The main object of this paper is to present a mutual authentication protocol that guarantees security, integrity and authenticity of messages, transferred over a network system. In this paper a symmetric key cryptosystem, that satisfies all the above requirements, is developed using theorems of J.R. Chen, I.M. Vinogradov and Fermat and the decimal expansion of an irrational number.
Cryptosystem An Implementation of RSA Using Verilogijcncs
This document describes an implementation of the RSA cryptosystem using Verilog for an FPGA. It presents the design of modules for key generation, encryption, and decryption. For key generation, it generates random prime numbers using an LFSR and primality tester, then calculates the public and private keys. Encryption and decryption are performed through modular exponentiation implemented with a right-to-left binary method. The modules are coded in Verilog and synthesized for an FPGA to provide a secure cryptosystem.
This document summarizes a research paper on a Probabilistic Data Encryption Scheme (PDES). The paper presents a probabilistic encryption scheme that combines the security of Goldwasser and Micali's probabilistic encryption with the efficiency of deterministic schemes. The scheme is based on the assumption that solving the quadratic residuacity problem is computationally infeasible without knowing the factorization of the composite integer. An example is provided to illustrate how the encryption and decryption algorithms work using quadratic residues modulo a composite integer. The paper concludes that the scheme provides semantic security similar to Goldwasser-Micali under the assumption that the quadratic residuacity problem is hard.
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...csandit
Fault tolerance and data security are two important issues in modern communication systems.
In this paper, we propose a secure and efficient digital signature scheme with fault tolerance
based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains
three prime numbers and overcome several attacks possible on RSA. By using the Chinese
Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption
side and it provides high security also.
The document discusses stream ciphers and block ciphers. It explains that stream ciphers encrypt data bit-by-bit or byte-by-byte, requiring a randomly generated keystream, while block ciphers encrypt fixed-length blocks, allowing for broader applications. It then focuses on the Feistel cipher structure for block ciphers, proposed by Feistel to approximate an ideal block cipher for large block sizes. The Feistel structure uses a product cipher approach involving substitutions and permutations to provide diffusion and confusion and resist statistical cryptanalysis.
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
The Hill cipher algorithm is one of the symmetric
key algorithms that have several advantages in data
encryption. But, the inverse of the key matrix used for
encrypting the plaintext does not always exist. Then if the
key matrix is not invertible, then encrypted text cannot be
decrypted. In the Involutory matrix generation method the
key matrix used for the encryption is itself invertible. So, at
the time of decryption we need not to find the inverse of the
key matrix. The objective of this paper is to encrypt an
image using a technique different from the conventional Hill
Cipher. In this paper a novel advanced Hill (AdvHill)
encryption technique has been proposed which uses an
involutory key matrix. The scheme is a fast encryption
scheme which overcomes problems of encrypting the images
with homogeneous background. A comparative study of the
proposed encryption scheme and the existing scheme is
made. The output encrypted images reveal that the
proposed technique is quite reliable and robust.
1. Digital signatures provide authentication of digital documents by using asymmetric cryptography techniques. A digital signature is generated using a private key and can be verified by anyone using the corresponding public key.
2. There are various types of attacks against digital signature schemes like key-only attacks, generic chosen message attacks, and adaptive chosen message attacks. The security goals are to prevent total key breaks or the ability to forge signatures selectively or existentially.
3. A secure digital signature scheme must produce signatures that depend on the message, use secret information to prevent forgery and denial, be efficient to generate and verify, and make forgery computationally infeasible. Timestamps can be included to require message freshness.
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMIJNSA Journal
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant a variant of Matsumoto Imai cryptosystem C*. However Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In this paper we propose a cryptosystem Little Dragon Two which is as efficient as Little Dragon cryptosystem but secure against all the known attacks. Like Little Dragon cryptosystem the public key of Little Dragon Two is mixed type that is quadratic in plaintext and cipher text variables. So the public key size of Little Dragon Two is equal to Little Dragon Cryptosystem. Our public key algorithm is bijective and can be used for both encryption and signatures.
Message Embedded Cipher Using 2-D Chaotic Mapijccmsjournal
This paper constructs two encryption methods using 2-D chaotic maps, Duffings and Arnold’s cat maps
respectively. Both of the methods are designed using message embedded scheme and are analyzed for
their validity, for plaintext sensitivity, key sensitivity, known plaintext and brute-force attacks. Due to the
less key space generally many chaotic cryptosystem developed are found to be weak against Brute force
attack which is an essential issue to be solved. For this issue, concept of identifiability proved to be a
necessary condition to be fulfilled by the designed chaotic cipher to resist brute force attack, which is a
basic attack. As 2-D chaotic maps provide more key space than 1-D maps thus they are considered to be
more suitable. This work is accompanied with analysis results obtained from these developed cipher.
Moreover, identifiable keys are searched for different input texts at various key values.
Cryptosystem An Implementation of RSA Using Verilogijcncs
This document describes an implementation of the RSA cryptosystem using Verilog for an FPGA. It presents the design of modules for key generation, encryption, and decryption. For key generation, it generates random prime numbers using an LFSR and primality tester, then calculates the public and private keys. Encryption and decryption are performed through modular exponentiation implemented with a right-to-left binary method. The modules are coded in Verilog and synthesized for an FPGA to provide a secure cryptosystem.
This document summarizes a research paper on a Probabilistic Data Encryption Scheme (PDES). The paper presents a probabilistic encryption scheme that combines the security of Goldwasser and Micali's probabilistic encryption with the efficiency of deterministic schemes. The scheme is based on the assumption that solving the quadratic residuacity problem is computationally infeasible without knowing the factorization of the composite integer. An example is provided to illustrate how the encryption and decryption algorithms work using quadratic residues modulo a composite integer. The paper concludes that the scheme provides semantic security similar to Goldwasser-Micali under the assumption that the quadratic residuacity problem is hard.
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...csandit
Fault tolerance and data security are two important issues in modern communication systems.
In this paper, we propose a secure and efficient digital signature scheme with fault tolerance
based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains
three prime numbers and overcome several attacks possible on RSA. By using the Chinese
Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption
side and it provides high security also.
The document discusses stream ciphers and block ciphers. It explains that stream ciphers encrypt data bit-by-bit or byte-by-byte, requiring a randomly generated keystream, while block ciphers encrypt fixed-length blocks, allowing for broader applications. It then focuses on the Feistel cipher structure for block ciphers, proposed by Feistel to approximate an ideal block cipher for large block sizes. The Feistel structure uses a product cipher approach involving substitutions and permutations to provide diffusion and confusion and resist statistical cryptanalysis.
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
The Hill cipher algorithm is one of the symmetric
key algorithms that have several advantages in data
encryption. But, the inverse of the key matrix used for
encrypting the plaintext does not always exist. Then if the
key matrix is not invertible, then encrypted text cannot be
decrypted. In the Involutory matrix generation method the
key matrix used for the encryption is itself invertible. So, at
the time of decryption we need not to find the inverse of the
key matrix. The objective of this paper is to encrypt an
image using a technique different from the conventional Hill
Cipher. In this paper a novel advanced Hill (AdvHill)
encryption technique has been proposed which uses an
involutory key matrix. The scheme is a fast encryption
scheme which overcomes problems of encrypting the images
with homogeneous background. A comparative study of the
proposed encryption scheme and the existing scheme is
made. The output encrypted images reveal that the
proposed technique is quite reliable and robust.
1. Digital signatures provide authentication of digital documents by using asymmetric cryptography techniques. A digital signature is generated using a private key and can be verified by anyone using the corresponding public key.
2. There are various types of attacks against digital signature schemes like key-only attacks, generic chosen message attacks, and adaptive chosen message attacks. The security goals are to prevent total key breaks or the ability to forge signatures selectively or existentially.
3. A secure digital signature scheme must produce signatures that depend on the message, use secret information to prevent forgery and denial, be efficient to generate and verify, and make forgery computationally infeasible. Timestamps can be included to require message freshness.
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMIJNSA Journal
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant a variant of Matsumoto Imai cryptosystem C*. However Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In this paper we propose a cryptosystem Little Dragon Two which is as efficient as Little Dragon cryptosystem but secure against all the known attacks. Like Little Dragon cryptosystem the public key of Little Dragon Two is mixed type that is quadratic in plaintext and cipher text variables. So the public key size of Little Dragon Two is equal to Little Dragon Cryptosystem. Our public key algorithm is bijective and can be used for both encryption and signatures.
Message Embedded Cipher Using 2-D Chaotic Mapijccmsjournal
This paper constructs two encryption methods using 2-D chaotic maps, Duffings and Arnold’s cat maps
respectively. Both of the methods are designed using message embedded scheme and are analyzed for
their validity, for plaintext sensitivity, key sensitivity, known plaintext and brute-force attacks. Due to the
less key space generally many chaotic cryptosystem developed are found to be weak against Brute force
attack which is an essential issue to be solved. For this issue, concept of identifiability proved to be a
necessary condition to be fulfilled by the designed chaotic cipher to resist brute force attack, which is a
basic attack. As 2-D chaotic maps provide more key space than 1-D maps thus they are considered to be
more suitable. This work is accompanied with analysis results obtained from these developed cipher.
Moreover, identifiable keys are searched for different input texts at various key values.
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...ijcisjournal
Integral attack is a powerful method to recover the secret key of block cipher by exploiting a characteristic that a set of outputs after several rounds encryption has ( integral distinguisher). Recently, Todo proposed a new algorithm to construct integral distinguisher with division property. However, the existence of integral distinguisher which holds in additional rounds can not be denied by the algorithm. On the contrary, we take an approach to obtain the number of rounds which integral distinguisher does not hold ( upper-bound integral distinguisher). The approach is based on algebraic degree estimation. We execute a random search for a term which has a degree equals the number of all inputted variables. We propose an algorithm and apply it to PRESENT and RECTANGLE. Then, we confirm that there exists no 8-round integral distinguisher in PRESENT and no 9-round integral distinguisher in RECTANGLE. From the facts, integral attack for more than 11-round and 13-round of PRESENT and RECTANGLE is infeasible, respectively.
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENTijcisjournal
In this paper, we consider an RSA modulus N=pq, where the prime factors p, q are of the same size. We
present an attack on RSA when the decryption exponent d is in the form d=Md1+d0 where M is a given
positive integer and d1 and d0 are two suitably small unknown integers. In 1999, Boneh and Durfee
presented an attack on RSA when
0.292 d < N . When d=Md1+d0, our attack enables one to overcome
Boneh and Durfee's bound and to factor the RSA modulus
In this work a method for video streaming authentication based on butterfly graphs is presanted. As well as other methods variables such as the sender delay, receiver delay, computation overhead, communication overhead, robustness against packet loss, should be considered. The aim of this work is improvement of communication overhead as an important parameter, in networks which packet loss ratio is random and burst. For this purpose we develop butterfly graph to increase authentication probability.
This document discusses using threshold cryptography and maximum distance separable (MDS) codes for key management in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and the need for distributed key management approaches. It then provides background on threshold cryptography and MDS codes. The document proposes using threshold cryptography combined with MDS codes to create a distributed cooperative key management system for MANETs that generates and distributes encryption keys among network nodes in a secure and fault-tolerant manner.
1) DES was adopted as a federal standard in 1977 and uses a 56-bit key to encrypt 64-bit blocks of data. It was based on the earlier Lucifer cipher developed by IBM but had a reduced key size to fit on a single chip.
2) Cryptanalysis techniques like differential cryptanalysis and linear cryptanalysis have demonstrated theoretical attacks on DES requiring as few as 247 chosen plaintexts, but collecting that many plaintext-ciphertext pairs would be impractical.
3) DES is now considered insecure due to the reduced key size and demonstrated attacks breaking it in a matter of days using specialized hardware, prompting the development of alternatives like AES and triple DES.
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
This document discusses the use of probability in cryptography. It begins with introductions to cryptography and probability. Key probability terms and concepts like events, sample spaces, and Markov models are defined. Public key cryptography using Fermat's Little Theorem is explained. Applications of probability in cryptography are explored, including checksums and the birthday problem, pseudo-random number generators, and code breaking using the Metropolis-Hastings algorithm. The document concludes that probability and cryptography are important fields that help secure communications and protect society from cyber attacks.
On the Usage of Chained Codes in CryptographyCSCJournals
This document summarizes a research paper on using randomized chained linear codes for digital signatures. The summary is:
1) Randomized chained linear codes are proposed to address attacks on previous signature schemes that used regular chained codes. Random vectors are concatenated to the generator matrix of a chained code to create randomized chained codes.
2) A digital signature scheme is presented that uses randomized chained codes. The private key consists of the generator matrix and randomization matrices. The public key is the randomized parity check matrix. Signatures are created using the chain code decoding algorithm.
3) Security analysis shows the scheme is secure if the code length is over 1350 bits, preventing an attacker from determining the private key from the public information
This document discusses message authentication and encryption. It explains that message authentication aims to protect integrity, validate originator identity, and enable non-repudiation. Message encryption provides authentication if symmetric encryption is used, while public-key encryption requires signing. Message authentication codes (MACs) and hash functions are also examined. The MD5 algorithm is summarized, which takes an input of arbitrary length and produces a 128-bit fingerprint.
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsEswar Publications
The available key agreement schemes using number theoretic, elliptic curves etc are common for cryptanalysts and associated security is vulnerable. This vulnerability further increases when we talk about modern efficient computers. So there is a need of providing new mechanism for key agreement with different properties so intruders get surprised and communication scenarios becomes stronger than before. In this paper, we propose a key agreement protocol which works in a non commutative group. We prove that our protocol meets the desired security attributes under the assumption that Conjugacy Search Problem and Decomposition Problem are hard in non commutative groups.
Elgamal signature for content distribution with network codingijwmn
This document proposes a scheme that uses ElGamal signature in network coding to enhance security. Network coding allows nodes to generate output packets as linear combinations of input packets. However, this makes the network vulnerable to pollution attacks where malicious nodes can insert corrupted packets. The proposed scheme signs data packets with ElGamal signatures. When nodes receive packets, they can verify the signatures' validity to check for corrupted packets without decoding. The scheme exploits the linearity of network coding and allows nodes to easily check packet integrity. An example is provided to demonstrate how the ElGamal signature scheme would work in the context of network coding for content distribution.
This document proposes using a genetic algorithm approach to parallelize cryptographic algorithms and identify encryption keys. It describes generating random numbers using a linear congruential equation, then applying crossover and mutation operators from genetic algorithms to the numbers. The encrypted data and key are transmitted over the network. Decryption reverses the encryption process. Testing on different core machines showed the parallelized encryption had faster execution times than serial encryption, with greater speedups on more cores. The authors conclude the genetic algorithm operators improve performance and security compared to other algorithms.
This document proposes a scalable authentication scheme for wireless sensor networks based on elliptic curve cryptography. The proposed scheme allows nodes to transmit an unlimited number of messages without suffering from the threshold problem that exists in polynomial-based schemes. It provides hop-by-hop authentication to verify messages as they are forwarded and also provides source privacy by anonymizing the message sender. Both theoretical analysis and simulation results show the proposed scheme has lower communication and computation overhead than polynomial-based schemes under comparable security levels, while providing source anonymity.
This document proposes a scalable authentication scheme for wireless sensor networks based on elliptic curve cryptography. The proposed scheme allows nodes to transmit an unlimited number of messages without suffering from the threshold problem that exists in polynomial-based schemes. It provides hop-by-hop authentication to verify messages as they are forwarded and also provides source privacy by anonymizing the message sender. Both theoretical analysis and simulation results show the proposed scheme has lower communication and computation overhead than polynomial-based schemes under comparable security levels, while providing source anonymity.
Topics listed below are explained in the PPT:
Introduction
CIA Triad
Mechanisms of Cryptography
OSI Security Architecture
Security Attacks
Security Mechanisms
Security Services
Cryptography vs Steganography
Network Security Model
Cryptographic techniques
Stream Cipher vs Block cipher
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...IJNSA Journal
Resource constraints of the nodes make security protocols difficult to implement. Thus key management is an important area of research in Wireless Sensor Networks (WSN). Key predistribution (kpd) which involves preloading keys in sensor nodes, has been considered as the best solution for key management when sensor nodes are battery powered and have to work unattended. This paper proposes a method to fix some loophole in an existing key predistribution scheme thereby enhancing the security of messages exchanged within a WSN. Here we use a model based on Reed Muller Codes to establish connectivity keys between sensor nodes. The model is then utilized to securely establish communication keys and exchange messages in a WSN designed on basis of two schemes using transversal designs for key predistribution. The combination of the key predistribution scheme and the connectivity model gives rise to highly resilient communication model with same connectivity between nodes as the chosen key predistribution scheme.
Searchable Encryption remain to be one of the most widely required functionality of cloud storage. In this paper, we provide a security analysis of the popular schemes including the study of their implementation and security definitions. We cover Order Preserving Symmetric Encryption, Order Revealing Encryption and Partial Order Preserving Encoding.
IRJET- Formulation of a Secure Communication Protocol and its ImplementationIRJET Journal
1) The document proposes a secure communication protocol using symmetric cryptography techniques like the Hill cipher and RSA algorithm.
2) The protocol uses the Goldbach conjecture and Chen's theorem to generate prime numbers from large even integers exchanged over a secure channel. These primes are then used to generate keys.
3) Plaintext is encrypted using matrix multiplication with keys generated from an irrational number's decimal expansion. Integrity is ensured by encrypting a message digest comprising words from the plaintext. Recipients can decrypt and verify integrity using the same techniques.
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
Secure communication of the sensitive information in disguised form to the genuine recipient so that an intended recipient alone can remove the disguise and recover the original message is the essence of Cryptography. Encrypting the message two or more times with different encryption techniques and with different keys increases the security levels than the single encryption. A cascade cipher is stronger than the first component. This paper presents multiple encryption schemes using different encryption techniques Braiding/Entanglement of Pauli Spin 3/2 matrices and Rotation of the bits with independent secret keys.
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
Secure communication of the sensitive information in disguised form to the genuine recipient so that an
intended recipient alone can remove the disguise and recover the original message is the essence of
Cryptography. Encrypting the message two or more times with different encryption techniques and with
different keys increases the security levels than the single encryption. A cascade cipher is stronger than the
first component. This paper presents multiple encryption schemes using different encryption techniques
Braiding/Entanglement of Pauli Spin 3/2 matrices and Rotation of the bits with independent secret keys.
The Security of Practical Quantum Key DistributionXequeMateShannon
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on the eavesdropper's power.
The first two sections provide a concise up-to-date review of QKD, biased toward the practical side. The rest of the paper presents the essential theoretical tools that have been developed to assess the security of the main experimental platforms (discrete variables, continuous variables and distributed-phase-reference protocols).
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...cscpconf
Fault tolerance and data security are two important issues in modern communication systems.
In this paper, we propose a secure and efficient digital signature scheme with fault tolerance
based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains
three prime numbers and overcome several attacks possible on RSA. By using the Chinese
Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption
side and it provides high security also.
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...ijcisjournal
Integral attack is a powerful method to recover the secret key of block cipher by exploiting a characteristic that a set of outputs after several rounds encryption has ( integral distinguisher). Recently, Todo proposed a new algorithm to construct integral distinguisher with division property. However, the existence of integral distinguisher which holds in additional rounds can not be denied by the algorithm. On the contrary, we take an approach to obtain the number of rounds which integral distinguisher does not hold ( upper-bound integral distinguisher). The approach is based on algebraic degree estimation. We execute a random search for a term which has a degree equals the number of all inputted variables. We propose an algorithm and apply it to PRESENT and RECTANGLE. Then, we confirm that there exists no 8-round integral distinguisher in PRESENT and no 9-round integral distinguisher in RECTANGLE. From the facts, integral attack for more than 11-round and 13-round of PRESENT and RECTANGLE is infeasible, respectively.
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENTijcisjournal
In this paper, we consider an RSA modulus N=pq, where the prime factors p, q are of the same size. We
present an attack on RSA when the decryption exponent d is in the form d=Md1+d0 where M is a given
positive integer and d1 and d0 are two suitably small unknown integers. In 1999, Boneh and Durfee
presented an attack on RSA when
0.292 d < N . When d=Md1+d0, our attack enables one to overcome
Boneh and Durfee's bound and to factor the RSA modulus
In this work a method for video streaming authentication based on butterfly graphs is presanted. As well as other methods variables such as the sender delay, receiver delay, computation overhead, communication overhead, robustness against packet loss, should be considered. The aim of this work is improvement of communication overhead as an important parameter, in networks which packet loss ratio is random and burst. For this purpose we develop butterfly graph to increase authentication probability.
This document discusses using threshold cryptography and maximum distance separable (MDS) codes for key management in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and the need for distributed key management approaches. It then provides background on threshold cryptography and MDS codes. The document proposes using threshold cryptography combined with MDS codes to create a distributed cooperative key management system for MANETs that generates and distributes encryption keys among network nodes in a secure and fault-tolerant manner.
1) DES was adopted as a federal standard in 1977 and uses a 56-bit key to encrypt 64-bit blocks of data. It was based on the earlier Lucifer cipher developed by IBM but had a reduced key size to fit on a single chip.
2) Cryptanalysis techniques like differential cryptanalysis and linear cryptanalysis have demonstrated theoretical attacks on DES requiring as few as 247 chosen plaintexts, but collecting that many plaintext-ciphertext pairs would be impractical.
3) DES is now considered insecure due to the reduced key size and demonstrated attacks breaking it in a matter of days using specialized hardware, prompting the development of alternatives like AES and triple DES.
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
This document discusses the use of probability in cryptography. It begins with introductions to cryptography and probability. Key probability terms and concepts like events, sample spaces, and Markov models are defined. Public key cryptography using Fermat's Little Theorem is explained. Applications of probability in cryptography are explored, including checksums and the birthday problem, pseudo-random number generators, and code breaking using the Metropolis-Hastings algorithm. The document concludes that probability and cryptography are important fields that help secure communications and protect society from cyber attacks.
On the Usage of Chained Codes in CryptographyCSCJournals
This document summarizes a research paper on using randomized chained linear codes for digital signatures. The summary is:
1) Randomized chained linear codes are proposed to address attacks on previous signature schemes that used regular chained codes. Random vectors are concatenated to the generator matrix of a chained code to create randomized chained codes.
2) A digital signature scheme is presented that uses randomized chained codes. The private key consists of the generator matrix and randomization matrices. The public key is the randomized parity check matrix. Signatures are created using the chain code decoding algorithm.
3) Security analysis shows the scheme is secure if the code length is over 1350 bits, preventing an attacker from determining the private key from the public information
This document discusses message authentication and encryption. It explains that message authentication aims to protect integrity, validate originator identity, and enable non-repudiation. Message encryption provides authentication if symmetric encryption is used, while public-key encryption requires signing. Message authentication codes (MACs) and hash functions are also examined. The MD5 algorithm is summarized, which takes an input of arbitrary length and produces a 128-bit fingerprint.
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsEswar Publications
The available key agreement schemes using number theoretic, elliptic curves etc are common for cryptanalysts and associated security is vulnerable. This vulnerability further increases when we talk about modern efficient computers. So there is a need of providing new mechanism for key agreement with different properties so intruders get surprised and communication scenarios becomes stronger than before. In this paper, we propose a key agreement protocol which works in a non commutative group. We prove that our protocol meets the desired security attributes under the assumption that Conjugacy Search Problem and Decomposition Problem are hard in non commutative groups.
Elgamal signature for content distribution with network codingijwmn
This document proposes a scheme that uses ElGamal signature in network coding to enhance security. Network coding allows nodes to generate output packets as linear combinations of input packets. However, this makes the network vulnerable to pollution attacks where malicious nodes can insert corrupted packets. The proposed scheme signs data packets with ElGamal signatures. When nodes receive packets, they can verify the signatures' validity to check for corrupted packets without decoding. The scheme exploits the linearity of network coding and allows nodes to easily check packet integrity. An example is provided to demonstrate how the ElGamal signature scheme would work in the context of network coding for content distribution.
This document proposes using a genetic algorithm approach to parallelize cryptographic algorithms and identify encryption keys. It describes generating random numbers using a linear congruential equation, then applying crossover and mutation operators from genetic algorithms to the numbers. The encrypted data and key are transmitted over the network. Decryption reverses the encryption process. Testing on different core machines showed the parallelized encryption had faster execution times than serial encryption, with greater speedups on more cores. The authors conclude the genetic algorithm operators improve performance and security compared to other algorithms.
This document proposes a scalable authentication scheme for wireless sensor networks based on elliptic curve cryptography. The proposed scheme allows nodes to transmit an unlimited number of messages without suffering from the threshold problem that exists in polynomial-based schemes. It provides hop-by-hop authentication to verify messages as they are forwarded and also provides source privacy by anonymizing the message sender. Both theoretical analysis and simulation results show the proposed scheme has lower communication and computation overhead than polynomial-based schemes under comparable security levels, while providing source anonymity.
This document proposes a scalable authentication scheme for wireless sensor networks based on elliptic curve cryptography. The proposed scheme allows nodes to transmit an unlimited number of messages without suffering from the threshold problem that exists in polynomial-based schemes. It provides hop-by-hop authentication to verify messages as they are forwarded and also provides source privacy by anonymizing the message sender. Both theoretical analysis and simulation results show the proposed scheme has lower communication and computation overhead than polynomial-based schemes under comparable security levels, while providing source anonymity.
Topics listed below are explained in the PPT:
Introduction
CIA Triad
Mechanisms of Cryptography
OSI Security Architecture
Security Attacks
Security Mechanisms
Security Services
Cryptography vs Steganography
Network Security Model
Cryptographic techniques
Stream Cipher vs Block cipher
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...IJNSA Journal
Resource constraints of the nodes make security protocols difficult to implement. Thus key management is an important area of research in Wireless Sensor Networks (WSN). Key predistribution (kpd) which involves preloading keys in sensor nodes, has been considered as the best solution for key management when sensor nodes are battery powered and have to work unattended. This paper proposes a method to fix some loophole in an existing key predistribution scheme thereby enhancing the security of messages exchanged within a WSN. Here we use a model based on Reed Muller Codes to establish connectivity keys between sensor nodes. The model is then utilized to securely establish communication keys and exchange messages in a WSN designed on basis of two schemes using transversal designs for key predistribution. The combination of the key predistribution scheme and the connectivity model gives rise to highly resilient communication model with same connectivity between nodes as the chosen key predistribution scheme.
Searchable Encryption remain to be one of the most widely required functionality of cloud storage. In this paper, we provide a security analysis of the popular schemes including the study of their implementation and security definitions. We cover Order Preserving Symmetric Encryption, Order Revealing Encryption and Partial Order Preserving Encoding.
IRJET- Formulation of a Secure Communication Protocol and its ImplementationIRJET Journal
1) The document proposes a secure communication protocol using symmetric cryptography techniques like the Hill cipher and RSA algorithm.
2) The protocol uses the Goldbach conjecture and Chen's theorem to generate prime numbers from large even integers exchanged over a secure channel. These primes are then used to generate keys.
3) Plaintext is encrypted using matrix multiplication with keys generated from an irrational number's decimal expansion. Integrity is ensured by encrypting a message digest comprising words from the plaintext. Recipients can decrypt and verify integrity using the same techniques.
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
Secure communication of the sensitive information in disguised form to the genuine recipient so that an intended recipient alone can remove the disguise and recover the original message is the essence of Cryptography. Encrypting the message two or more times with different encryption techniques and with different keys increases the security levels than the single encryption. A cascade cipher is stronger than the first component. This paper presents multiple encryption schemes using different encryption techniques Braiding/Entanglement of Pauli Spin 3/2 matrices and Rotation of the bits with independent secret keys.
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
Secure communication of the sensitive information in disguised form to the genuine recipient so that an
intended recipient alone can remove the disguise and recover the original message is the essence of
Cryptography. Encrypting the message two or more times with different encryption techniques and with
different keys increases the security levels than the single encryption. A cascade cipher is stronger than the
first component. This paper presents multiple encryption schemes using different encryption techniques
Braiding/Entanglement of Pauli Spin 3/2 matrices and Rotation of the bits with independent secret keys.
The Security of Practical Quantum Key DistributionXequeMateShannon
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on the eavesdropper's power.
The first two sections provide a concise up-to-date review of QKD, biased toward the practical side. The rest of the paper presents the essential theoretical tools that have been developed to assess the security of the main experimental platforms (discrete variables, continuous variables and distributed-phase-reference protocols).
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...cscpconf
Fault tolerance and data security are two important issues in modern communication systems.
In this paper, we propose a secure and efficient digital signature scheme with fault tolerance
based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains
three prime numbers and overcome several attacks possible on RSA. By using the Chinese
Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption
side and it provides high security also.
Quantum cryptography uses principles of quantum mechanics to securely distribute encryption keys between two parties. It allows Alice and Bob to detect if an eavesdropper (Eve) is trying to intercept the key during transmission. Eve's attempt to measure the quantum states used to transmit the key would introduce detectable errors. The document discusses the history and principles of quantum cryptography, including types like discrete and continuous variable QKD. It also covers desirable attributes like confidentiality and rapid key delivery, providing an example of how quantum key distribution works between Alice and Bob.
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...ijcsta
The document proposes a random keying technique combined with memetics concepts to provide security in wireless sensor networks. It involves randomly selecting keys from ranges distributed from the base station to cluster heads and nodes. When a node communicates, it selects keys that undergo crossover and mutation to generate header and trailer keys. The receiving node verifies packets by applying the same operations to the header keys and comparing the results to the trailer keys. Simulations showed this technique effectively combats spoofing attacks while being energy efficient compared to cryptographic methods.
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...ijtsrd
In symmetric key algorithm in linear block cipher to encrypt and decrypt the messages using matrix and inverse matrix. In this proposed technique generate lower and upper triangular matrices from the square matrix using decomposition. In encryption process, the key is a lower triangular matrix and decryption process, the key is upper triangular matrix under modulation of the prime number. We illustrate the proposed technique with help of examples. P.Sundarayya | M.G.Vara Prasad"Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decomposition Method " Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-4 , June 2017, URL: http://www.ijtsrd.com/papers/ijtsrd90.pdf http://www.ijtsrd.com/computer-science/computer-security/90/symmetric-key-generation-algorithm-in--linear-block-cipher-over-lu-decomposition-method--/psundarayya-
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGIJNSA Journal
This document proposes a method for fast detection of DDoS attacks using non-adaptive group testing (NAGT). It begins with background on DDoS attacks and group testing techniques. It then describes using a strongly explicit d-disjunct matrix in NAGT to map IP addresses to "tests" performed by routers. The router counters would indicate potential hot items (attackers or victims). Two decoding algorithms are presented to identify the hot items from the test results with poly-log time complexity meeting data stream requirements. The method aims to provide early warning of DDoS attacks through efficient group testing of IP packets.
Quantum cryptography for secured communication networksIJECEIAES
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum cryptography are Shor’s algorithm and the Grover’s’s algorithm. For finding the number of integer factorization of each photon, Shor’s algorithm is used. Grover’s’s algorithm used for searching the unsorted data. Shor’s algorithm overcomes RSA algorithm by high security. By the implementation of quantum cryptography, we are securing the information from the eavesdropper and thereby preventing data in the communication channel.
Properties and Impact of Vicinity in Mobile Opportunistic Networkstiphainepn
This document summarizes three contributions related to modeling vicinity dynamics in opportunistic mobile networks:
1. It analyzes vicinity properties like k-contact and k-intercontact intervals to show transmission opportunities beyond direct contact. Using a k-vicinity of 3-4 hops captures most opportunities.
2. It models pairwise vicinity motion as a Markov chain and identifies three main patterns - birth, death, and sequential movements. Most observed movements fall into death and sequential categories.
3. It proposes a vicinity timeline generator called TiGeR that produces synthetic vicinity behaviors matching real datasets. It also presents a prediction method based on modeling synchronous vicinity motion as a Markovian heuristic to forecast vicinity over time.
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYijujournal
Secure transformation of data is of prime importance in today’s world. In the present paper, we propose a
double fold authenticated public key encryption scheme which helps us in securely sending the confidential
data between sender and receiver. This scheme makes the encrypted data more secure against various
cryptographic attacks.
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYijujournal
The document presents an authenticated public key encryption scheme using elliptic curve cryptography. It proposes a double encryption method to securely transmit confidential data between a sender and receiver. In the scheme, the sender and receiver first agree on an elliptic curve and generator point over a finite field. They generate private/public key pairs and specific public keys for each other. The sender encrypts the message points in two stages - first generating cipher points using a random integer, and then performing XOR operations on the point coordinates with other values. The receiver decrypts the cipher text in two stages to recover the original message points and plaintext. An example is provided to illustrate the encryption and decryption process.
This document summarizes a research paper that designed and implemented sphere decoding (SD) for multiple-input multiple-output (MIMO) systems using an FPGA. It used Newton's iterative method to calculate the matrix inverse as part of the SD algorithm, which reduces complexity compared to direct matrix inversion. The authors implemented SD for a 2x2 MIMO system with 4-QAM modulation. Simulation results showed that Newton's method converged after 7 iterations, and SD successfully calculated the minimum Euclidean distance vector.
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...IOSR Journals
This document describes a simulation of quantum cryptography and the use of a DNA-based algorithm for secure communication. It discusses the fundamentals of quantum cryptography based on no-cloning theorem and Heisenberg's uncertainty principle. The document then proposes a system with modules for BB84 protocol-based key exchange and authentication, followed by encryption/decryption of messages using a DNA-based symmetric block cipher algorithm. Screenshots of a simulation of the system are provided along with analysis of its time and space complexity.
Ecc cipher processor based on knapsack algorithmAlexander Decker
This document describes a method for encrypting messages using Elliptic Curve Cryptography (ECC) combined with the knapsack algorithm. It begins by explaining the basics of ECC, including defining elliptic curves over a finite field and describing point addition and doubling operations. It then presents algorithms for the full encryption/decryption process. The process involves first transforming the message into points on an elliptic curve, then applying the knapsack algorithm to further encrypt the ECC-encrypted message before transmission. Decryption reverses these steps to recover the original message. The combination of ECC and knapsack encryption is presented as an innovation that provides increased security over traditional ECC alone.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
This document proposes two fault tolerant schemes for stream ciphers based on Algorithm Based Fault Tolerance (ABFT). The first is a 2-D mesh ABFT scheme that can detect and correct any single error in an n-by-n plaintext matrix with linear computation and bandwidth overhead. It constructs matrices for the plaintext, keystream, and transmitted data with row and column checksums. The second is a 3-D mesh-knight ABFT scheme that can detect and correct up to three errors by adding an extra "knight" checksum dimension. Both schemes use only XOR operations and allow errors to be efficiently located and recovered.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
To enhance the security and reliability of the widely-used stream ciphers, a 2-D and a 3-D mesh-knight Algorithm Based Fault Tolerant (ABFT) schemes for stream ciphers are developed which can be universally applied to RC4 and other stream ciphers. Based on the ready-made arithmetic unit in stream ciphers, the proposed 2-D ABFT scheme is able to detect and correct any simple error, and the 3-D meshknight ABFT scheme is capable of detecting and correcting up to three errors in an n2 -data matrix with liner computation and bandwidth overhead. The proposed schemes provide one-to-one mapping between data index and check sum group so that error can be located and recovered by easier logic and simple operations.
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGIJNSA Journal
Network security has become more important role today to personal users and organizations. Denial-ofService (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious problem in network. The major challenges in design of an efficient algorithm in data stream are one-pass over the input, poly-log space, poly-log update time and poly-log reporting time. In this paper, we use strongly explicit construction d-disjunct matrices in Non-adaptive group testing (NAGT) to adapt these requirements and propose a solution for fast detecting DoS and DDoS attacks based on NAGT approach.
This document discusses using genetic algorithms to cryptanalyze the RSA cryptosystem. It first provides an overview of the RSA algorithm and how it works. It then discusses the Karatsuba algorithm, which can be used to efficiently multiply very large numbers. The document goes on to explain the basic concepts behind genetic algorithms, including representation, selection, crossover, and mutation operators. The authors propose applying genetic algorithms to generate new number pairs p and q that could be used to factor the RSA modulus N and break the cryptosystem. Specifically, they suggest using genetic algorithm operators to generate a new population of p and q values to use in cryptanalyzing RSA.
Similar to Design and Implementation of a Secure Communication Protocol (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...amsjournal
The Fourth Industrial Revolution is transforming industries, including healthcare, by integrating digital,
physical, and biological technologies. This study examines the integration of 4.0 technologies into
healthcare, identifying success factors and challenges through interviews with 70 stakeholders from 33
countries. Healthcare is evolving significantly, with varied objectives across nations aiming to improve
population health. The study explores stakeholders' perceptions on critical success factors, identifying
challenges such as insufficiently trained personnel, organizational silos, and structural barriers to data
exchange. Facilitators for integration include cost reduction initiatives and interoperability policies.
Technologies like IoT, Big Data, AI, Machine Learning, and robotics enhance diagnostics, treatment
precision, and real-time monitoring, reducing errors and optimizing resource utilization. Automation
improves employee satisfaction and patient care, while Blockchain and telemedicine drive cost reductions.
Successful integration requires skilled professionals and supportive policies, promising efficient resource
use, lower error rates, and accelerated processes, leading to optimized global healthcare outcomes.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Design and Implementaion of a Secure Communication Protocol (M. K. Viswanath)
1815
2. RABIN CRYPTOSYSTEM
The aim of this chapter is to discuss the Rabin cryptosystems whose security is based on
computational assumptions related to the integer factorization [13]. The Rabin public-key encryption scheme
[1], [14] was the first example of a provably secure public-key encryption scheme- the problem faced by a
passive adversary of recovering plaintext from some given ciphertext is computationally equivalent to
factoring. The security of Rabin is more closely related to factoring than RSA. It deals with the problem that
if .n p q where p and q are distinct primes then squaring is a four-to-one map, so it is necessary to have
a rule to choose the correct solution while decrypting the cryptotext.
1) Choose two random primes p and q such that 3 (mod 4)p q and set .n p q .
2) n is made public and ,p q is kept as secret. To encrypt a message m , compute 2
modC m n
3) To recover plaintext m from C , one does the following:
a. Use the extended Euclidean algorithm to find the integers a and b satisfying . . 1a p b q . Note that
a and b can be computed once and for all during the key generation stage.
b. Compute
( 1)
4 mod
p
r C p
and
( 1)
4 mod
q
s C q
.
c. Find the four square roots of C modulo n . They are
1 . . . . (mod )m a p s b q r n
2 . . . . (mod )m a p s b q r n
3 1m n m
4 2m n m
and decides which of these is m .
A drawback of Rabin’s public-key scheme is that the receiver is faced with the task of selecting the
correct plaintext from among the four possibilities. This ambiguity in decryption can easily be overcome in
practice by adding pre-specified redundancy to the original plaintext prior to encryption. Then, with high
probability, exactly one of the four square roots 1m , 2m , 3m , 4m of a legitimate ciphertext C will possess
this redundancy, and the receiver will select this as the intended plaintext. If none of the square roots of C
possesses this redundancy, then the receiver should reject C as a fraudulent message. This case does not
arise with the problem in hand.
3. MOORE-PENROSE INVERSE (PSEUDO INVERSE)
3.1. Definition
Let
m×n
A R and
n×m
X R , then the following equations are used to define the pseudo inverse of
a rectangular matrix A [12], [14].
AX A A (1)
X AX X (2)
T
AX AX (3)
T
X A X A (4)
Equations (1) through (4) are called the Penrose conditions [15].
3.2. Definition
A pseudo inverse of rectangular matrix
m×n
A R is also a rectangular matrix
# n×m
X A R
satisfying Equations (1) through (4). A pseudo inverse is sometimes called the Moore – Penrose inverse after
the pioneering work done by Moore (1920, 1935) and Penrose (1955).
3.3. Construction of pseudo inverse
For a given
m×n
A R , the pseudo inverse
# n×m
A R is unique.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1814 – 1821
1816
a. If m n and rank A m then
# 1
A A
.
b. If m n and rank A m then
T
A A is non-singular and
1# T T
A A A A
(5)
c. If m n and rank A n then
T
A A is non-singular and
1# T T
A A A A
(6)
3.4. Conjecture
a. If A is a rectangular matrix in
m×n
R formed by the mn consecutive decimal places of any irrational
number, with m n , then rank A m and A is always right invertible.
b. If A is a rectangular matrix in
m×n
R formed by the mn consecutive decimal places of any irrational
number, with m n , then rank A n and A is always left invertible.
4. THE GOLDBACH CONJECTURE
In 1742, C. Goldbach conjectured that, “every odd number greater than nine is expressible as the
sum of three primes” and “every even number greater than four is expressible as the sum of two odd
primes”. The first one is called the odd Goldbach conjecture and the second one is called the even Goldbach
conjecture [17]. In 1937, I.M. Vinogradov established the odd Goldbach conjecture. But the even Goldbach
conjecture is still an open question and the best result obtained so far is given by Jin Run Chen in 1966.
4.1. Vinogradov’s theorem
It was shown in 1937 by I.M. Vinogradov [9] that, “All sufficiently large odd integers are
expressible as a sum of three primes”. Vinogradov proved the three - primes theorem by analytical means,
using major arc/minor arc decomposition.
4.2. Chen’s theorem
In 1966 Jin Run Chen [7] made considerable progress in setting the even Goldbach conjecture; in
[8] Chen proved the following theorem. “A large even integer can be expressed as the sum of a prime and
the product of atmost two primes”. Chen’s theorem is a giant step towards solving the Goldbach conjecture,
and is a remarkable result using the Sieve methods.
5. THE NEW SCHEME
The main idea of this paper is, to develop a new cryptosystem using Chen’s theorem, Vinogradov’s
theorem and the Fermat’s two squares theorem, which provides confidentiality, authenticity and integrity of
the secret message shared over a public channel. This work is a novel method of developing a
communication protocol which is secure against all the known possible attacks. The protocol is as follows:
We are looking for numbers which satisfy the following decomposition (a) and (b) given below and
call these numbers as feasible numbers. Not all the odd and even integers are feasible. For example 11 and 14
are not feasible. A MATLAB programme is developed to check whether a given even or odd number is
feasible. Using MATLAB the following numbers are found to be feasible: 100, 101, 1002, 999, 150, 151,
1029, 1578 and their decompositions are given by 100 79 7 3 , 101 89 7 5 , 1002 967 5 7 ,
999 991 3 5 , 150 73 7 11 , 151 139 5 7 , 1029 1021 5 3 , 1578 1543 5 7 . Bob
and Alice choose only feasible numbers for this protocol.
a. Suppose N is a large even integer, then N satisfies the decomposition 1 1N P r s , where 1r and 1s
are distinct primes and P is the largest prime satisfying this relation.
b. If M is a large odd integer, then M satisfies the decomposition 2 2M Q r s , where 2r and 2s are
appropriate distinct primes and Q is the largest primes satisfying this relation.
4. Int J Elec & Comp Eng ISSN: 2088-8708
Design and Implementaion of a Secure Communication Protocol (M. K. Viswanath)
1817
Chen’s and Vinogradov’s theorems guarantee the existence of two primes P and Q from the sufficiently
large feasible numbers N and M .
5.1. Initial setup
As before, assume two protagonists, Alice and Bob. An authentication protocol is executed by Bob
to make sure that Alice wants to communicate with him.
Alice and Bob choose two large numbers N and M respectively and after ascertaining their
identity, exchange it over a secure channel. Alice then chooses the largest primes 1N of the form 4 1t , 2N
of the form 4 3t less than N . Similarly, Bob chooses the largest primes 1M of the form 4 1t , 2M of the
form 4 3t , less than M .
We recall the Fermat’s two squares theorem,
“If p is a prime number of the form 4 1n , then 2 2
p a b for some integers ,a b ”.
We exploit this theorem of Fermat’s, to obtain the pair of numbers 1 1,A B and 2 2,A B when the primes
1N and 1M of the form 4 1t are known. 2 2
1 1 1N A B and 2 2
1 2 2M A B . Now Bob and Alice, both
possess 1A , 1B , 2A and 2B once they are aware of N and M . For example, if 1 104681N , then
2 2
104681 155 284 and if 1 100957M then 2 2
100957 309 74 .
Thus both the users Bob and Alice have the numbers N and M and both can compute
1 2 1 1, , ,N N A B and 1 2 2 2, , ,M M A B . They keep the pair of four tuples safely with them. Bob and Alice
agree for an irrational number I which has a decimal expansion upto more than million places of decimals
and I is kept as secret.
5.2. Plaintext encryption protocol
When Alice wants to send a secret message P to Bob, then Alice has the key tuples
1 2 1 1, , ,N N A B and 1 2 2 2, , ,M M A B with her, computed from the numbers N and M exchanged over a
secure channel.
a. If 1B is a feasible number, then she applies Chen’s theorem to 1B and computes 1 2, ,p p p such that
1 1 2B p p p , where p is the largest prime and 1 2p p , 1p , 2p are distinct primes satisfying this
relation. Similarly if 2A is feasible, she computes 1 2, ,q q q from the odd feasible number 2A using
Vinogradov’s theorem, such that 2 1 2A q q q , where q is the largest prime and 1 2,q q suitable
distinct primes 1 2q q .
b. Now, Alice computes the first encryption key 1 1 2 3K k k k , a sequence of decimal places from the
position q in the expansion of the irrational number I , which is used to begin the encryption. The
number at th
q place, say 1k is used to substitute the beginning letter of the plaintext P by shifting the
alphabet by 1k units. Afterwards the process is continued with the next integer 2k and the next alphabet
in the plaintext and so on, till the entire message is encrypted. This encrypted message say 'C is obtained
by using the key q of Bob.
c. Next, Alice computes her encryption key matrix AK using the number p , where AK is a 1 2p p
rectangular matrix and the entries of AK are the 1 2p p consecutive decimal places picked from the
position p in the expansion of I .
d. She arranges the cryptotext 'C in blocks of length 2p with its numerical equivalents and obtains the
final ciphertext C by 'AC K C .
5.3. Message integrity encryption protocol
Alice computes the product 2 2n N M . The integrity of the message is obtained by considering the
letters 1 2 3 4, , ,m m m m m (say) occurring in the 1 2 1 2, , ,p p q q th
places of the first sentence in P . The
compilation of word in the exact order is taken as message digest. She encrypts the word m as
2
(mod )w m n . Now the ciphertext C and the encrypted message digest w are sent to Bob through an
open channel, for decryption.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1814 – 1821
1818
5.4. Ciphertext decryption protocol
Once Bob receives the ciphertext pair ,C w , he does the following for decryption.
He knows, p is the position of the decimal place to start, in the expansion of the irrational number
I . From this position of p , he collects the 1 2p p consecutive digits from the decimal expansion of I and
obtains the rectangular matrix AK of order 1 2p p . He then computes the pseudo inverse #
AK of AK and
applies this decryption key to the ciphertext C and obtains 'C , #
' AC K C , where C is arranged in blocks
of 1p -tuples with its numerical equivalent. Now he knows his key value q and obtains the decimal places
from the q th
position of the decimal expansion of I where the first encryption process has begun. Then he
can easily obtains the plaintext P by decrypting 'C using the inverse substitution cipher of Bob. This
process establish the authenticity of the message received from Alice as the message is locked with the keys
of Bob and Alice, without formally exchanging the message P between Bob and Alice.
5.5. Decryption Protocol for Integrity:
Bob wants to compute modw n and he does it by the following method.
a. He computes
2
2
1
4
2mod
N
Nm w N
and
2
2
1
4
2mod
M
Mm w M
.
b. By extended Euclidean algorithm, he finds 2Ny and 2My such that 2 22 2 1N My N y M .
c. Then he computes the four possibilities for m , such that
2 2 2 21 2 2 modN M M Nr y N m y M m n
2 1r n r
2 2 2 23 2 2 modN M M Nr y N m y M m n
4 3r n r .
If Bob wants to reply to the message of Alice, he obtains the new keys 2K and BK using the values
of 2B and 1A and continues the algorithm executed by Alice. He computes BK with his key value q and
computes 2K with the help of p . If Alice wants to continue the encryption process, Alice selects 3N , 4N ,
3 4 1N t , 4 4 3N t , where 3N , 4N are the first prime numbers occurring just after N and Bob selects
3M and 4M , where 3M , 4M are the first primes of the form 4 1t and 4 3t occurring just after M .
The keys iK , AK , BK are computed as before and thus these keys are dynamic.
6. WORKING OF THE SYSTEM
Assume that the system uses a 29-letter alphabet
_ . ?
00 01 02 23 24 25 26 27 28
a b c x y z
Consider the case, the irrational number I and let 28816N and 47635M . Then
1 2 1 1, , , 28813, 28807, 93, 142N N A B
1 2 2 2, , , 47629, 47623, 195, 98M M A B
such that 2 2
1 1 1N A B and 2 2
1 2 2M A B .
6.1. Encryption
Assume Alice contacts Bob for the first time. She picks the even number 1B from 1N and the odd
number 2A from 1M . If 1 2,B A are feasible numbers, then she computes the decomposition
6. Int J Elec & Comp Eng ISSN: 2088-8708
Design and Implementaion of a Secure Communication Protocol (M. K. Viswanath)
1819
1 1 2142 127 5 3B p p p for the even number 142 and finds the decomposition,
2 1 2195 181 11 3A q q q which exist for feasible numbers by definition. Here Bob’s key is 181
and the key of Alice is 127.
First Alice finds the decimal places from the position 181q in the expansion of . Now,
1K =6440229489 549303819644288109756659.... Alice encrypts the confidential message, namely the
Plaintext P=“meet at the little schoolhouse” using 1K as, each character in the plaintext is shifted with the
corresponding numbers in 1K using (mod 29). Then she computes the initial cryptotext 'C with its
numerical equivalent and arranges this in columns of length three, as a matrix. This matrix 'C is given by,
18 25 28 16 20 22 06 11 19 00
' 08 28 01 09 11 19 19 16 08 25
08 02 27 01 19 15 15 22 14 09
C
Alice finds the sequence of decimal places from the position 127p and chooses 1 2 15p p consecutive
decimals from this position in the expansion of . This decimal sequence “609550582231725” is arranged
in the form of a 1 35 3 p p rectangular matrix AK . This is given by,
6 0 3
0 5 1
9 8 7
5 2 2
5 2 5
AK
Then 'C is converted into the final cryptotext
' mod 29AC K C
6 0 3
18 25 28 16 20 22 06 11 19 000 5 1
08 28 01 09 11 19 19 16 08 259 8 7
08 02 27 01 19 15 15 22 14 095 2 2
5 2 5
16 11 17 12 03 03 25 16 11 27
19 26 03 17 16 23 10 15 25 18
(mod 29)21 28 14 20 24 20 27 04 14 02
06 11 22 13 15 04 03 15 23 10
01 17 16 16 14 20 21 23 07 08
Thus the ciphertext C is “qtvgbl_?lrrdowqmrunqdqypodxueuz k.dvqpepxlzoxh.scki”. Note that 30P and
50C .
For message integrity, Alice chooses the 1
th
p 2
th
p 1
th
q and 2
th
q characters in the plaintext namely,
“_eee”. This message digest with its numerical equivalent : 26040404m is enciphered as w by using
2 2 1371875761n N M . That is
2
modw m n
2
26040404 mod 1371875761n 914330048 mod 1371875761n
Now the ciphertext C and the encrypted message digest w are sent to Bob through an open channel.
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1814 – 1821
1820
6.2. Decryption
Bob can compute the rectangular matrix AK by applying the key p of Alice to the decimal
expansion of . Then he obtains the pseudo inverse of AK ,
1
#
mod 29T T
A A AAK K K K
25 25 26 05 17
13 06 15 08 19 mod 29
14 15 13 11 01
He divides the ciphertext C into clocks of length five and decrypts it by applying #
AK to C ,
#
' mod 29AC K C . He computes the decimal sequence 1K , starting from the position q in the decimal
expansion of . These decimal places are used to decrypt 'C by the inverse substitution cipher and Bob
obtains the original secret message " "P meet atthe schoolhouse .
For decryption of the message digest, Bob finds
2
2
1
4
2mod 1124 mod 28807
N
Nm w N
2
2
1
4
2mod 38246 mod 47623
M
Mm w M
2 2
2083, 1260N My y such that 2 22 2 1N My N y M and it returns the four possible roots,
2 2 2 21 2 2 mod 950545703N M M Nr y N m y M m n
2 1 421330058r n r
2 2 2 23 2 2 mod 26040404N M M Nr y N m y M m n
4 3 1345835357r n r
Among these four, 3r gives him the original message digest. Bob can confirm it by considering the letters in
the 1 2 1 2, , , th
p p q q place of the plaintext P . Bob can reply to Alice by using the ,odd even pair key
1 2,A B as before. This process is then continued by Alice using the new prime pairs 3 4,N N and
3 4,M M and it can be repeated any number of times as long as the initial numbers ,N M are kept secret.
7. CONCLUSION
The cryptosystem proposed here is quite secure as it is difficult to obtain the keys iK , AK and BK
without knowledge of N and M . As the prime pairs 1 2,N N and 1 2,M M changes for each encryption,
the keys iK , AK and BK are dynamic and hence the system is secure against chosen plaintext attack. It also
ensures the authenticity of the messages transferred between the sender and the receiver as t is locked with
the keys of Bob and Alice. The Rabin’s cryptosystem without the modulus being made public, is used in
encrypting the message digest and it ensures the integrity of the message transferred.
The use of the integers appearing in the decimal expansion of (not made public) in
encryption/decryption, enables it to be safe against the usual methods of cryptographic attacks. As long as N
and M are not known it is impossible for an intruder to break this system. If an intruder pretends as Alice
and sends Bob a message, Bob can send a standard text for encryption. The ciphertext of this standard
message from the intruder, enables Bob to assert the authenticity of the intruder.
The proposed data encryption scheme given above has advantages of large key space, high level
security and is mathematically and computationally simple like [5], [18]. The system is secure against brute
force attack since the keys are dynamic and the length of the plaintext and the ciphertext are not equal. Thus
the system is secure against all possible known attacks.
8. Int J Elec & Comp Eng ISSN: 2088-8708
Design and Implementaion of a Secure Communication Protocol (M. K. Viswanath)
1821
REFERENCES
[1] A.J. Menezes, P.C. Van Oorchot and S.A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 2000.
[2] John Mark B. Espalmado and Edwin R. Arboleda, “Dare Algorithm: A New Security Protocol by Integration of
Different Cryptographic Techniques,” International Journl of Electrical and Computer Engineering, vol. 7, no. 2,
pp. 1032-1041, 2017.
[3] Neal Koblitz, “A course in Number Theory and Cryptography”, Springer, 2nd
edition, 1994.
[4] Rhee and Man Young, “Cryptography and Secure Communications”, McGraw - Hill co., 1994.
[5] M.K. Viswanath and M. Ranjithkumar, “A secure cryptosystem using the decimal expansion of an Irrational
number,” Applied Mathematical Sciences, vol. 9, pp. 5293-5303, 2015.
[6] M.K. Viswanath and M. Ranjithkumar, “Goldbach Conjecture and Cryptography,” International Journal of Pure
and Applied Mathematics, vol. 116, no. 2, pp. 403-413, 2017.
[7] J.R. Chen, “On the representation of a large even integer as the sum of a prime and the product of atmost two
primes,” Kexue Tongbao (Chinese), vol. 17, pp. 365-386, 1966.
[8] J.R. Chen, “On the representation of a large even integer as the sum of a prime and the product of atmost two
primes,” Sci. Sinica, vol.16, 1973, pp. 157-176. Ibid, 21, 1978, pp.477-494 (Chinese).
[9] I.M. Vinogradov, “The representation of an odd number as a sum of three primes,” Dokl.Akad. Nauk, SSSR 15,
1937, pp.169-172, Russia.
[10] I.N. Herstein, “Topic in Algebra”, 2nd
Edition, Wily Eastern Limited.
[11] S. Lester Hill, “Cryptography in an algebraic alphabet,” Amer. Math., pp. 306-312, 1929.
[12] R. Penrose, “A generalized Inverse for matrices,” Communicated by J.A. Todd Received 26 July 1954.
[13] R.L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems”
Communications of the ACM, vol. 21, no. 2 pp.120-126, 1978.
[14] Sushma Pradhan and Birendra Kumar Sharma, “An Efficient RSA Cryptosystem with BM-PRIME Method,”
International Journal of Information & Security, vol. 2, no. 1, pp. 103-108, 2013.
[15] Predrag Stanimirovic and Miomir Stankovic, “Determinants of rectangular matrices and Moore-Penrose inverse,”
Novi sad J. Math., vol .27, no. 1, pp. 53-69, 1997.
[16] T.L. Boullion and P.L. Odell, “Generalized Inverse Matrices,” Wiley, Newyork, pp. 41-62, 1971.
[17] J. Pintz and I.Z. Puzsa, “On Linnik’s approximation to Goldbach’s problem,” I. Acta Arithmatica, vol. 109, no. 2,
pp.169-194, 2003.
[18] M.K. Viswanath and M. Ranjithkumar, “A Public Key Cryptosystem Using Hill’s Cipher,” Journal of Discrete
Mathematical Sciences & Cryptography, vol. 18, no. 1 & 2, pp. 129-138, 2015.
BIOGRAPHIES OF AUTHORS
M. K. Viswanath was born on 8th
April 1950 at Tellicherry, Kerala, India. He took his masters
degree M.Sc. in Mathematics from the University of Madras in 1971. He joined as a Tutor in
Mathematics at the Madras Christian College immediately after completing the M.Sc. degree.
He obtained M.Phil. Degree (Mathematics) in 1979 and the Ph.D. degree (Mathematics) from
the University of Madras in the year 1987 for his thesis titled Harmonic Analysis on 2,SP
His research interest include Quantum groups, Functional Analysis, Number Theory,
Cryptography and Ancient Indian Mathematics. He retired as Reader in Mathematics from the
Madras Christian College in May 2008 and thereafter served as Professor of Mathematics at the
Rajalakshmi Engineering College, Chennai till May 2016. He is a member of the Cryptographic
Research Society of India and the Kerala Mathematics association. He has published 21 research
articles in various national and international journals. He is a reviewer for the zbMATH for the
past 21 years. He is married and is blessed with two sons.
M. Ranjith Kumar was born on 14th
June 1985 at Vellore, Tamil Nadu, India. He is a research
scholar in the Department of Mathematics, Bharathiar University, India. He received the M.Sc.
degree in Mathematics from University of Madras (RIASM) in 2007. He completed M.Phil.
Mathematics from University of Madras in the year 2010. His research mainly focuses on
Number Theory and Cryptography. He has published five research articles in various national
and international journals.