ECDLP on R, which is a computationally difficult.
Encrypted message authentication:
The proposed scheme enables a third party to check the authenticity of the signcrypted text (c, R, s) without having
to reveal the plaintext m to the third party. This property enables firewalls on computer networks to filter traffic and forward
encrypted messages coming from certain senders without decrypting the message. This provides speed to the filtering
process as the firewalls do not need to do full unsigncryption to authenticate senders. It also provides additional
confidentiality in settling disputes by allowing any trusted/untrusted judge to verify messages without revealing the sent
message m to the judge by running verification process as follows[15,17].
As the signcrypted text computed by the help of Alice’s public key P a and the IDA can be verify by certificate
Authority (CA). Therefore we can say the message is coming from Alice without decrypting the original message and which
is authentic sender.
IV. ANALYSIS OF SIGNCRYPTION SCHEME
Comparisons based on securities properties: Table-1 [13, 17]
Confidentiality Integrity Unforgeability Forward Public
Security verification
Zheng and Yes Yes Yes No No
Imai
Bao & Deng Yes Yes Yes No Yes
Gamage et al Yes Yes Yes No Yes
Jung et al. Yes Yes Yes Yes No
Computational Complexity:
Elliptic curve point operations are time consuming process. The propose signcryption scheme is having three point
multiplication for signcryption, two point multiplication for unsigncryption and one point addition, for verification it requires
one point multiplication and one point addition. The table 2 gives the details of comparison with the existing schemes and
proposed scheme. [13]
Table 2: comparison of schemes on basis of computational complexity
Schemes Participant ECPM ECPA Mod. Mul Mod. Add Hash
Zheng & Imai Alice 1 - 1 1 2
Bob 2 1 2 - 2
Han et al Alice 2 - 2 1 2
Bob 3 1 2 - 2
Hwang et al Alice 2 - 1 1 1
Bob 3 1 - - 1
Table 3: comparison based on average computational time of major operation in same secure level the elliptic curve
multiplication only needs 83ms & the modular exponential operation takes 220 ms for average computational time in
infineon’s SLE66CU* 640P security controller.[15]
Schemes Sender average. Recipient average
computational time in ms computational time in ms
Zheng & Imai 1* 83=83 2*83=166
Bao & Deng 2*220=440 3*220=660
Gamage et al 2*220=440 3*220=660
www.ijmer.com 91 | Page
4. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.1, Jan-Feb. 2013 pp-89-92 ISSN: 2249-6645
Jung et al 2*220=440 3*220=660
V. CONCLUSION
The security of zheng & Imai, Bao & Deng, Gamage et al, Jung et al and Han et al.'s signcryption scheme [11, 8,
5] are analyzed on basics of security goal, communication overhead and computational cost. All the schemes are satisfying
all the properties of security. The signcryption schemes by Bao & Deng and Gamage et al are having public verification but
no forward secrecy. Similarly the Zheng & Imai not supports the forward secrecy and public verification [8] where as the
Jung et al scheme supports forward secrecy but can’t verifiable by public[9, 11, 13]. In terms of computational cost the
Zheng & Imai scheme take less time in comparison with Bao & Deng, Gamage et al and Jung et al signcryption schemes
[13]. A signcrypton scheme can be developed which will provide all the properties of security.
Reference
[1] Yuliang Zheng. Digital signcryption or how to achieve cost (signature encryption) Cost (signature), Cost (encryption). In CRYPTO
'97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pages 165-179, London, UK,
1997. Springer-Verlag.
[2] William Stallings. Cryptography and Network security: Principles and Practices. Prentice Hall Inc., second edition, 1999.
[3] Paul C. van Oorschot Alfred J. Menezes and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press,1996.
[4] Behrouz A. Forouzan. Cryptography and Network Security. Tata McGraw-Hill, 2007.
[5] F. Bao, R.H. Deng, “A signcryption scheme with signature directly verifiable by public key”, Proceedings of PKC’98, LNCS 1431,
Springer-Verlag, 1998, pp. 55–59.
[6] LEI Feiyu, CHEN Wen, CHEN Kefei, “A generic solution to realize public verifiability of signcryption”, Wuhan University Journal
of Natural Sciences, Vol. 11, No. 6, 2006, 1589-1592.
[7] Mohsen Toorani and Ali Asghar Beheshti Shirazi. Cryptanalysis of an efficient signcryption scheme with forward secrecy based on
elliptic curve. Computer and Electrical Engineering, International Conference on, 428-432, 2008.
[8] Yuliang Zheng and Hideki Imai. How to construct efficient signcryption schemes on elliptic curves. Inf. Process. Lett., 68(5):227-
233, 1998.
[9] Jung.H.Y,K.S Chang, D.H Lee and J.I. Lim, Signcryption scheme with forward secrecy. Proceeding of Information Security
Application-WISA, Korea, 403-475, 2001.
[10] Gamage, C., J.Leiwo, Encrypted message authentication by firewalls. Proceedings of International Workshop on Practice of Theory
in Public Key Cryptography, Berlin, 69-81, 1999.
[11] X. Yang Y. Han and Y. Hu. Signcryption based on elliptic curve and its multi-party schemes. Proceedings of the 3rd ACM
International Conference on Information Security (InfoSecu 04), pages 216-217, 2004.
[12] Henri Cohen and Gerhard Frey, editors. Handbook of elliptic and hyperelliptic curve cryptography. CRC Press, 2005.
[13] Mohsen Toorani and Ali Asghar Beheshti Shirazi. An elliptic curve-based signcryption scheme with forward secrecy. Journal of
Applied Sciences, 9(6):1025 -1035, 2009.
[14] G. Seroussi. Elliptic curve cryptography. page 41, 1999.
[15] Hwang Lai Su. An efficient signcryption scheme with forward secrecy based on elliptic curve. Journal of applied mathematics and
computation, pages 870-881, 2005.
[16] Mohsen Toorani and Ali Asghar Beheshti Shirazi. Cryptanalysis of an elliptic curve-based signcryption scheme. International
journal of network security vol.10, pp 51-56, 2010.
[17] Wang Yang and Zhang. Provable secure generalized signcryption. Journal of computers, vol.5, pp 807-814, 2010.
www.ijmer.com 92 | Page