Most of the information is in the form of electroni
c data. A lot of electronic data exchanged
takes place through computer applications. Therefor
e information exchange through these
applications needs to be secure. Different cryptogr
aphic algorithms are usually used to address
these security concerns. However, along with securi
ty there are other factors that need to be
considered for practical implementation of differen
t cryptographic algorithms like
implementation cost and performance. This paper pro
vides comparative analysis of time taken
for encryption by seven symmetric key cryptographic
algorithms (AES, DES, Triple DES, RC2,
Skipjack, Blowfish and RC4) with variation of param
eters like different data types, data density,
data size and key sizes.
Analysis and comparison of symmetric keyIJNSA Journal
The document analyzes and compares the performance of symmetric key cryptographic algorithms based on various file features such as data type, size, density, and key size. It tests the encryption time of algorithms like AES, DES, Triple DES, RC2, Blowfish, Skipjack and RC4 on different data types, file sizes ranging from 10MB to 482MB, and files with different data densities. The results show that encryption time is not affected by data type but increases proportionally with file size and number of bytes. Encryption time is also similar for sparse and dense files of comparable sizes. RC4 has the fastest encryption time while AES time is low compared to other block ciphers.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
This document describes the implementation of the Advanced Encryption Standard (AES) algorithm as a custom hardware accelerator connected to a Nios II processor system. AES was written in VHDL and connected to the Nios II system through GPIO pins. This allows AES operations to be controlled through C code in the Nios II IDE while running the AES algorithm in hardware, improving encryption speeds significantly compared to an all-software implementation. Synthesis results showed the hardware AES implementation reduced the number of clock cycles needed for encryption by over 99% compared to running AES solely in software on the Nios II processor.
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
1. The document discusses a hardware-software co-design of the AES encryption algorithm implemented on the NIOS II soft-core processor on an FPGA.
2. It proposes using a hardware-software co-design methodology to implement AES for encryption and decryption of 128-bit blocks using 128, 192, or 256-bit keys.
3. The implementation will utilize the Quartus II software tools and NIOS II integrated development environment to program the FPGA with the AES algorithm designed around the NIOS II soft-core processor.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
Enhanced Advanced Encryption Standard (E-AES): using ESETIRJET Journal
This document proposes an enhanced version of the Advanced Encryption Standard (AES) called E-AES. E-AES increases the key size to 2048 bits and the block size to 1024 bits. This provides more security than AES, which uses a 128, 192, or 256 bit key on a 128 bit block. E-AES specifies 64 rounds of encryption, compared to AES which uses 10 to 14 rounds depending on key size. The encryption process of E-AES involves four transformations at each round: byte substitution using an S-box, shifting rows of the state matrix, mixing data within columns, and adding a round key. This enhanced algorithm is proposed to address known attacks on AES and the use of its 16 year old standard with
Pipelining Architecture of AES Encryption and Key Generation with Search Base...VLSICS Design
A high speed security algorithm is always important for wired/wireless environment. The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both hardware and software. Hardware implementation of the AES has the advantage of increased throughput and offers better security. Search based S-box architecture has been proposed in this paper to reduce the constraint in the hardware resources. The pipelined architecture of the AES algorithm is proposed in order to increase the throughput of the algorithm. Moreover the key schedule algorithm of the AES encryption is pipelined to get the speedup.
Analysis and comparison of symmetric keyIJNSA Journal
The document analyzes and compares the performance of symmetric key cryptographic algorithms based on various file features such as data type, size, density, and key size. It tests the encryption time of algorithms like AES, DES, Triple DES, RC2, Blowfish, Skipjack and RC4 on different data types, file sizes ranging from 10MB to 482MB, and files with different data densities. The results show that encryption time is not affected by data type but increases proportionally with file size and number of bytes. Encryption time is also similar for sparse and dense files of comparable sizes. RC4 has the fastest encryption time while AES time is low compared to other block ciphers.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
This document describes the implementation of the Advanced Encryption Standard (AES) algorithm as a custom hardware accelerator connected to a Nios II processor system. AES was written in VHDL and connected to the Nios II system through GPIO pins. This allows AES operations to be controlled through C code in the Nios II IDE while running the AES algorithm in hardware, improving encryption speeds significantly compared to an all-software implementation. Synthesis results showed the hardware AES implementation reduced the number of clock cycles needed for encryption by over 99% compared to running AES solely in software on the Nios II processor.
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
1. The document discusses a hardware-software co-design of the AES encryption algorithm implemented on the NIOS II soft-core processor on an FPGA.
2. It proposes using a hardware-software co-design methodology to implement AES for encryption and decryption of 128-bit blocks using 128, 192, or 256-bit keys.
3. The implementation will utilize the Quartus II software tools and NIOS II integrated development environment to program the FPGA with the AES algorithm designed around the NIOS II soft-core processor.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
Enhanced Advanced Encryption Standard (E-AES): using ESETIRJET Journal
This document proposes an enhanced version of the Advanced Encryption Standard (AES) called E-AES. E-AES increases the key size to 2048 bits and the block size to 1024 bits. This provides more security than AES, which uses a 128, 192, or 256 bit key on a 128 bit block. E-AES specifies 64 rounds of encryption, compared to AES which uses 10 to 14 rounds depending on key size. The encryption process of E-AES involves four transformations at each round: byte substitution using an S-box, shifting rows of the state matrix, mixing data within columns, and adding a round key. This enhanced algorithm is proposed to address known attacks on AES and the use of its 16 year old standard with
Pipelining Architecture of AES Encryption and Key Generation with Search Base...VLSICS Design
A high speed security algorithm is always important for wired/wireless environment. The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both hardware and software. Hardware implementation of the AES has the advantage of increased throughput and offers better security. Search based S-box architecture has been proposed in this paper to reduce the constraint in the hardware resources. The pipelined architecture of the AES algorithm is proposed in order to increase the throughput of the algorithm. Moreover the key schedule algorithm of the AES encryption is pipelined to get the speedup.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET Journal
The document proposes a new Block-Level Message Encryption (BL-MLE) approach to achieve more efficient deduplication of encrypted large files in cloud storage. BL-MLE can achieve file-level and block-level deduplication, block key management, and proof of ownership simultaneously using a small set of metadata. It describes the BL-MLE method and how it uses AES, RSA, and SHA algorithms for encryption, authentication, and integrity checks. The experimental results show the upload of an encrypted document by the owner, user registration and access of the encrypted file using decryption keys, and the auditor performing integrity checks and generating audit reports.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
Cryptography means storing and transmitting data or information in a particular form that allow to be kept secret.
Symmetric key cryptography:- Both sender and receiver share the secret key.The symmetric key is kept private.both parties use the same key for encryption and decryption.
Asymmetric key cryptography:- Asymmetric key cryptography uses public or private key for encryption and decryption.Public key is kept by publically and private is kept secret.sender use the public key to send message and receiver use the private or secret key to decrypt the message.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
This document describes an audio cryptography system project that embeds encrypted messages within audio files. The system has two main modules: a GUI module built using AWT, Swing components; and an encryption/decryption module. Messages are encrypted before being embedded in audio files using LSB coding and encryption algorithms. The encrypted audio files can then be transmitted and decrypted at the recipient end to extract the original message. The system aims to provide security, confidentiality and integrity to transmitted messages.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
Optimization of video steganography with additional compression and encryptionTELKOMNIKA JOURNAL
Currently, data such as text, images and video are very important. Therefore, data must be secured from unauthorized parties. In this paper, we propose a number of security levels, first using compression techniques on the data that will be hidden to reduce the size of the data, second using encryption techniques on data that has been compressed so that data is more secure, third using video steganography techniques on compressed and encrypted data so that unauthorized parties are increasingly difficult to extract data. Measurement of differences in quality of cover-video and stego-video using MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio), evolution histogram of video tags, and video playback. The results show that the proposed algorithm gives better results than the previous algorithm which has a smaller MSE, larger PSNR, smaller histogram evolution of video tags, and play video without distortion.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
Implementation of New Modified MD5-512 bit Algorithm for CryptographyAM Publications
In the past few years, there have been significant research advances in the analysis of hash functions and it
was shown that none of the hash algorithm is secure enough for critical purposes whether it is MD5 or SHA-
1.Nowadays scientists have found weaknesses in a number of hash functions, including MD5, SHA and RIPEMD so
the purpose of this paper is combination of some function to reinforce these functions and also increasing hash code
length up to 512 that makes stronger algorithm against collision attests.
1. The document describes a system for encrypting data in real-time using a field programmable gate array (FPGA). The FPGA encrypts a stream of data from a personal computer using an algorithm written in VHDL and stores the encrypted data in a data logger.
2. The encryption algorithm uses three levels of logic gates (XOR, NAND, OR) applied sequentially to encrypt each byte of data. The FPGA, PC, and data logger are connected to transfer plain data from the PC to the FPGA for encryption and then to the data logger for storage.
3. The system was tested with a sample byte of data and successfully encrypted and stored it, demonstrating proof of concept
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...IDES Editor
Hyperelliptic Curve Cryptography (HECC) is a Public
Key Cryptographic technique which is required for secure
transmission. HECC is better than the existing public key
cryptography technique such as RSA, DSA, AES and ECC in
terms of smaller key size. DNA cryptography is a next
generation security mechanism, storing almost a million
gigabytes of data inside DNA strands. Existing DNA based
Elliptic Curve Cryptographic technique require larger key
size to encrypt and decrypt the message resulting in increased
processing time, more computational and memory overhead.
To overcome the above limitations, DNA strands are used to
encode the data to provide first level of security and HECC
encryption algorithm is used for providing second level of
security. Hence this proposed integration of DNA computing
based HECC provides higher level of security with less
computational and memory overhead.
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
This document summarizes and compares various encryption algorithms and techniques for improving secured data communication. It first discusses symmetric and asymmetric cryptography approaches. It then evaluates the performance of common symmetric algorithms like AES, DES, Triple DES, and Blowfish based on encryption speed tests. It provides a table summarizing the key features and security status of each algorithm. The document also introduces modern cryptography that combines symmetric and asymmetric techniques, and discusses some important encryption algorithms like DES, IDEA, and RSA.
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHYcsandit
This work contributes to the multimedia security fields by given that more protected
steganography technique which ensures message confidentiality and integrity. An Advanced
Least Significant Bit (ALSB) technique is presented in order to meet audio steganography
requirements, which are imperceptibility, capacity, and robustness. An extensive evaluation
study was conducted measuring the performance of proposed NLSB algorithm. A set of factors
were measured and used during evaluation, this includes; Peak Signal to Noise Ratio (PSNR)
and Bit Error Rate. MP3 Audio files from five different audio generators were used during
evaluation. Results indicated that ALSB outperforms standard Least Significant Bit (SLSB)
technique. Moreover, ALSB can be embedding an utmost of 750 kb into MP3 file size less than 2
MB with 30db average achieving enhanced capacity capability.
ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...IJNSA Journal
For achieving faster communication most of confidential data is circulated through networks as electronic data. Cryptographic ciphers have an important role for providing security to these confidential data against unauthorized attacks. Though security is an important factor, there are various factors that can affect the performance and selection of cryptographic algorithms during the practical implementation of these cryptographic ciphers for various applications. This paper provides analysis and comparison of some symmetric key cryptographic ciphers (RC4, AES, Blowfish, RC2, DES, Skipjack, and Triple DES) on the basis of encryption time with the variation of various file features like different data types, data size, data density and key sizes.
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are considering the important performance of these algorithms like CPU time consumption, memory usage and battery usage. This research tries to demonstrate a fair comparison between the most common algorithms and with a novel method called Secured Watermark System (SWS) in data encryption field according to CPU time, packet size and power consumption. It provides a comparison the most known algorithms used in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the compared encryption algorithms with different parameters.
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxDeepikaShivam
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many technique
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...IRJET Journal
This document summarizes a research paper that proposes a model for privacy and data ownership in cloud computing using symmetric key encryption. The model uses AES-256 encryption to encrypt user data uploaded to the cloud, providing security. AES-256 is shown to be faster than other encryption algorithms like AES-128, AES-192, and DES. The proposed model includes user registration, encrypted file uploading and downloading using AES-256, and a trusted third party for sharing files between authorized users while maintaining security. Experimental results show AES-256 provides faster encryption than other algorithms.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET Journal
The document proposes a new Block-Level Message Encryption (BL-MLE) approach to achieve more efficient deduplication of encrypted large files in cloud storage. BL-MLE can achieve file-level and block-level deduplication, block key management, and proof of ownership simultaneously using a small set of metadata. It describes the BL-MLE method and how it uses AES, RSA, and SHA algorithms for encryption, authentication, and integrity checks. The experimental results show the upload of an encrypted document by the owner, user registration and access of the encrypted file using decryption keys, and the auditor performing integrity checks and generating audit reports.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
Cryptography means storing and transmitting data or information in a particular form that allow to be kept secret.
Symmetric key cryptography:- Both sender and receiver share the secret key.The symmetric key is kept private.both parties use the same key for encryption and decryption.
Asymmetric key cryptography:- Asymmetric key cryptography uses public or private key for encryption and decryption.Public key is kept by publically and private is kept secret.sender use the public key to send message and receiver use the private or secret key to decrypt the message.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
This document describes an audio cryptography system project that embeds encrypted messages within audio files. The system has two main modules: a GUI module built using AWT, Swing components; and an encryption/decryption module. Messages are encrypted before being embedded in audio files using LSB coding and encryption algorithms. The encrypted audio files can then be transmitted and decrypted at the recipient end to extract the original message. The system aims to provide security, confidentiality and integrity to transmitted messages.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
Optimization of video steganography with additional compression and encryptionTELKOMNIKA JOURNAL
Currently, data such as text, images and video are very important. Therefore, data must be secured from unauthorized parties. In this paper, we propose a number of security levels, first using compression techniques on the data that will be hidden to reduce the size of the data, second using encryption techniques on data that has been compressed so that data is more secure, third using video steganography techniques on compressed and encrypted data so that unauthorized parties are increasingly difficult to extract data. Measurement of differences in quality of cover-video and stego-video using MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio), evolution histogram of video tags, and video playback. The results show that the proposed algorithm gives better results than the previous algorithm which has a smaller MSE, larger PSNR, smaller histogram evolution of video tags, and play video without distortion.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
Implementation of New Modified MD5-512 bit Algorithm for CryptographyAM Publications
In the past few years, there have been significant research advances in the analysis of hash functions and it
was shown that none of the hash algorithm is secure enough for critical purposes whether it is MD5 or SHA-
1.Nowadays scientists have found weaknesses in a number of hash functions, including MD5, SHA and RIPEMD so
the purpose of this paper is combination of some function to reinforce these functions and also increasing hash code
length up to 512 that makes stronger algorithm against collision attests.
1. The document describes a system for encrypting data in real-time using a field programmable gate array (FPGA). The FPGA encrypts a stream of data from a personal computer using an algorithm written in VHDL and stores the encrypted data in a data logger.
2. The encryption algorithm uses three levels of logic gates (XOR, NAND, OR) applied sequentially to encrypt each byte of data. The FPGA, PC, and data logger are connected to transfer plain data from the PC to the FPGA for encryption and then to the data logger for storage.
3. The system was tested with a sample byte of data and successfully encrypted and stored it, demonstrating proof of concept
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...IDES Editor
Hyperelliptic Curve Cryptography (HECC) is a Public
Key Cryptographic technique which is required for secure
transmission. HECC is better than the existing public key
cryptography technique such as RSA, DSA, AES and ECC in
terms of smaller key size. DNA cryptography is a next
generation security mechanism, storing almost a million
gigabytes of data inside DNA strands. Existing DNA based
Elliptic Curve Cryptographic technique require larger key
size to encrypt and decrypt the message resulting in increased
processing time, more computational and memory overhead.
To overcome the above limitations, DNA strands are used to
encode the data to provide first level of security and HECC
encryption algorithm is used for providing second level of
security. Hence this proposed integration of DNA computing
based HECC provides higher level of security with less
computational and memory overhead.
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
This document summarizes and compares various encryption algorithms and techniques for improving secured data communication. It first discusses symmetric and asymmetric cryptography approaches. It then evaluates the performance of common symmetric algorithms like AES, DES, Triple DES, and Blowfish based on encryption speed tests. It provides a table summarizing the key features and security status of each algorithm. The document also introduces modern cryptography that combines symmetric and asymmetric techniques, and discusses some important encryption algorithms like DES, IDEA, and RSA.
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHYcsandit
This work contributes to the multimedia security fields by given that more protected
steganography technique which ensures message confidentiality and integrity. An Advanced
Least Significant Bit (ALSB) technique is presented in order to meet audio steganography
requirements, which are imperceptibility, capacity, and robustness. An extensive evaluation
study was conducted measuring the performance of proposed NLSB algorithm. A set of factors
were measured and used during evaluation, this includes; Peak Signal to Noise Ratio (PSNR)
and Bit Error Rate. MP3 Audio files from five different audio generators were used during
evaluation. Results indicated that ALSB outperforms standard Least Significant Bit (SLSB)
technique. Moreover, ALSB can be embedding an utmost of 750 kb into MP3 file size less than 2
MB with 30db average achieving enhanced capacity capability.
ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...IJNSA Journal
For achieving faster communication most of confidential data is circulated through networks as electronic data. Cryptographic ciphers have an important role for providing security to these confidential data against unauthorized attacks. Though security is an important factor, there are various factors that can affect the performance and selection of cryptographic algorithms during the practical implementation of these cryptographic ciphers for various applications. This paper provides analysis and comparison of some symmetric key cryptographic ciphers (RC4, AES, Blowfish, RC2, DES, Skipjack, and Triple DES) on the basis of encryption time with the variation of various file features like different data types, data size, data density and key sizes.
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are considering the important performance of these algorithms like CPU time consumption, memory usage and battery usage. This research tries to demonstrate a fair comparison between the most common algorithms and with a novel method called Secured Watermark System (SWS) in data encryption field according to CPU time, packet size and power consumption. It provides a comparison the most known algorithms used in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the compared encryption algorithms with different parameters.
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxDeepikaShivam
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many technique
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...IRJET Journal
This document summarizes a research paper that proposes a model for privacy and data ownership in cloud computing using symmetric key encryption. The model uses AES-256 encryption to encrypt user data uploaded to the cloud, providing security. AES-256 is shown to be faster than other encryption algorithms like AES-128, AES-192, and DES. The proposed model includes user registration, encrypted file uploading and downloading using AES-256, and a trusted third party for sharing files between authorized users while maintaining security. Experimental results show AES-256 provides faster encryption than other algorithms.
Pipelining Architecture of AES Encryption and Key Generation with Search Base...VLSICS Design
A high speed security algorithm is always important for wired/wireless environment. The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both hardware and software. Hardware implementation of the AES has the advantage of increased throughput and offers better security. Search based S-box architecture has been proposed in this paper to reduce the constraint in the hardware resources. The pipelined architecture of the AES algorithm is proposed in order to increase the throughput of the algorithm. Moreover the key schedule algorithm of the AES encryption is pipelined to get the speedup.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that designed and implemented a Quality of Security Service (QoSS)-compliant Advanced Encryption Standard (AES) processor for use in multimedia applications. The processor uses a reconfigurable architecture that can provide up to 12 different AES cipher schemes with reasonable hardware costs. It allows users to specify security requirements through a security vector. Evaluation showed the QoSS-AES processor can provide high security for multimedia communications like MPEG video with low latency. Implementation on FPGAs demonstrated competitive speed, area and power performance compared to other FPGA-based AES designs.
1) The document discusses an enhancement to the AES encryption algorithm by adding an additional layer of security using the Caesar cipher encryption algorithm.
2) The enhancement aims to make the algorithm more secure by making the key variable for each letter encrypted using the Caesar cipher, removing vulnerabilities to common attacks.
3) The enhancement provides extra protection to the already secure AES algorithm and increases the security level, while being transparent to the user.
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
In this age of universal electronic connectivity of viruses and hackers of electronic eavesdropping and electronic fraud, there is indeed needed to store the information securely. This, in turn, led to a heightened awareness to protect data and resources from disclosure, to guarantee the authenticity of data and messages and to protect systems from network-based attacks. Information security via encryption decryption techniques is a very popular research area for many people’s over the years. This paper elaborates the basic concept of the cryptography, specially public and private cryptography. It also contains a review of some popular encryption decryption algorithms. A modified method is also proposed. This method is fast in comparison to the existing methods.
This document discusses various methods of data representation and compression. It begins by defining data representation as how information is conceived, manipulated, and stored, which can vary between environments. It then discusses several common data representation formats including ASCII, EBCDIC, and Shift-JIS character encodings as well as network data formats like ASN.1 and XDR. The document also covers popular image, audio, and video file compression standards and algorithms like JPEG, PNG, MP3, and MPEG.
1. IPSec is a set of security protocols that provide privacy and authentication for IP communications. It has two main components: Authentication Header (AH) and Encapsulating Security Payload (ESP).
2. The Internet Key Exchange (IKE) and Oakley key determination protocol are used for automatic key management to establish Security Associations between IPSec nodes.
3. The ISAKMP framework defines procedures for establishing, negotiating, modifying and deleting Security Associations, including the exchange of key generation and authentication data payloads.
The document discusses various topics related to data representation including:
1) How data is represented depends on the environment and each has its own rules and standards.
2) Popular network data representations include ASN.1 and XDR, with ASN.1 being a more robust standard that describes data structures unambiguously while XDR is simpler.
3) ASN.1 is commonly used for applications such as network management, secure email, and telephony due to its ability to exchange structured data across networks and platforms.
The advent of Big Data has presented nee challenges in terms of Data Security. There is an increasing need of research
in technologies that can handle the vast volume of Data and make it secure efficiently. Current Technologies for securing data are
slow when applied to huge amounts of data. This paper discusses security aspect of Big Data.
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Encrypted Negative Password using for Authenticationijtsrd
This document proposes a new password authentication system that uses encrypted negative passwords (ENPs) for secure password storage and authentication. It involves hashing the password, converting it to a negative value, and encrypting it using strong algorithms like PBKDF2 and Blowfish. This makes the passwords more secure against attacks like dictionary attacks and lookup table attacks compared to existing systems. The proposed system includes a registration phase where the password is processed to generate the ENP, and an authentication phase where the ENP is validated upon login. Advantages of the system include stronger security, resistance to various attacks, and easy integration with existing authentication systems.
In this era the computer and software engineers have faced many attacks on cyber security that affect the confidentiality of the users.
These attacks broke almost all the security algorithms due to which the confidentiality, authentication, integrity, availability and identification of the user data is being affected.
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
This document describes an efficient VLSI design for AES cryptography using a true random number generator (TRNG) and DNA encoding. It aims to improve security and reduce area and delay compared to standard AES. The design generates random round keys using a TRNG instead of the standard key expansion process. It further encodes a partial key from the TRNG using DNA encoding to produce the full 128-bit key, strengthening security. Simulation and synthesis results show the TRNG-based AES has lower area and delay than standard AES. Combining the TRNG with DNA encoding further optimizes the design.
hardware implementation of aes encryption and decryption for low area & low p...Kumar Goud
Abstract-An AES algorithm is implemented on FPGA platform to improve the safety of data in transmission. AES algorithms can be implemented on FPGA in order to speed data processing and reduce time for key generating. We achieve higher performance by maintaining standard speed and reliability with low area and power. The 128 bit AES algorithm is implements on a FPGA using VHDL language with help of Xilinx tool.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
This paper attempts to build up a simple, strong and secure cryptographic algorithm. The result of such an attempt is “RC6-Cascade” which is 320-bits RC6 like block cipher. The key can be any length up to 256 bytes. It is a secret-key block cipher with precise characteristics of RC6 algorithm using another overall structure design. In RC6-Cascade, cascading of F-functions will be used instead of rounds. Moreover, the paper investigates a hardware design to efficiently implement the proposed RC6-Cascade block cipher core on field programmable gate array (FPGA). An efficient compact iterative architecture will be designed for the F-function of the above algorithm. The goal is to design a more secure algorithm and present a very fast encryption core for low cost and small size applications.
Similar to Dynamic selection of symmetric key cryptographic algorithms for securing data based on various parameters (20)
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
2. 186 Computer Science & Information Technology (CS & IT)
A data file formats represents the standard for encoding the information to be stored in computer
file. There are file formats like textual, image, audio and video data file formats. Textual data
formats are ANSII, UNICODE (16 & 32 bit little and big Endian and UTF-8). ANSII is encoding
scheme for 128 characters basically made for English alphabets. It contains alphabets a-z and A-
Z, numbers 0-9 and some special characters. In Unicode standard unique numbers are provided
for every character independent of platform. Image file formats are JPEG, TIFF, BMP, GIF and
PNG [10]. JPEG is image file format for digital images that uses lossy compression method. TIFF
and BMP are image file format that are used to store images of raster graphics. GIF image is
similar to image format of bitmap images. GIF uses LZW (Lempel-Ziv-Welch) technique of
compression and for each image it can support up to 8 bits/pixel. PNG is alternative to GIF image
file format and allows more compression than GIF. Audio file formats are WAV, AIFF, M4A,
MP3 and WMA. WAV and AIFF are usually uncompressed audio file format. M4A (audio) uses
Apple Lossless compression format but often it is compressed with Advance audio coding
(lossy). MP3 and WMA are lossy compression audio formats. Video file formats are AVI, M4V,
MPEG and WMV etc. AVI format contains the data (audio and video data) file container; which
allows audio-with-video playback synchronously. M4V and MP4 are very similar format, but
M4v can be protected by Digital Rights Management copy protection. MPEG contains
compressed audio and visual digital data. WMV is compressed video format developed by
Microsoft.
Density of data represents the amount of different information present in the data file [10]. File is
said to be dense file if file size is less and content is more. For example if there are two file X and
Y both containing 2000 words and having sizes 50kb and 200kb respectively, then file X is
denser. The more the information, the dense is the data and lesser the information, sparse is the
data. Sparse file is a file that contains most of the empty spaces and attempts to use the computer
space more effectively.
Data size is space occupied by a file on a disk. Audio, video takes more space on disk than textual
files as they contain multimedia information. Key size in cryptography represents the size of key
file in bits. For example AES is having key sizes 128, 192 and 256 bits.
The main objective of this paper is to analyze time taken for encryption by various cryptographic
algorithms for parameters like data type, data size, data density and key size.
2. CRYPTOGRAPHIC ALGORITHMS
This section provides information about the various symmetric key cryptographic algorithms to
be analyzed for performance evaluation, to select the best algorithm with appropriate parameter
suitable to provide security for data. The various features of the cryptographic algorithm are listed
in Table 1.
Table 1. Cryptographic Algorithms Information.
Algorithm
Name
Structure
Cipher
Type
Rounds
Key Size(In
bits)
AES
Substitution-permutation
network
Block
10,
12,
14
128,
192,
256
DES
Balanced Feistel
network
Block 16 56
Triple
DES
Feistel network Block 48
112,
168
3. Computer Science & Information Technology (CS & IT) 187
RC2
Source-heavy Feistel
network
Block 18 40 to 1024
Blowfish Feistel network Block 16 32 to 448
Skipjack
Unbalanced Feistel
network
Block 32 80
RC4 ---- Stream 256 40 to 2048
3. RELATED WORK
This section provides the information and results which are obtained from the numerous sources.
Cryptographic algorithms have been compared with each other for performance evaluation
on basis of throughput, CPU Memory utilization, energy consumption, attacks, Encryption
time, Decryption time etc.
In [3] the author compared AES and RC4 algorithm and the performance metrics were encryption
throughput, CPU work load, memory utilization, and key size variation and encryption and
decryption time. Results show that the RC4 is fast and energy saving for encryption and
decryption. RC4 proved to be better than AES for larger size data. In [2] author compared AES
and DES algorithms on image file, MATLAB software platform was used for implementation of
these two cipher algorithms. AES took less encryption and decryption time than DES. In [4] the
author compared cipher algorithms (AES, DES, Blowfish) for different cipher block modes
(ECB, CBC, CFB, OFB) on different file sizes varying from 3kb to 203kb. Blowfish algorithm
yield better performance for all block cipher modes that were tested and OFB block mode gives
better performance than other block modes. In [7] the author talks about comparison between
three algorithms (DES, Triple DES, Blowfish) on processing time. They found, that the key
generation time for all these three algorithms is almost same but there is a difference in time taken
by CPU for encryption. On SunOS platform Blowfish seem to be fastest, followed by DES and
Triple DES respectively. They analyzed CPU execution time for generating the secret key,
encryption and decryption time on 10MB file. In [6] the author compared cipher algorithms
(AES, DES, 3-DES and Blowfish) for varying file size and compared the encryption time on two
different machines Pentium-4, 2.4 GHz and Pentium-II 266 MHz in EBC and CFB Mode. The
author concluded that Blowfish is fastest followed by DES and Triple DES and CFB takes more
time than ECB cipher block mode.
4. PROPOSED WORK
From the related works, it is realized that none of the work did a very detailed analysis of the
performance of various symmetric algorithms on various parameters on different type of files,
especially the files which are used for medical health related data.
The main objective of this paper is to analyze the time taken for encryption by various
cryptographic algorithms for parameters like data type, data size, data density and key size in
order to select the most suitable cryptographic algorithm for encryption.
5. EXPERIMENTAL SETUP AND TESTING
The execution results are taken on machine having Intel® Core™ i7-2600 (3.40 GHz) processor
with Intel® Q65 Express 4 GB 1333 MHz DDR3 (RAM) and Ubuntu 12.04 LTS operating
System. The java platform (openjdk1.6.0_14) is used for implementation. JCA (Java
Cryptography Architecture) and JCE (Java Cryptography Extension) are used for cipher
algorithm implementation. The JCA is a major platform that contains ”provider" architecture and
4. 188 Computer Science & Information Technology (CS & IT)
the set of APIs for encryption (symmetric ciphers, asymmetric ciphers, block ciphers, stream
ciphers), message digests (hash), digital signatures, certificates and certificate validation, key
generation and secure random number generation. Here we have used sun and Bouncy Castel
provider for implementing cryptographic algorithms.
The brief analysis of different symmetric key cryptographic algorithm for various parameters is as
follows:
Case Study 1: Files with different Data types.
This case study has taken to check whether the encryption has dependency on type of data.
Different data type files like audio, image, textual and video of nearly 50MB in size are chosen
and encryption time of different cipher algorithms is calculated for these data types. For all
executions of a specific cipher algorithm, varying parameter is data type and constant parameters
are key size and block cipher mode. Key size and block mode are at kept at bare minimal
parameters. The key size of AES, DES, 3-DES, RC2, Blowfish, Skipjack, and RC4 are kept at
minimum values as 128, 56, 112, 40, 32, 80 and 40 bits respectively. Block cipher mode used is
ECB with PKCS#5 padding scheme. Fig. 1 shows the execution time of the algorithms for
different data type files.
Figure 1. Encryption time Vs Cipher Algorithm for files of different data type
Observation: The result shows that the encryption time does not vary according to the type of the
data. Encryption depends only on the number of bytes in the file and not on the type of file. AES
works faster than other block ciphers. RC4 with key size 40 is fastest among the algorithms
tested.
Case Study 2: Data files of same type with different sizes.
This case study is taken to ensure once again the observations obtained in case study 1. Case
study 1 revealed that encryption time depends on number of bytes in the file. To ensure this
another study is made in which different files of same types but different sizes are given for
encryption and estimated the encryption time. For all executions key size and block mode are kept
at bare minimal parameters. Table 2 gives the details about the files used for all executions and
Fig. 2 and 3 show the execution results.
5. Computer Science & Information Technology (CS & IT) 189
Table 2. Execution Parameters for files of different size.
File Type Varying Parameters (Data Size) Constant Parameters
AIFF 10.7MB, 50MB, 100MB
Data Type, Key size
AVI 50MB, 100MB, 482MB
Figure 2. File size Vs Encryption time for AIFF file of different sizes.
Figure 3. File size Vs Encryption time for AVI file of different sizes.
Table 3. Encryption time for files of different sizes
File
Type
Size
(In
MB)
Encryption Time in Millisecond
AES DES
3-
DES
RC2 Blowfish Skipjack RC4
128 56 112 40 32 80 40
AIFF
10.7 101 272 788 238 133 381 40
50 455 1253 3804 1095 614 1729 198
100 909 2595 7628 2189 1223 3505 372
AVI
50 456 1268 3810 1112 629 1731 196
100 918 2586 7631 2224 1267 3515 360
482 4518 12529 35654 11038 6087 16941 1972
Observation: From the results in Table 3 and Fig. 2 and 3 we can find that the result for different
size of data varies proportional to the size of data file. Encryption time increases as file size
6. 190 Computer Science & Information Technology (CS & IT)
increases in multiples of data size. For each encryption algorithm same parameters are used for
files of different sizes.
Case Study 3: File with different data densities.
This case study is taken to check whether the encryption depends on density of data or not.
Encryption rate is evaluated for the two different data density file; a sparse file of 69MB and a
dense file of 58.5MB. For a cipher algorithm, key size and block mode are kept at bare minimal
parameters. The results of execution are shown in Table 4.
Table 4. Execution rate for sparse and dense data file
Algorithm
Name
Sparse
(72000118 Bytes)
AIFF file
Dense
(61392454 Bytes)
AIFF file
Encrypt
Time(ms)
Encryption
Rate(MB/s)
Encrypt
Time(ms)
Encryption
Rate(MB/s)
AES 128 634 108.28 540 108.40
DES 56 1801 38.11 1537 38.08
3-DES 112 5076 13.52 4365 13.41
RC2 128 1520 45.16 1285 45.55
Blowfish 128 854 80.38 723 80.96
Skipjack 128 2386 28.77 2042 28.66
RC4 128 253 271.35 216 271.01
Observation: Encryption rate for sparse and dense file has been calculated. The Table 4 shows
that the encryption time is not affected by density of data in a file. The variation in time with
respect to different algorithms follows the same pattern for both sparse and dense files. The
encryption rate for a particular cipher algorithm remains the same, even if the file is sparse or
dense. It depends on only the number of bytes in the file.
Case Study 4: Encryption Algorithms with different key sizes
This case study is to analyze the effect of changing the size of encryption key on encryption time.
BMP file of 50.5MB is taken and different cipher algorithms are executed for different size of
keys supported by them in ECB mode with PKCS#5 padding scheme. The various key sizes
mentioned in Table 1 are used during experimentation. Fig. 4 shows the result of execution for
key size variation.
Figure 4. Variation of key sizes for different cipher Algorithms
7. Computer Science & Information Technology (CS & IT) 191
Obsevation: The execution results show that for all ciphers algorithms, the encryption time
varies with the change in the size of the of the key. Encryption time increases with increase in key
size for block ciphers. The variation in time is very small. AES dominates in the block cipher.
RC4 is fastest among all algorithms tested.
6. CONCLUSION
In this paper different symmetric key algorithm have been analyzed for various parameters like
different data type, data size, data density, key size, cipher block modes and tested how the
encryption time varies for different algorithms. From the execution results it is concluded that
encryption time is independent of data type and date density. The research shown that, encryption
time only depends upon the number of bytes of the file. It also reveled that encryption time varies
proportionally according to the size of data. For all block cipher algorithms that are analyzed,
with increase in key size, encryption time also increases, but reduces with increase in key size for
RC4. AES is fastest block cipher, but RC4 appears to be fastest among all analyzed ciphers.
ACKNOWLEDGEMENT
We would like to thanks C-DAC, Pune for all their support during the project.
REFERENCES
[1] AL.Jeeva1, Dr.V.Palanisamy and K.Kanagaram, “Comparative Analysis of Performance Efficiency
and Security Measures of Some Encryption Algorithms”, International Journal of Engineering
Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012, pp.3033-3037.
[2] S. Soni, H. Agrawal, M. Sharma, “Analysis and comparison between AES and DES Cryptographic
Algorithm”, International Journal of Engineering and Innovative Technology, Vol 2, Issue 6,
December 2012, pp.362-365.
[3] Nidhi Singhal and J.P.S.Raina, “Comparative Analysis of AES and RC4 Algorithms for Better
Utilization”, International Journal of Computer Trends and Technology, Vol 2, Issue 6, July-Aug
2011, pp.177-181.
[4] Jawahar Thakur and Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography
Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology
and Advanced Engineering, Vol 1, Issue 2, December 2011, pp.6-12.
[5] Allam Mousa and Ahmad Hamad, “Evaluation of the RC4 Algorithm for Data Encryption”,
International Journal of Computer Science & Applications, Vol 3,Issue 2, June 2006, pp.44-56.
[6] Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms”,
First International Conference on IEEE Information and Communication Technologies (ICICT), Vol
1, Issue 6, 27-28 Aug. 2005, pp 84-89.
[7] Kofahi, N.A, Turki Al-Somani, Khalid Al-Zamil, “Performance evaluation of three
Encryption/Decryption Algorithms”, IEEE 46th Midwest Symposium on Circuits and Systems, Vol
2, Issue 1, 30-30 Dec. 2003, pp. 790-793.
[8] Jonathan Knudsen, Java Cryptography, 2nd Edition, O’Reilly, 2011.
[9] Behrouz A. Forouzan, Debdeep Mukhopadhyay, Cryptography and Network Security, 2nd Edition,
Tata McGraw Hill, 2012. [10]John Miano, Compressed Image File Formats, 1st Edition, Addison
Wesley Longman, Inc,1999.
8. 192 Computer Science & Information Technology (CS & IT)
AUTHORS
Ranjeet Masram is M tech Student in Computer Engineering from College of
Engineering, Pune (India). He is appointed as JRF for Joint project on Medical data
Security between C-DAC,Pune and College of Engineering, Pune for a period of one
year.
Vivek Shahare received his Bachelor Degree in Computer Science and Engineering
from Government College of Engineering, Amravati(India). He is appointed as JRF for
Joint project on Medical data Security between C-DAC, Pune and College of
Engineering, Pune for a period of one year.
Dr. Jibi Abraham is Professor at College of Engineering, Pune. She received her Doctor
of Philosophy (PhD) in Computer Engineering from Visvesvaraya Technological
University. She is the Principal Investigator from COEP for Joint project on Medical data
Security between C-DAC, Pune and College of Engineering.
Dr. Rajni Moona was project engineer at IIT Kanpur. She was Visiting faculty at
International Institute of Information Technology. She is the co-investigator for Joint
project on Medical data Security between C-DAC, Pune and College of Engineering.
Dr.Pradeep K.Sinha is Senior Director, C-DAC,Pune. Dr. P.K. Sinha, Programme
Coordinator, High Performance Computing and Communication (HPCC) Group, was
included in the Sixteenth Edition of the "MARQUIS Who's who in the World," which is a
prestigious international registry of outstanding men and women in a wide range of
professions and geographical locations in the world. He is a visiting faculty at college of
Engineering Pune. He is th first Indian to be conferred the Distinguished Engineer '09
honour.
Mr. Gaur Sunder is the Coordinator and Head of the Medical Informatics Group (MIG)
at C-DAC, Pune. He is Computer Scientist working in HPC, Distributed Systems, Cloud
Computing & Virtualization, Cluster & Grid Computing, Data Repository (Big-data),
Imaging, Networking, Platform (Win/Lin) and Web Technologies, and allied areas.
Mr. Prashant Bendale is Senior Technical Officer at C-DAC, Pune. His research areas
include medical informatics standards, distributed / cloud computing technologies. He led
the software development kits activities for medical informatics standard like DICOM &
HL7.
Mrs. Sayali Pophalkar is a project Engineer at C-DAC, Pune.