Building secure stream cipher algorithm in fast and comfortable manner is consider point of interest for most of those interested in building encryption algorithms to conceal their information and prevent detection it by unauthorized persons. The main goal of this paper is to design a package to implement and evaluate most of stream cipher algorithms in fast, convenient manner. The package provides the ability to the designer to design stream cipher algorithms either visually or by C# programming language. The proposed package provides number of the components required to build stream cipher algorithm, while providing the potentiality of linking these components to enable the exchange of data among them when running the algorithm, it has also been providing the potentiality of testing the key produced by designed algorithm. Testing performed by applying fourteen statistical tests that provided by NIST and all these fourteen tests executed in parallel to reduce theirexecution time. It also provides the possibility to use the designed stream cipher algorithm to encrypt any plaintext and decrypt any cipher text.
This document presents an optimized FPGA hardware implementation of public key cryptography using encryption and decryption. The implementation uses two keys - a public key for encryption that anyone can use, and a private key for decryption that only the intended recipient possesses. The design was tested on a Xilinx Virtex 5 FPGA. Encryption and decryption were shown to work correctly when the proper keys were used. Without the private key, decryption was not possible, demonstrating the security of the approach. Synthesis results showed the design utilizes FPGA resources efficiently compared to other related work.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
The document proposes a tri-cryptosystem for securing email on Android devices using a combination of symmetric, asymmetric, and hash cryptography. Specifically, it uses the PingPong-128 symmetric stream cipher to encrypt messages, RSA for key exchange, and MD5 hashing to verify message integrity. This approach aims to address the weaknesses of single cryptosystem approaches by leveraging the speed of symmetric encryption and security of asymmetric techniques. The tri-cryptosystem encrypts a randomly generated symmetric key with the recipient's public RSA key. This encrypted key and the symmetric encrypted message are then sent to the recipient who can decrypt the key and message to obtain the plaintext.
This document summarizes a research paper that proposes a novel symmetric key cryptography algorithm (N-SKC) to improve data security in cloud computing. The N-SKC algorithm uses multiple computational steps, random operator and delimiter selections to encrypt data with the same key producing different ciphertexts. It is designed to protect against brute force attacks. The paper also proposes using RSA for key exchange between the cloud provider and user to secretly share a symmetric key for encryption. Experimental results testing the N-SKC algorithm show it produces different ciphertexts for the same plaintext and key.
1. The document describes a system for encrypting data in real-time using a field programmable gate array (FPGA). The FPGA encrypts a stream of data from a personal computer using an algorithm written in VHDL and stores the encrypted data in a data logger.
2. The encryption algorithm uses three levels of logic gates (XOR, NAND, OR) applied sequentially to encrypt each byte of data. The FPGA, PC, and data logger are connected to transfer plain data from the PC to the FPGA for encryption and then to the data logger for storage.
3. The system was tested with a sample byte of data and successfully encrypted and stored it, demonstrating proof of concept
A new speech encryption algorithm based on dual shuffling Hénon chaotic map IJECEIAES
Over the past few decades, many algorithms have been proposed to improve the performance of speech encryption over un-secure channel (i.e., Internet). In this paper, the security level was enhanced using a dynamic dual chaotic based on Hénon chaotic map. In the proposed algorithm, the speech elements are shuffled in a random fashion. Moreover, when both Hénon state variables are free to be used for shuffling the index is toggled randomly between them according to toggle bit. After index shuffling each speech element is modified with XOR operation between the original speech element value and the key that is selected randomly from the updated key table. The same chaotic map is used to initiate the empty or full table and provide new table entries from the values that are already shuffled. The experimental results show that the proposed crypto-system is simple, fast with extra random toggling behavior. The high order of substitution make it sensitive to initial condition, common cryptanalysis attacks such as linear and differential attacks are infeasible.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
The document discusses improving security for automation in the Internet of Things using one-time passwords. It proposes generating one-time passwords using AES algorithms to provide highly authorized authentication and access to equipment. The proposal includes using elliptic curve cryptography to generate one-time passwords and extending the AES symmetric encryption scheme with Lamport's one-time password algorithm. It analyzes the performance and security of the proposed scheme, finding it can be implemented in IoT networks to provide two-factor authentication between devices, applications, and their communications securely and efficiently with a smaller key size and lower computational requirements compared to other existing one-time password schemes.
This document presents an optimized FPGA hardware implementation of public key cryptography using encryption and decryption. The implementation uses two keys - a public key for encryption that anyone can use, and a private key for decryption that only the intended recipient possesses. The design was tested on a Xilinx Virtex 5 FPGA. Encryption and decryption were shown to work correctly when the proper keys were used. Without the private key, decryption was not possible, demonstrating the security of the approach. Synthesis results showed the design utilizes FPGA resources efficiently compared to other related work.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
The document proposes a tri-cryptosystem for securing email on Android devices using a combination of symmetric, asymmetric, and hash cryptography. Specifically, it uses the PingPong-128 symmetric stream cipher to encrypt messages, RSA for key exchange, and MD5 hashing to verify message integrity. This approach aims to address the weaknesses of single cryptosystem approaches by leveraging the speed of symmetric encryption and security of asymmetric techniques. The tri-cryptosystem encrypts a randomly generated symmetric key with the recipient's public RSA key. This encrypted key and the symmetric encrypted message are then sent to the recipient who can decrypt the key and message to obtain the plaintext.
This document summarizes a research paper that proposes a novel symmetric key cryptography algorithm (N-SKC) to improve data security in cloud computing. The N-SKC algorithm uses multiple computational steps, random operator and delimiter selections to encrypt data with the same key producing different ciphertexts. It is designed to protect against brute force attacks. The paper also proposes using RSA for key exchange between the cloud provider and user to secretly share a symmetric key for encryption. Experimental results testing the N-SKC algorithm show it produces different ciphertexts for the same plaintext and key.
1. The document describes a system for encrypting data in real-time using a field programmable gate array (FPGA). The FPGA encrypts a stream of data from a personal computer using an algorithm written in VHDL and stores the encrypted data in a data logger.
2. The encryption algorithm uses three levels of logic gates (XOR, NAND, OR) applied sequentially to encrypt each byte of data. The FPGA, PC, and data logger are connected to transfer plain data from the PC to the FPGA for encryption and then to the data logger for storage.
3. The system was tested with a sample byte of data and successfully encrypted and stored it, demonstrating proof of concept
A new speech encryption algorithm based on dual shuffling Hénon chaotic map IJECEIAES
Over the past few decades, many algorithms have been proposed to improve the performance of speech encryption over un-secure channel (i.e., Internet). In this paper, the security level was enhanced using a dynamic dual chaotic based on Hénon chaotic map. In the proposed algorithm, the speech elements are shuffled in a random fashion. Moreover, when both Hénon state variables are free to be used for shuffling the index is toggled randomly between them according to toggle bit. After index shuffling each speech element is modified with XOR operation between the original speech element value and the key that is selected randomly from the updated key table. The same chaotic map is used to initiate the empty or full table and provide new table entries from the values that are already shuffled. The experimental results show that the proposed crypto-system is simple, fast with extra random toggling behavior. The high order of substitution make it sensitive to initial condition, common cryptanalysis attacks such as linear and differential attacks are infeasible.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
The document discusses improving security for automation in the Internet of Things using one-time passwords. It proposes generating one-time passwords using AES algorithms to provide highly authorized authentication and access to equipment. The proposal includes using elliptic curve cryptography to generate one-time passwords and extending the AES symmetric encryption scheme with Lamport's one-time password algorithm. It analyzes the performance and security of the proposed scheme, finding it can be implemented in IoT networks to provide two-factor authentication between devices, applications, and their communications securely and efficiently with a smaller key size and lower computational requirements compared to other existing one-time password schemes.
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
This document discusses the effect of encryption delay on TCP traffic over data networks. It presents results from simulations of four scenarios: 1) no encryption, 2) low encryption delay of 0.02ms, 3) medium encryption delay of 0.04ms, and 4) high encryption delay of 0.05ms. The results show that TCP delay, segment delay, end-to-end delay, and connection delay all increase as the encryption delay increases. Therefore, encryption delays can negatively impact network performance and congestion if not properly balanced with encryption algorithm complexity. Faster encryption algorithms should be used when network performance is prioritized over security.
Advanced Encryption Standard, Multiple Encryption and Triple DES, Block Cipher Modes of
operation, Stream Ciphers and RC4, Confidentiality using Symmetric Encryption, Introduction
to Number Theory: Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality, The
Chinese Remainder Theorem, Discrete Logarithms, Public-Key Cryptography and RSA
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Documenting Software Architectural Component and Connector with UML 2editor1knowledgecuddle
One of the major challenges facing consultants today is maintaining a level of knowledge of leading and emerging technologies, beyond the superficial or buzzword level. We need to develop a level of understanding that allows us to communicate effectively with both suppliers and customers.Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme. This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm. Keywords:Digital signature, Hashed message algorithm, MD5 Algorithm, Public key encryption, SHA2 Algorithm.
Introduction: OSI Security Architecture, Security attacks, ,Security Services, Security
Mechanisms, Model for Network Security, Fundamentals of Abstract Algebra : Groups, Rings,
Fields, Modular Arithmetic, Euclidean Algorithm, Finite Fields of the form GF(p),Polynomial
Arithmetic, Finite Fields of the form GF(2n),Classical Encryption techniques, Block Ciphers and
Data Encryption Standard.
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
This document describes the implementation of the Advanced Encryption Standard (AES) algorithm as a custom hardware accelerator connected to a Nios II processor system. AES was written in VHDL and connected to the Nios II system through GPIO pins. This allows AES operations to be controlled through C code in the Nios II IDE while running the AES algorithm in hardware, improving encryption speeds significantly compared to an all-software implementation. Synthesis results showed the hardware AES implementation reduced the number of clock cycles needed for encryption by over 99% compared to running AES solely in software on the Nios II processor.
ITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTIONIJNSA Journal
Cryptographic check values (digital signatures, MACs and H-MACs) are useful only if they are free of errors. For that reason all of errors in cryptographic check values should be corrected after the transmission over a noisy channel before their verification is performed. Soft Input Decryption is a method of combining SISO convolutional decoding and decrypting of cryptographic check values to improve the correction of errors in themselves. If Soft Input Decryption is successful, i.e. all wrong bit of a cryptographic check value are corrected, these bit are sent as feedback information to the channel decoder for a next iteration. The bit of the next iteration are corrected by channel decoding followed by another Soft Input Decryption. Iterative Soft Input Decryption uses interleaved blocks. If one block can be corrected by Soft Input Decryption, the decoding of the interleaved block is improved (serial scheme). If Soft Input Decryption is applied on both blocks and one of the blocks can be corrected, the corrected block is used for an improved decoding of the other block (parallel scheme). Both schemes show significant coding gains compared to convolutional decoding without iterative Soft Input Decryption.
.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
This document proposes a new color-based cryptography method called Play Color Cipher (PCC) as an improvement over traditional substitution ciphers. PCC works by substituting characters, numbers, and symbols with color blocks, where each color is represented by RGB values. During encryption, the plaintext is divided into blocks and the ASCII value of each character is encoded into one of the RGB channels of the corresponding color block. With over 16 million possible color combinations, PCC aims to increase complexity for attackers compared to other ciphers. The document outlines the encryption and decryption algorithms and argues that PCC can help strengthen security against common attacks like brute force and known/chosen plaintext attacks by vastly increasing the search space.
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...IJNSA Journal
This document summarizes an efficient and secure dynamic ID-based remote user authentication scheme for a multi-server environment. It begins with an abstract describing the scheme. It then reviews a previous related work by Hsiang-Shih that addressed security flaws in an earlier Liao-Wang scheme. The document proposes a new enhanced scheme that maintains the security properties of Hsiang-Shih's scheme while improving usability by not requiring the user to know the server's ID to generate login requests. It describes the registration, login, and mutual verification/session key agreement phases of the proposed scheme in detail.
The Fundamental of Secure Socket Layer (SSL)Vishal Kumar
"The Fundamental of SSL" it is the first part of this Topic in which we covered covers the deep understanding of Secure Socket Layer, its position in the TCP/IP suit, its sub protocols and the working or Handshake Protocol.
This document discusses lightweight cryptography. It begins by defining lightweight cryptography as cryptographic primitives designed for devices with limited resources like memory, speed and power consumption. It then outlines various lightweight cryptographic mechanisms like block ciphers, hash functions, stream ciphers and authenticated ciphers. For each mechanism, it discusses their desirable properties and design principles. It also discusses implementation issues like decryption costs and resistance to related key attacks. Finally, it mentions the Fair Evaluation of Lightweight Cryptographic Systems (FELICS) benchmarking tool for evaluating and comparing the performance of lightweight cryptographic algorithms on different platforms.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
This document summarizes a research paper on using elliptic curve cryptography for message authentication. It begins with an introduction to elliptic curve cryptography and how it can provide equivalent security to other public key encryption methods but with smaller key sizes. It then describes the proposed methodology which includes generating an ECC key pair, encrypting a message with the public key, transmitting the encrypted message, and decrypting it with the private key. The results show a message being encrypted and decrypted correctly using this ECC process. It concludes that ECC can provide an efficient method for authentication in systems like vehicular networks due to its lower computation and communication overhead compared to other encryption methods.
1. IPSec is a set of security protocols that provide privacy and authentication for IP communications. It has two main components: Authentication Header (AH) and Encapsulating Security Payload (ESP).
2. The Internet Key Exchange (IKE) and Oakley key determination protocol are used for automatic key management to establish Security Associations between IPSec nodes.
3. The ISAKMP framework defines procedures for establishing, negotiating, modifying and deleting Security Associations, including the exchange of key generation and authentication data payloads.
What is SMC. SMC Models. Type of Adversaries. Applications. Goals. Actions. Types of Operations. Randomization Techniques. Oblivious Transfer. Cryptographic Techniques
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
This document discusses encryption and decryption techniques using Bluetooth proximity on mobile devices. It begins with an abstract that outlines using an encryption algorithm to convert meaningful file information into unintelligible data that cannot be read without decrypting. The encryption key would be the Bluetooth MAC address of a registered device.
The introduction explains using AES encryption to encode files into unreadable data, with the Bluetooth MAC address as the decryption key. It also discusses how encryption provides data security for wireless communication.
The document then reviews cryptography purposes like authentication and confidentiality. It examines symmetric key cryptography using the same key for encryption and decryption, and public key cryptography using different keys. It also defines plain text, cipher text, and encryption/
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication scheme for smart card. Their scheme is more secure than the other previous schemes. In this paper, we show Tsai et al.’s scheme is vulnerable to password guessing attack and has computational overhead. Furthermore, we propose an enhanced password authentication scheme to eliminate the security vulnerability and enhance the overhead. By presenting concrete analysis of security and performance, we show that the proposed scheme cannot only resist various well known attacks, but also is more efficient than the other related works, and thus is feasible for practical applications.
The document discusses network security and provides an overview of five security services: message confidentiality, message integrity, message authentication, message nonrepudiation, and entity authentication. It describes how each of these services can be achieved using techniques like symmetric and asymmetric encryption, hashing, digital signatures, challenge-response authentication, and key management protocols.
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEijcisjournal
The certificate-based cryptosystems is traditional way in providing the system parameters. Identity-based
cryptography is more efficient than certificate-based cryptosystems. Each user in identity-based
cryptography uses any arbitrary string that uniquely identifies him as his public key. This paper proposes
a new identity-based tripartite signcryption scheme based on the elliptic curve discrete logarithm problem.
The proposed id-based tripartite signcryption scheme does not use the bilinear pairings in both the
Signcryption and unsigncryption phases. The proposed scheme used to reduce the communication over
head when three entities wants to communicate securely as in authentication protocol in GSM and in ecommerce.
The proposed scheme satisfies various desirable security properties. Also, the performance of
the proposed scheme is tested.
Block cipher encryption for text to-image algorithmIAEME Publication
This document describes a proposed Block-Cipher Text-to-Image (B-TTIE) encryption algorithm. It begins with an abstract discussing encrypting data during client-server communication to protect from hackers. It then provides background on encryption/decryption techniques like private key cryptography. The document proposes dividing text into blocks, encrypting each block into a separate PNG image using an individual key, improving on a previous Text-to-Image encryption algorithm. It discusses related work in text/character encryption and distinguishes the B-TTIE approach.
This document describes the implementation of Caesar cipher encryption and decryption programs in Java, C++, and Python. It discusses the key steps in the encryption and decryption methods. The encryption method reads plaintext from an input file, encrypts each character using a Caesar cipher shift defined by a user-input key, and writes the ciphertext to an output file. The decryption method performs the reverse process, reading ciphertext and writing decrypted plaintext. Helper methods are used to encrypt/decrypt single characters. Flow charts illustrate the code logic and relationships between methods.
This tool analyzes the secrecy and performance of symmetric key algorithms. It calculates secrecy based on Shannon's theories of cipher secrecy, giving a numerical value to represent secrecy level, with higher values indicating higher secrecy. It also calculates encryption time to evaluate performance. The tool was tested on common algorithms like AES, 3DES, DES, RC4, RC2. It reliably sorted the algorithms by secrecy and performance, consistent with established understandings. The tool is intended for researchers and engineers to evaluate new symmetric key algorithms by extending the code.
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
This document discusses the effect of encryption delay on TCP traffic over data networks. It presents results from simulations of four scenarios: 1) no encryption, 2) low encryption delay of 0.02ms, 3) medium encryption delay of 0.04ms, and 4) high encryption delay of 0.05ms. The results show that TCP delay, segment delay, end-to-end delay, and connection delay all increase as the encryption delay increases. Therefore, encryption delays can negatively impact network performance and congestion if not properly balanced with encryption algorithm complexity. Faster encryption algorithms should be used when network performance is prioritized over security.
Advanced Encryption Standard, Multiple Encryption and Triple DES, Block Cipher Modes of
operation, Stream Ciphers and RC4, Confidentiality using Symmetric Encryption, Introduction
to Number Theory: Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality, The
Chinese Remainder Theorem, Discrete Logarithms, Public-Key Cryptography and RSA
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Documenting Software Architectural Component and Connector with UML 2editor1knowledgecuddle
One of the major challenges facing consultants today is maintaining a level of knowledge of leading and emerging technologies, beyond the superficial or buzzword level. We need to develop a level of understanding that allows us to communicate effectively with both suppliers and customers.Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme. This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm. Keywords:Digital signature, Hashed message algorithm, MD5 Algorithm, Public key encryption, SHA2 Algorithm.
Introduction: OSI Security Architecture, Security attacks, ,Security Services, Security
Mechanisms, Model for Network Security, Fundamentals of Abstract Algebra : Groups, Rings,
Fields, Modular Arithmetic, Euclidean Algorithm, Finite Fields of the form GF(p),Polynomial
Arithmetic, Finite Fields of the form GF(2n),Classical Encryption techniques, Block Ciphers and
Data Encryption Standard.
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
This document describes the implementation of the Advanced Encryption Standard (AES) algorithm as a custom hardware accelerator connected to a Nios II processor system. AES was written in VHDL and connected to the Nios II system through GPIO pins. This allows AES operations to be controlled through C code in the Nios II IDE while running the AES algorithm in hardware, improving encryption speeds significantly compared to an all-software implementation. Synthesis results showed the hardware AES implementation reduced the number of clock cycles needed for encryption by over 99% compared to running AES solely in software on the Nios II processor.
ITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTIONIJNSA Journal
Cryptographic check values (digital signatures, MACs and H-MACs) are useful only if they are free of errors. For that reason all of errors in cryptographic check values should be corrected after the transmission over a noisy channel before their verification is performed. Soft Input Decryption is a method of combining SISO convolutional decoding and decrypting of cryptographic check values to improve the correction of errors in themselves. If Soft Input Decryption is successful, i.e. all wrong bit of a cryptographic check value are corrected, these bit are sent as feedback information to the channel decoder for a next iteration. The bit of the next iteration are corrected by channel decoding followed by another Soft Input Decryption. Iterative Soft Input Decryption uses interleaved blocks. If one block can be corrected by Soft Input Decryption, the decoding of the interleaved block is improved (serial scheme). If Soft Input Decryption is applied on both blocks and one of the blocks can be corrected, the corrected block is used for an improved decoding of the other block (parallel scheme). Both schemes show significant coding gains compared to convolutional decoding without iterative Soft Input Decryption.
.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
This document proposes a new color-based cryptography method called Play Color Cipher (PCC) as an improvement over traditional substitution ciphers. PCC works by substituting characters, numbers, and symbols with color blocks, where each color is represented by RGB values. During encryption, the plaintext is divided into blocks and the ASCII value of each character is encoded into one of the RGB channels of the corresponding color block. With over 16 million possible color combinations, PCC aims to increase complexity for attackers compared to other ciphers. The document outlines the encryption and decryption algorithms and argues that PCC can help strengthen security against common attacks like brute force and known/chosen plaintext attacks by vastly increasing the search space.
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...IJNSA Journal
This document summarizes an efficient and secure dynamic ID-based remote user authentication scheme for a multi-server environment. It begins with an abstract describing the scheme. It then reviews a previous related work by Hsiang-Shih that addressed security flaws in an earlier Liao-Wang scheme. The document proposes a new enhanced scheme that maintains the security properties of Hsiang-Shih's scheme while improving usability by not requiring the user to know the server's ID to generate login requests. It describes the registration, login, and mutual verification/session key agreement phases of the proposed scheme in detail.
The Fundamental of Secure Socket Layer (SSL)Vishal Kumar
"The Fundamental of SSL" it is the first part of this Topic in which we covered covers the deep understanding of Secure Socket Layer, its position in the TCP/IP suit, its sub protocols and the working or Handshake Protocol.
This document discusses lightweight cryptography. It begins by defining lightweight cryptography as cryptographic primitives designed for devices with limited resources like memory, speed and power consumption. It then outlines various lightweight cryptographic mechanisms like block ciphers, hash functions, stream ciphers and authenticated ciphers. For each mechanism, it discusses their desirable properties and design principles. It also discusses implementation issues like decryption costs and resistance to related key attacks. Finally, it mentions the Fair Evaluation of Lightweight Cryptographic Systems (FELICS) benchmarking tool for evaluating and comparing the performance of lightweight cryptographic algorithms on different platforms.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
This document summarizes a research paper on using elliptic curve cryptography for message authentication. It begins with an introduction to elliptic curve cryptography and how it can provide equivalent security to other public key encryption methods but with smaller key sizes. It then describes the proposed methodology which includes generating an ECC key pair, encrypting a message with the public key, transmitting the encrypted message, and decrypting it with the private key. The results show a message being encrypted and decrypted correctly using this ECC process. It concludes that ECC can provide an efficient method for authentication in systems like vehicular networks due to its lower computation and communication overhead compared to other encryption methods.
1. IPSec is a set of security protocols that provide privacy and authentication for IP communications. It has two main components: Authentication Header (AH) and Encapsulating Security Payload (ESP).
2. The Internet Key Exchange (IKE) and Oakley key determination protocol are used for automatic key management to establish Security Associations between IPSec nodes.
3. The ISAKMP framework defines procedures for establishing, negotiating, modifying and deleting Security Associations, including the exchange of key generation and authentication data payloads.
What is SMC. SMC Models. Type of Adversaries. Applications. Goals. Actions. Types of Operations. Randomization Techniques. Oblivious Transfer. Cryptographic Techniques
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
This document discusses encryption and decryption techniques using Bluetooth proximity on mobile devices. It begins with an abstract that outlines using an encryption algorithm to convert meaningful file information into unintelligible data that cannot be read without decrypting. The encryption key would be the Bluetooth MAC address of a registered device.
The introduction explains using AES encryption to encode files into unreadable data, with the Bluetooth MAC address as the decryption key. It also discusses how encryption provides data security for wireless communication.
The document then reviews cryptography purposes like authentication and confidentiality. It examines symmetric key cryptography using the same key for encryption and decryption, and public key cryptography using different keys. It also defines plain text, cipher text, and encryption/
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication scheme for smart card. Their scheme is more secure than the other previous schemes. In this paper, we show Tsai et al.’s scheme is vulnerable to password guessing attack and has computational overhead. Furthermore, we propose an enhanced password authentication scheme to eliminate the security vulnerability and enhance the overhead. By presenting concrete analysis of security and performance, we show that the proposed scheme cannot only resist various well known attacks, but also is more efficient than the other related works, and thus is feasible for practical applications.
The document discusses network security and provides an overview of five security services: message confidentiality, message integrity, message authentication, message nonrepudiation, and entity authentication. It describes how each of these services can be achieved using techniques like symmetric and asymmetric encryption, hashing, digital signatures, challenge-response authentication, and key management protocols.
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEijcisjournal
The certificate-based cryptosystems is traditional way in providing the system parameters. Identity-based
cryptography is more efficient than certificate-based cryptosystems. Each user in identity-based
cryptography uses any arbitrary string that uniquely identifies him as his public key. This paper proposes
a new identity-based tripartite signcryption scheme based on the elliptic curve discrete logarithm problem.
The proposed id-based tripartite signcryption scheme does not use the bilinear pairings in both the
Signcryption and unsigncryption phases. The proposed scheme used to reduce the communication over
head when three entities wants to communicate securely as in authentication protocol in GSM and in ecommerce.
The proposed scheme satisfies various desirable security properties. Also, the performance of
the proposed scheme is tested.
Block cipher encryption for text to-image algorithmIAEME Publication
This document describes a proposed Block-Cipher Text-to-Image (B-TTIE) encryption algorithm. It begins with an abstract discussing encrypting data during client-server communication to protect from hackers. It then provides background on encryption/decryption techniques like private key cryptography. The document proposes dividing text into blocks, encrypting each block into a separate PNG image using an individual key, improving on a previous Text-to-Image encryption algorithm. It discusses related work in text/character encryption and distinguishes the B-TTIE approach.
This document describes the implementation of Caesar cipher encryption and decryption programs in Java, C++, and Python. It discusses the key steps in the encryption and decryption methods. The encryption method reads plaintext from an input file, encrypts each character using a Caesar cipher shift defined by a user-input key, and writes the ciphertext to an output file. The decryption method performs the reverse process, reading ciphertext and writing decrypted plaintext. Helper methods are used to encrypt/decrypt single characters. Flow charts illustrate the code logic and relationships between methods.
This tool analyzes the secrecy and performance of symmetric key algorithms. It calculates secrecy based on Shannon's theories of cipher secrecy, giving a numerical value to represent secrecy level, with higher values indicating higher secrecy. It also calculates encryption time to evaluate performance. The tool was tested on common algorithms like AES, 3DES, DES, RC4, RC2. It reliably sorted the algorithms by secrecy and performance, consistent with established understandings. The tool is intended for researchers and engineers to evaluate new symmetric key algorithms by extending the code.
IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWOR...Budi Prasetiyo
ABSTRACT. Cryptography is required to secure the data networks communication. This study implements Twofish cryptographic algorithm using library Chilkat Encryption ActiveX Ms. Visual Basic. Twofish operate on a block of plaintext consisting of 128 bits. There are 3 steps in Twofish algorithm, the first step is divide input bit into 4 parts, the second step was performed XOR operation between bit input with a key, and the third step processing the input bits in 16 times Feistel network. To facilitate the implementation of the coding in Ms. Visual Basic we use Chilkat Encryption ActiveX. This research using agile methods with phases: plan, design, code, test, and release. Twofish algorithm implementation using Ms. Visual Basic and library Chilkat Encryption ActiveX can be used to secure the data. The data succeed to be encrypted or decrypted and irreversible. The program can be implemented to maintain the confidentiality of the data when transmitted over the Internet. The speed encryption process need 3 times longer than the decryption. Average of time in encryption process need 0,365 second, while decryption process need 0,0936 second.
Keywords: Data security, Twofish, Chilkat Encryption ActiveX
This document summarizes and compares the performance of three asymmetric cryptographic algorithms (RSA, ECC, and MQQ) on ARM processor-based embedded systems. It provides background on each algorithm, including how they work and their computational complexities. The document then describes simulations conducted using the SimpleScalar tool to analyze the processing time, memory usage, and processor usage of each algorithm. The results showed that the MQQ algorithm performed better than ECC and RSA on embedded systems in terms of these metrics.
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...IJECEIAES
This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol to enhance the services of the real-time applications such as increases the security level and reduces latency. The proposed algorithm was divided into two processes: dynamic key generation process using 128-bit hash value to dynamically alter the initial secret keys, and encryption and decryption process using Lorenz system. In the proposed algorithm, the performance evaluation is carried out through efficient simulations and implementations and statistical analysis. In addition, the average time delay in the proposed algorithm and some of the existing algorithms such as AES is compared. The obtained results concluded that, the proposed dynamic speech encryption algorithm is effectually secured against various cryptanalysis attacks and has useful cryptographic properties such as confusion and diffusion for better voice communication in the voice applications field in the Internet.
This document presents a design for a Near Field Communication (NFC) tag architecture that provides security using the AES encryption algorithm controlled by an 8-bit microcontroller. The architecture includes a framing logic unit, 8-bit microcontroller, cryptographic unit, and memory unit. The microcontroller controls data transmission and reception between these units. The cryptographic unit implements the AES algorithm using a controller, RAM, and data path. Implementation in VHDL showed the design requires significantly less area than previous state machine-based approaches. Future work will analyze attacks and further reduce the area requirement.
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
This document summarizes a research paper that proposes a new encryption algorithm to improve performance parameters. The algorithm is divided into two phases. Phase 1 involves reversing, swapping, circularly shifting bits of the plaintext and XORing with the key. Phase 2 divides the output into blocks, then recombines the left bits of each block. The paper analyzes avalanche effect and execution time of the proposed algorithm compared to existing algorithms to evaluate its performance. The results show better performance than existing algorithms.
This document discusses computer network security and cryptography. It begins with an introduction to the increasing importance of network security as ordinary users conduct banking and other sensitive activities online. It then describes the key aspects of network security - secrecy, authentication, nonrepudiation, and integrity control. The document goes on to present the design of a system to demonstrate encryption and decryption processes for securing data exchange between computers connected over an RF network. It describes the hardware and software components, including the encryption algorithm which performs XOR operations on data bytes with a table of ASCII encoded bytes. Test results are shown indicating the encrypted bytes output for various plain text bytes. The system is concluded to enable flexible encryption of data transmission with a high degree of security.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
In this paper we study the problem of mining support counts using symmetric-key crypto which is more
efficient than previous work. Consider a scenario that each user has an option (like or unlike) of the
specified product, and a third party wants to obtain the popularity of this product. We design a much more
efficient privacy-preserving scheme for users to prevent the loss of the personal interests. Unlike most
previous works, we do not use any exponential or modular algorithms, but we provide a symmetric-key
based method which can also protect the information. Specifically, our protocol uses a third party that
generates a number of matrixes as each user’s key. Then user uses these key to encrypt their data which is
more efficient to obtain the support counts of a given pattern.
Data Security Using Elliptic Curve CryptographyIJCERT
Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.
An area and power efficient on chip communication architectures for image enc...eSAT Publishing House
1. The document describes two area and power efficient on-chip communication architectures proposed for image encryption and decryption using a single soft processor (MicroBlaze) on an FPGA.
2. The architectures are implemented using Xilinx Platform Studio on a Spartan6 FPGA. One is based on a Processor Local Bus and the other on an AMBA AXI interconnect.
3. The designs consume low power (0.67W) and occupy only 19% of FPGA resources. Experimental results show encryption and decryption of images takes 45 seconds.
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
The document describes a proposed system for secure data storage on cloud systems using elliptic curve cryptography and Shamir's secret sharing algorithm. It discusses how ECC and secret sharing can be used to encrypt data before storing it on the cloud to preserve privacy. The system aims to provide security services like confidentiality. It generates keys using ECC and secret sharing that are shared with authenticated users to allow access to encrypted data stored on the cloud. The system reduces storage and computational overhead for the customer and cloud storage server.
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
This document summarizes a research paper that proposes a new method for securely transmitting images using image segmentation, permutation, and multi-encryption techniques. It begins with an abstract that outlines encrypting images to protect confidential data from unauthorized access. It then provides background on encryption and discusses how traditional text encryption is not suitable for large image files. The proposed method segments an image, permutes the pixels using random numbers, and repeats the encryption multiple times for security. It claims this approach provides strong encryption with minimal data loss or computational costs compared to other methods.
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
This document discusses various cryptographic techniques for securing data shared over cloud computing. It begins with an introduction to cloud computing and the types of cloud services. It then discusses some critical threats to cloud security like unauthorized access, lack of integrity checks, and denial of service attacks. The document analyzes popular encryption algorithms like RSA, AES, DES, Blowfish and IDEA that can be applied for cloud data security. It provides details on how each algorithm works and compares their characteristics. The document concludes that a multilevel security architecture applying multiple encryption algorithms is needed to securely transmit data over the cloud.
Design of Automatic Identification and Sorting System for Parcels Based on Pl...IJRESJOURNAL
ABSTRACT:With the rise of the electricity industry, to the logistics sorting industry caused great pressure to design a PLC (programmable logic controller) based on control, combined with Kingview software, and the application of bar code recognition technology, automatic identification and sorting system. According to the structure of the system, the working principle of the system is analyzed, the control requirements are put forward, and the hardware design, software design and configuration process design of the control system are carried out. Using PLC as the next bit machine to improve the acquisition signal and control signal accuracy, and can be based on functional requirements on-site modification and commissioning procedures at the same time easy maintenance. Application configuration Wang as the host configuration software, users can easily adapt to their own needs to adapt to the data acquisition system, real-time monitoring system operating status, protection of information flow, very consistent with the needs of modern production.
The document describes the Hummingbird ultra-lightweight cryptographic algorithm targeted for resource-constrained devices. It presents the hybrid model of Hummingbird which combines a block cipher and stream cipher. The algorithm uses a 256-bit key, 80-bit internal state, and 16-bit blocks. It consists of four 16-bit block ciphers and registers that encrypt plaintext blocks through consecutive operations. Simulation results show it encrypting a sample plaintext into ciphertext on an FPGA with lower area requirements than other lightweight algorithms. The algorithm is suitable for high-security embedded applications with limited resources.
This document describes a distributed intrusion detection system based on honeypots. It proposes using honeypots to collect invasion characteristics on the network and genetic clustering algorithms to extract data for analysis. The system combines protocol analysis and signature detection modules to improve detection performance. An evaluation using KDDCUP 99 intrusion data showed the system can better detect intrusions and improve network security compared to traditional intrusion detection systems.
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
In this paper we study the problem of mining support counts using symmetric-key crypto which is more
efficient than previous work. Consider a scenario that each user has an option (like or unlike) of the
specified product, and a third party wants to obtain the popularity of this product. We design a much more
efficient privacy-preserving scheme for users to prevent the loss of the personal interests. Unlike most
previous works, we do not use any exponential or modular algorithms, but we provide a symmetric-key
based method which can also protect the information. Specifically, our protocol uses a third party that
generates a number of matrixes as each user’s key. Then user uses these key to encrypt their data which is
more efficient to obtain the support counts of a given pattern.
FPGA Based Implementation of Electronic Safe LockIOSR Journals
Thispaper is based on design of an “Automatic Security System Using VHDL” providing
understandable and adequate operating procedure to the user. The operation is conducted by six different
modules. If any of the modules fails, the failed module can be replaced without affecting the activity of others.
The safety is ensured to the user by setting a secret code number which is the combination of three numbers, by
doing so, only the authorized users can unlock the safe. The paper finds its appositeness in big organizations,
military and banking sectors. Simulation through VHDL is quite generous and fiscal due to the reduction in
number of components. Important operation consideration is to not give any indication to the user that the
combination entered is incorrect until after the user has entered the all three numbers and pressed the OPEN
key. Otherwise, it is possible for a user to determine the combination in no more than 96 attempts, as opposed to
no more than 32,768 attempts
Similar to Design Package to Build and Evaluate Encryption Algorithms (20)
Land Cover maps supply information about the physical material at the surface of the Earth (i.e. grass, trees, bare ground, asphalt, water, etc.). Usually they are 2D representations so to present variability of land covers about latitude and longitude or other type of earth coordinates. Possibility to link this variability to the terrain elevation is very useful because it permits to investigate probable correlations between the type of physical material at the surface and the relief. This paper is aimed to describe the approach to be followed to obtain 3D visualizations of land cover maps in GIS (Geographic Information System) environment. Particularly Corine Land Cover vector files concerning Campania Region (Italy) are considered: transformed raster files are overlapped to DEM (Digital Elevation Model) with adequate resolution and 3D visualizations of them are obtained using GIS tool. The resulting models are discussed in terms of their possible use to support scientific studies on Campania Land Cover.
Comparison between Cisco ACI and VMWARE NSXIOSRjournaljce
Software-Defined Networking(SDN) allows you to have a logical image of the components in the data center, also you could arrange the components logically and use them according to the software application needs. This paper gives an overview about the architectural features of Cisco’s Application Centric Infrastructure (ACI) and Vmware’s NSX and also compares both the architectures and their benefit
Student’s Skills Evaluation Techniques using Data Mining.IOSRjournaljce
This document discusses techniques for evaluating students' programming skills using data mining. It proposes using association rule mining to analyze student data and accurately predict their programming abilities. The key steps involve collecting student performance data, preprocessing the data, extracting features, clustering students based on skills, generating rules for skill evaluation, and predicting student skill types based on the rules. The overall goal is to help educational institutions and companies better evaluate programming skills to improve student training and increase placement opportunities.
Data mining is a process to extract information from a huge amount of data and transform it into an
understandable structure. Data mining provides the number of tasks to extract data from large databases such
as Classification, Clustering, Regression, Association rule mining. This paper provides the concept of
Classification. Classification is an important data mining technique based on machine learning which is used to
classify the each item on the bases of features of the item with respect to the predefined set of classes or groups.
This paper summarises various techniques that are implemented for the classification such as k-NN, Decision
Tree, Naïve Bayes, SVM, ANN and RF. The techniques are analyzed and compared on the basis of their
advantages and disadvantages
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
: Virtualization and cloud computing is creating a fundamental change in computer architecture,
software and tools development, in the way we store, distribute and consume information. In the recent era of
autonomic computing it comes the importance and need of basic concepts of having and sharing various
hardware and software and other resources & applications that can manage themself with high level of human
guidance. Virtualization or Autonomic computing is not a new to the world, but it developed rapidly with Cloud
computing. In this paper there give an overview of various types of computing. There will be discussion on
Cluster, Grid computing, Utility & Cloud Computing. Analysis architecture, differences between them,
characteristics , its working, advantages and disadvantages
: Cloud processing is turning into an inexorably mainstream endeavor demonstrate in which figuring assets are made accessible on-request to the client as required. The one of a kind incentivized offer of distributed computing makes new chances to adjust IT and business objectives. Distributed computing utilizes the web advancements for conveyance of IT-Enabled abilities 'as an administration' to any required clients i.e. through distributed computing we can get to anything that we need from anyplace to any PC without agonizing over anything like about their stockpiling, cost, administration etc. In this paper, I give a far-reaching study on the inspiration variables of receiving distributed computing, audit the few cloud sending and administration models. It additionally investigates certain advantages of distributed computing over customary IT benefit environment-including versatility, adaptability, decreased capital and higher asset usage are considered as appropriation explanations behind distributed computing environment. I additionally incorporate security, protection, and web reliance and accessibility as shirking issues. The later incorporates vertical versatility as specialized test in cloud environment.
An Experimental Study of Diabetes Disease Prediction System Using Classificat...IOSRjournaljce
Data mining means to the process of collecting, searching through, and analyzing a large amount of data in a database. Classification in one of the well-known data mining techniques for analyzing the performance of Naive Bayes, Random Forest, and Naïve Bayes tree (NB-Tree) classifier during the classification to improve precision, recall, f-measure, and accuracy. These three algorithms, of Naive Bayes, Random Forest, and NB-Tree are useful and efficient, has been tested in the medical dataset for diabetes disease and solving classification problem in data mining. In this paper, we compare the three different algorithms, and results indicate the Naive Bayes algorithms are able to achieve high accuracy rate along with minimum error rate when compared to other algorithms.
Candidate Ranking and Evaluation System based on Digital FootprintsIOSRjournaljce
Digital resume provides insights about a candidate to the organization. This paper proposes a system where digital resumes of candidates are generated by extracting data from social networking sites like Facebook, Twitter and LinkedIn. Data which is relevant to recruitment is obtained from unstructured data using Data Mining algorithms. Candidates are evaluated based on their digital resumes and ranked accordingly. Ranking is done based on the requirements specified by an organization for a key position. The key aspects of this paper are a) Specification and design of system. b) Generation of digital Resume. c) Ranking of candidates. According to the ranking provided by this system, Recruiters can shortlist candidates for interviews. Thus, it revolutionizes the traditional recruitment process.
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...IOSRjournaljce
Cervical cancer is the highest rate of incidence after breast cancer, gastric cancer, colorectal cancer, thyroid cancer among all malignant that occurs to females ; also it is the most prevalent cancer among female genital cancers. Manual cervical cancer diagnosis methods are costly and sometimes result inaccurate diagnosis caused by human error but machine assisted classification system can reduce financial costs and increase screening accuracy. In this research article, we have developed multi class cervical classification system by using Pap Smear Images according to the WHO descriptive Classification of Cervical Histology. Then, this system classifies the cell of the Pap Smear image into anyone of five types of the classes of normal cell, mild dysplasia, moderate dysplasia, severe dysplasia and carcinoma in situ (CIS) by using individual and Combining individual feature extraction method with the classification technique. In this paper three Feature Extraction methods were used: From that three, two were individual feature extraction method namely Enriched Rough Set Texton Co-Occurrence Matrix (ERSTCM) and Enriched Micro Structure Descriptor (EMSD) and the remained one was combining individual feature extraction method namely concatenated feature extraction method (CFE). The CFE method represents all the individual feature extraction methods of ERSTCM & EMSD features are combining together to one feature to assess their joint performance. Then these three feature extraction methods are tested over Fuzzy Logic based Hybrid Kernel Support Vector Machine (FL-HKSVM) Classifier. This Examination was conducted over a set of single cervical cell based pap smear images. The dataset contains five classes of images, with a total of 952 images. The distribution of number of images per class is not uniform. Then the performance was evaluated in both the individual and combining individual feature extraction method with the classification techniques by using the statistical parameters of sensitivity, specificity & accuracy. Hence the resultant values of the statistical parameters described in individual feature extraction method with the classification technique, proposed EMSD+FLHKSVM Classifier had given the better results than the other ERSTCM+FLHKSVM Classifier and combining individual feature extraction method with the classification technique described, proposed CFE+FLHKSVM Classifier had given the better results than other EMSD+FLHKSVM & ERSTCM+FLHKSVM classifiers.
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...IOSRjournaljce
As we probably aware now a days networks are broadly dispersed so administrators relies on upon different devices, for example, pings and follow course to troubleshoot the issue in network. So we proposed a robotized and orderly approach for testing and troubleshooting network called "Automatic Test Packet Generation"(ATPG). ATPG first peruses switch arrangement and produces a gadget free model. The model is utilized to produce least number of test packets to cover each connection in a network and every control in network. ATPG is equipped for researching both useful and execution issues. Test packets are sent at customary interims and separate strategy is utilized to confine flaws. The working of few disconnected devices which automatically create test packets are additionally given, yet ATPG goes past the prior work in static (checking liveness and fault localization).
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemIOSRjournaljce
Big data problem in intrusion detection system is mainly due to the large volume of the data. The dimension of the original data is 41. Some of the feature of original data are unnecessary. In this process, the volume of data has expanded into hundreds and thousands of gigabytes(GB) of information. The dimension span of data and volume can be reduced and the system is enhanced by using K-NN and BA. The reduction ratio of KDD datasets and processing speed is very slow so the data has been reduced for extracting features by Bees Algorithm (AB) and use K-nearest neighbors as classification (KNN). So, the KDD99 datasets applied in the experiments with significant features. The results have gave higher detection and accuracy rate as well as reduced false positive rate. Keywords: Big Data; Intru
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...IOSRjournaljce
The purpose of the study is to explore and find a research gap in E-Governance Information Security (InfoSec) domain in Indian Context. The study identifies the research gap in E-Governance InfoSec domain and substantiates given research gap with relevant literature review. The study outcomes clearly depict the requirement of research in the field of InfoSec in e-governance domain in a country like India.
This document analyzes the security vulnerabilities of 26 e-governance websites and web applications in Gujarat, India. It finds that the majority (61.88%) used Microsoft technologies while 38.13% used Apache. Both technologies were most vulnerable to low and medium severity issues. Microsoft sites saw more validation vulnerabilities while Apache sites saw more configuration and informational vulnerabilities. High severity flaws were usually configuration-based, medium flaws validation-based, and low/informational flaws informational-based. The study aims to improve e-governance security by analyzing technology risks and vulnerability types.
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsIOSRjournaljce
: In spatial tasks, the use of cognitive aids reduce mental load and therefore being appealing to trainers and trainees. However, these aids can act as shortcuts and prevents the trainees from active exploration which is necessary to perform the task independently in non-supervised environment. In this paper we used adaptive repetition as control strategy to explore the 3D- Virtual Learning environments. The proposed approach enables the trainee to get the benefits of cognitive support while at the same time he is actively involved in the learning process. Experimental results show the effectiveness of the proposed approach
Human Face Detection Systemin ANew AlgorithmIOSRjournaljce
Trying to detecting a face from any photo is big problem and got these days a focusing because of it importance, in face recognition system,face detection in one of the basic components. A lot of troubles are there to be solved in order to create a successful face detection algorithm. The skin of face has its properties in color domain and also a texture which may help in the algorithm for detecting faces because of its ability to find skins from photo. Here we are going to create a new algorithm for human face detection depending on skin color tone specially YCbCr color tone as an approach to slice the photo into parts. In addition, Gray level has been used to detect the area which contains a skin, after that anotherlevel used to erase the area that does not contain skin. The system which proposed applied on many photos and passed with great accuracy of detecting faces and it has a good efficient especially to separate the area that does not contain skin or face from the area which contain face and skin. It has been agreed and approved that the accuracy of the proposed system is 98% in human face detection.
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...IOSRjournaljce
The paper presents an innovative approach to mathematical modeling of complex systems „humandynamical process”. The approach is based on the theory of measurement and utility theory and permits inclusion of human preferences in the objective function. The objective utility function is constructed by recurrent stochastic procedure which represents machine learning based on the human preferences. The approach is demonstrated by two case studies, portfolio allocation with Wiener process and portfolio allocation in the case of financial process with colored noise. The presented formulations could serve as foundation of development of decision support tools for design of management/control. This value-oriented modeling leads to the development of preferences-based decision support in machine learning environment and control/management value based design.
Assessment of the Approaches Used in Indigenous Software Products Development...IOSRjournaljce
This document summarizes a study that assessed approaches used in indigenous software product development in Nigeria. It involved surveying software development firms and educational institutions. The commonly used approaches identified were spiral, agile, prototyping, object-oriented, rotational unified process, incremental, waterfall, and integrated. Spiral, agile and prototyping approaches had the highest ratings. The study found significant differences in how these approaches were used and their impact on domestic software use and industry growth in Nigeria.
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
The Data sharing is an important functionality in cloud storage. We describe new public key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. Ensuring the security of cloud computing is second major factor and dealing with because of service availability failure the single cloud providers demonstrated less famous failure and possibility malicious insiders in the single cloud. A movement towards Multi-Clouds, In other words ”Inter-Clouds” or ”Cloud-Of-Clouds” as emerged recently. This works aim to reduce security risk and better flexibility and efficiency to the user. Multi-cloud environment has ability to reduce the security risks as well as it can ensure the security and reliability.
Panorama Technique for 3D Animation movie, Design and EvaluatingIOSRjournaljce
This paper presents an applied approach for Panorama 3D movies enhanced with visual sound effects. The case study that considered is IIPS@UOIT. Many selected S/W have been used to introduce the 3D Movie. 3D Animation is a modern technology in the field of the world of filmmaking and is considered the core of multimedia, where the vast majority of movies such as Hollywood movies that we see today, it was using 3D technology. Where this technique is used in all the magazines, such as medical experiments, engineering, astronomy, planets and stars, to prove scientific theories, history, geography, etc., where they are building models or scenes or characters simulates reality and the movement of the viewer to the heart of the event. A three-dimensional film was made to (IIPS @ UOITC) to give it a future vision and published in the global sites such as YouTube, Facebook and Google earth. By using many specialized 3d software and cinematic tricks, with a focusing on movement, characters, lighting, cameras and final render.
Density Driven Image Coding for Tumor Detection in mri ImageIOSRjournaljce
The significant of multi spectral band resolution is explored towards selection of feature coefficients based on its energy density. Toward the feature representiaon in transformed domain, multi wavelet transformations were used for finer spectral representation. However, due to a large feature count these features are not optimal under low resource computing system. In the recognition units, running with low resources a new coding approach of feature selection, considering the band spectral density is developed. The effective selection of feature element, based on its spectral density achieve two objective of pattern recognition, the feature coefficient representiaon is minimized, hence leading to lower resource requirement, and dominant feature representation, resulting in higher retrieval performance.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
A review on techniques and modelling methodologies used for checking electrom...
Design Package to Build and Evaluate Encryption Algorithms
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 1, Ver. II (Jan.-Feb. 2017), PP 75-83
www.iosrjournals.org
DOI: 10.9790/0661-1901027583 www.iosrjournals.org 75 | Page
Design Package to Build and Evaluate Encryption Algorithms
Prof. Dr. Salim Ali Abbas,Ali Jumaa Hashim
(Department of Computer Science, College of Education/ Al-Mustansiriya University, Iraq)
Abstract : Building secure stream cipher algorithm in fast and comfortable manner is consider point of interest
for most of those interested in building encryption algorithms to conceal their information and prevent detection
it by unauthorized persons. The main goal of this paper is to design a package to implement and evaluate most
of stream cipher algorithms in fast, convenient manner. The package provides the ability to the designer to
design stream cipher algorithms either visually or by C# programming language. The proposed package
provides number of the components required to build stream cipher algorithm, while providing the potentiality
of linking these components to enable the exchange of data among them when running the algorithm, it has also
been providing the potentiality of testing the key produced by designed algorithm. Testing performed by
applying fourteen statistical tests that provided by NIST and all these fourteen tests executed in parallel to
reduce theirexecution time. It also provides the possibility to use the designed stream cipher algorithm to
encrypt any plaintext and decrypt any cipher text.
Keywords: Design,Evaluating,NIST statistical tests, Package, Stream cipher algorithm
I. Introduction
In the information age, where digital communication techniques and digital storage device have
emerged, and because of these technological developments, the need to find a way to protect information from
theft and prevent disclosure of information of unauthorized people has emerged [1]. Cryptography is deals with
design and analysis of mathematical techniques that allowsafe communications in the existence of wicked
opponents [2]. Encryption is one of the technique by which can hide information and turn it into another form
that is not understand. Encryption is a service that achieve the confidentiality of data, given the importance of
encryption to provide confidentiality of data, so building encryption algorithm, implemented and tested is of
great importance for specialists and those that interested in the field of encryption [3].
Encryption algorithm is classified into two types according to the number of keys used for encryption,
the first type is symmetric encryption, in this type used one secret key that shared between the communication
parties (the sender and the recipient). The second type is asymmetric encryption, in this type used two keys, the
first public and open for everyone, and the second is kept secret, and in this type one key cannot be inferred
from the other keys [4]. Asymmetric encryption is slow because it's based on mathematical theories, which is
impractical in applications that require live and direct processing. In symmetric encryption, there are two types
of algorithms, Block algorithm and Stream algorithm, in Block encryption algorithm the plaintext dividing into
blocks of bits. Famous Block algorithms are AES and DES [5]. Stream cipher is the encryption system
developed by Claude Shannon after studying encryption system one-time pad, and developed stream cipher as a
solution to the problems of encryption one-time pad system. In encryption system, one-time pad the key must
be completely random and its length is equal to the length of the message to be encrypted and uses one time,
because of the impracticability of one-time pad system so stream encryption system consider acceptable solution
to these problems. In the stream cipher algorithm, pseudo-random key is generated using one of pseudo-random
generator [6]. Encryption is done by dividing the clear text into bits and then every bit is encrypted individually.
Stream algorithm relies entirely on security of pseudorandom key stream. To design stream algorithm, the
designer can use several components and methods, the LFSR is most popular components used in the
constructing of stream algorithm [7].
II. The Proposed Package Overview
The proposed package consists of three major parts. The first part is building any stream cipher
algorithms (whose components are available in the proposed package) visually or by using programming
language code. The second part is evaluating the keystream produced the designed stream cipher algorithms
using fourteen statistical tests (with the exception of a discrete fourier transform test)that provided by NIST to
measure the randomness proprieties of the key stream. The third part is encrypting and/or decrypting any text
message. This paper describes the steps which are taken to design the proposed package.
2. Design Package to Build and Evaluate Encryption Algorithms
DOI: 10.9790/0661-1901027583 www.iosrjournals.org 76 | Page
III. Building Stream Cipher Algorithm
To build stream cipher algorithms, there are two approach. The first one is building stream cipher
visually through provide the required components and provide the potentiality to link these components to
generate sequence of bits. The second is building stream cipher algorithm through C# programming language.
The proposed package provides the two approach. The following sections will discuss how provide these two
approaches for constructing stream cipher algorithm in the proposed package.
3.1 Building Stream Cipher Visually:
To build stream cipher algorithm there are number of components that package provides. The common
component is a LSFR, and also there are number of other components such as logical gates (XOR, AND, OR,
NOR, NOT, NAND, JK), Table, Inner product, police and other components, to constructing stream cipher
algorithm the designer has to drag the required components from the stream component list and drop it on area
that allocated to building stream cipher algorithm. Fig1 shown the structure of proposed package.
Fig.1:Structure of the proposed package.
3.1.1 Design of the Main Interface
The main interface of the proposed package consists of different parts as shown in fig2.The interface consists of
four parts, the buttons bar, design area, stream cipher components bar, and information box.
Fig.2:Main interface.
Following is descriptions of each part:
1- Buttons bar has following buttons:
a) Button for generate one bit from the designed keystream generator in each click.
b) Button for generate sequence of bits in each click, length of desired sequence enters in the textbox.
c) Button for open the window of NIST statistical tests that used in evaluate any sequence of binary bit that
produce from keystream generator that design in the package or outside of package.
d) Button for open the window of design stream cipher algorithms using C# programming language.
3. Design Package to Build and Evaluate Encryption Algorithms
DOI: 10.9790/0661-1901027583 www.iosrjournals.org 77 | Page
e) Two buttons to save and load designed stream cipher algorithm.
f) Button for delete any selected stream cipher components.
g) Text box used to enter the following:
1) The length of LFSR and table components.
2) To enter the content of LFSR and table. Text box also used to enter a number that represent the
length of sequence to be generated from the designed keystream generator in the design area.
2- Design area
It is area allocated to design keystream generator visually through drag any desired components from
components list and drop them on the design area,
3- Stream cipher components
It is a list of stream cipher components that used in constructed keystream generator.
4- Information box
This text box used to show information about stream cipher components that exist in design area.
3.1.2 Design of Stream Cipher Components
To construct stream cipher algorithm there are number of components, the common component is the
shift register. Every component further decomposes into three subcomponents, the first is the input, second is
processing, the third is output. Each subcomponent will represent in the package by different class. Fig.3 shown
the visual representation of the stream cipher component.
Fig.3:Generaldesign of stream cipher component.
Each component either accept one input or more than one input and has one output. Input box and output box
will represent in package by separate class, each class has the following proprieties and function:
1- Proprieties called state, store either 1 or 0.
2- A mechanism to inform other component object that associated with when its state value changed.
3.1.3 Description of the Mechanism to Connect SCA Components
After putting all the stream cipher components on the design area in the main interface, the designer
start to make connections among the components to allow of passing data among connected components. Fig.4
shown the scenario of linking two components(Comp1 and Comp2), each has one input and one output.
Fig.4:Example of connecting two components.
4. Design Package to Build and Evaluate Encryption Algorithms
DOI: 10.9790/0661-1901027583 www.iosrjournals.org 78 | Page
To make connection between Output1 object that belong to comp1 and Input2 object that belong to
Comp2, the designer first clicks on the Output1 of Comp1, then the designer clicks on the Input2 object of
Comp2, after that the connection line will appear connecting the two components and it is imply the success of
connection.
3.1.4 Design of Stream Cipher Algorithm Components
There are different stream cipher components that can represent visually in the package. In following
sections discussed the design of each component, how processing data that input to it, and how inform other
components that linked to of changing in its state.
1- Shift Register Component
Fig.5 shows the design of the shift register.LFSR consists of cells that store each one only 1 or 0, each
cell has two output box that used in link the cell to other components, except first cell that contain two output
box and one input box, the input box used to feed new bit to the register. The register also has clock box as
pointed in fig.5, it is used to control the shifting operation in the LFSR such that if the state of clock box is zero
then there is no shifting, otherwise, if the state is equal to one, the shift operation is allowed.
Fig.5:Design of LFSR.
2- Police Component
Police component consists of three input and one output components. Fig.6 shown the visual representation of
the police in the package:
Fig.6:Design of police component.
As in fig.6, if the state of Inputbox2 is equal to 0, the police output will be the state of the Inputbox1, otherwise
if the Inputbox2 is equal to 1, the police output will be the state of the Inputbox3.
3- The logical gates
All logical gates consist of two input and one output except “NOT gate” which contain only one input.
The proposed package provides gates: XOR, OR, AND, NOR, NAND, NOT. Fig.7 shows visual representation
of the logical gate.
5. Design Package to Build and Evaluate Encryption Algorithms
DOI: 10.9790/0661-1901027583 www.iosrjournals.org 79 | Page
Fig.7:Design of logical gate component.
The logical gate as shown in fig7. For example, if the logical gate is XOR, if the state of Inputbox1 and
the state of Inputbox2 are both equal 1 or 0, then the XOR gate will output 0, otherwise, if the state of Inputbox1
and the state of Inputbox2 are different value, then the XOR gate will output 1.
5-Table
Fig.8 shown the table component in the package.The table can accept more than one input. Fig.9 shown the
scenario of connecting three logical gates to the table.
Fig.8:Design of table component.
Fig.9:Example of connecting table.
6. Design Package to Build and Evaluate Encryption Algorithms
DOI: 10.9790/0661-1901027583 www.iosrjournals.org 80 | Page
Each output object that connected to table has variable called state store the output of gate. If the
designer first connects gate1 to table then connect gate2 and last gate3, if states of the of output objects of all
gates are 0,1,1 respectively, then the table convert all states of the that gates to the decimal number and output
the value of cell that its index is equal to the calculated decimal number.
3.2 Building Stream Cipher Algorithms by C# Programming Language
Fig.10 shows the package‟s interface of build stream cipher algorithm by C# programming language.
Fig.10:C# compiler interface.
The designer can enter the C# code of any stream cipher algorithm in C# code box or can import the C# code by
click on the import button in button bar. After enter C# code, the designer has to click on the Run button in
button bar to start compiling and execute of entered code. After execute the entered C# code, the output of C#
code will appear in output box. Any syntax error in the entered code this will show error message in the error
box as pointing in fig.10.
4. Design Encryption/Decryption Interface
Fig.11 shows the package‟s interface of encryption and decryption.In the interface, there are number of buttons
that perform following actions:
Fig.11:Encryption/decryption interface.
1- Import any text to encrypt it or decrypt.
2- Import any key file to use it in encryption/decryption process.
3- Clear all text in text boxes.
When the designer clicks on the encrypt button, the following actions will perform:
1- Convert the plain text and key stream characters to a sequence of byte.
2- Mix the key bytes with plaintext bytes by using XOR function, the result represents the cipher text. The
cipher text stored in new array.
3- The new sequence that produce from mix plaintext with key stream will appear in Textbox2 in the
encryption /decryption interface.
To decrypt the cipher text, the designer has to do the following
7. Design Package to Build and Evaluate Encryption Algorithms
DOI: 10.9790/0661-1901027583 www.iosrjournals.org 81 | Page
1-Import the cipher text file through click on import Plain/cipher text button.
2-Import the key stream used in produce the cipher text.
3-Click on the Encrypt/Decrypt button to start mixing the cipher bytes with key bytes, the result is the
plaintext and will appear in the Textbox2.
IV. Design of Evaluation Interface
Fig.12 shown the structure of the evaluation interface. The interface shown all fifteen NIST statistical tests with
its P-values and the state of the test whether it‟s pass or fail.
Fig.12:Evaluation interface.
The evaluation interface contain table that shown information about 14 statistical tests as shown in fig.12.
The buttons bar contains two buttons:
1- Button for import the sequence of binary bit that to be test
2- Button for start of applying 14 NIST statistical tests.
V. Design Number of Keystream Generators and Evaluate the Produced Key
Following is implementation and evaluation of six keystream generators that have been built by the proposed
package.
6.1 Building Geffe Generator and Evaluate the Produced key
Fig.13 shows the components of geffe and connection lines among them as executed in the package.
The designed geffe generator has been tested and fig.14 shown the results of apply fourteen NIST statistical
tests.The designed geffe generator consists of three LFSR, two AND gate, one Not gate, one XOR function. All
LFSRs are initialized with value “fff”.
Fig.13:Designed geffe algorithm.
8. Design Package to Build and Evaluate Encryption Algorithms
DOI: 10.9790/0661-1901027583 www.iosrjournals.org 82 | Page
Fig.14:Results of test geffe‟s key.
The figure shown that only 6 tests are passed from total of 14 tests.
6.2 Design New Keystream Generator and Evaluate the Produced Key
Some information about the new designed generator:
1- Number of used LFSRs are 6; LFSRs have lengths: (11, 4, 7, 19, 5, 13).
2- Other components used are: Police, JK flip flop, Table, XOR gate.
3- Length of Table component is 256, and initialize with value
” abcdefghijklmnopqrstuvwxyzabcde”.
Fig.15 shows the designed key stream generator.
Fig.15:New keystream generator.
Fig.16 shown the results of apply 14 NIST statistical tests to the bit sequence of length 1425 produced from the
designed generator.
Fig.16:Results of testing the key of new keystream generator.
9. Design Package to Build and Evaluate Encryption Algorithms
DOI: 10.9790/0661-1901027583 www.iosrjournals.org 83 | Page
6.3 Implement and Evaluate RC4 Stream Cipher Algorithm
Fig.17 shows build stream cipher algorithm by the proposed package, the algorithm is RC4 and has been built
by enter C# code of RC4.
Fig.17:The implementation of RC4.
After save the key produced by the code of RC4 in text file, the key should save as binary sequence of „1‟ and
„0‟. Fig.18 shown the result of apply 14 statistical tests on the produced key of RC4. Length of tested key
sequence is 2040 bits.
Fig.18:Results of test RC4‟s key.
The figure above shows 13 tests from a total of 14 tests are passed and only 1 tests are fail.
VI. Conclusion
We have developed package which capable of design any stream cipher algorithm either visually from
the existing components that provided by the proposed package or by enter the C# code of stream cipher
algorithm. Also, the proposed package provided to the designer the ability to evaluate the keystream which
produced by the designed algorithm, the evaluation is done by apply fourteen statistical tests which provided by
NIST, all these fourteen tests is executed in parallel in the package to speed up the execution time of these tests.
References
[1] Rainer A. Rueppel, Analysis and Design of Stream Ciphers (Berlin, Springer, 1986).
[2] Darrel Hankerson, Alfred Menezes, Scott Vanstone,Guide to Elliptic Curve Cryptography (New York, Springer, 2004).
[3] William Stallings, Cryptography and Network Security Principles and Practice (Boston, Pearson, 2011).
[4] Richard R. Brooks, Introduction to Computer and Network Security (Boca Raton, CRC Press, 2014).
[5] Christof Paar and Jan Pelzl, Understanding Cryptography a Textbook for Students and Practitioners (Berlin, Springer, 2010).
[6] M.J.B. Robshaw, Stream Ciphers RSA Laboratories Technical Report TR-701(Redwood City, CA, RSA Laboratories, 1995).
[7] Andreas Klein, Stream Cipher (London, Springer, 2013).