This document compares Elliptic Curve Cryptography (ECC) and Elliptic Curve Integrated Encryption Scheme (ECIES) for securing patient privacy in wireless body sensor networks. Both techniques can encrypt patient health record data collected from sensors. ECC encrypts/decrypts data using elliptic curve operations, while ECIES is a hybrid scheme that uses elliptic curves for key exchange and symmetric encryption to encrypt messages. The document analyzes the implementation of ECC and ECIES on body sensor networks and concludes that ECIES requires less storage space and computation time compared to ECC for encrypting data from multiple patients.
This document discusses lightweight cryptography. It begins by defining lightweight cryptography as cryptographic primitives designed for devices with limited resources like memory, speed and power consumption. It then outlines various lightweight cryptographic mechanisms like block ciphers, hash functions, stream ciphers and authenticated ciphers. For each mechanism, it discusses their desirable properties and design principles. It also discusses implementation issues like decryption costs and resistance to related key attacks. Finally, it mentions the Fair Evaluation of Lightweight Cryptographic Systems (FELICS) benchmarking tool for evaluating and comparing the performance of lightweight cryptographic algorithms on different platforms.
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
This document summarizes a research paper on secure authentication and data sharing in cloud storage using a key aggregate cryptosystem. It begins with an abstract that describes using public key cryptography to encrypt data and delegate decryption rights for any subset of ciphertexts with a constant size key. It then provides details on the proposed key aggregate cryptosystem, including an introduction, related work comparing it to other solutions, the system architecture, and sections on key aggregate encryption and a conclusion. The key aggregate cryptosystem allows a master key holder to release an aggregate key that decrypts a flexible set of ciphertexts in cloud storage while keeping other files encrypted.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
This document discusses lightweight cryptography techniques for RFID systems with limited resources. It compares the Data Encryption Standard (DES) algorithm and a simplified version called Lightweight DES (DESL). DESL reduces gate complexity by eliminating initial/final permutations and using a single S-box, providing around a 20% reduction in gates compared to DES while maintaining throughput. The document also briefly introduces the Advanced Encryption Standard (AES) algorithm.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
Cryptography using artificial neural networkMahira Banu
This document proposes using artificial neural networks for cryptography. It describes using a backpropagation neural network for decryption, where the network is trained on encrypted-decrypted message pairs. Boolean algebra is used for encryption, permuting messages and "doping" with additional bits. The neural network can then be used as a public key for decryption, with a private key for encryption. Simulation results showed the neural network approach weakened key guessing compared to other methods.
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
Презентация с форума http://hackit-ukraine.com/
Сергей Мартыненко
Ст.преп. кафедры комп. систем и сетей, ХАИ
Малоресурсная криптография
О спикере: Ст. преподаватель кафедры компьютерных сетей и систем. Опыт в области криптографической защиты информации и критических систем более 5 лет. Занимается защитой информации в малоресурсных системах.
This document discusses lightweight cryptography. It begins by defining lightweight cryptography as cryptographic primitives designed for devices with limited resources like memory, speed and power consumption. It then outlines various lightweight cryptographic mechanisms like block ciphers, hash functions, stream ciphers and authenticated ciphers. For each mechanism, it discusses their desirable properties and design principles. It also discusses implementation issues like decryption costs and resistance to related key attacks. Finally, it mentions the Fair Evaluation of Lightweight Cryptographic Systems (FELICS) benchmarking tool for evaluating and comparing the performance of lightweight cryptographic algorithms on different platforms.
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
This document summarizes a research paper on secure authentication and data sharing in cloud storage using a key aggregate cryptosystem. It begins with an abstract that describes using public key cryptography to encrypt data and delegate decryption rights for any subset of ciphertexts with a constant size key. It then provides details on the proposed key aggregate cryptosystem, including an introduction, related work comparing it to other solutions, the system architecture, and sections on key aggregate encryption and a conclusion. The key aggregate cryptosystem allows a master key holder to release an aggregate key that decrypts a flexible set of ciphertexts in cloud storage while keeping other files encrypted.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
This document discusses lightweight cryptography techniques for RFID systems with limited resources. It compares the Data Encryption Standard (DES) algorithm and a simplified version called Lightweight DES (DESL). DESL reduces gate complexity by eliminating initial/final permutations and using a single S-box, providing around a 20% reduction in gates compared to DES while maintaining throughput. The document also briefly introduces the Advanced Encryption Standard (AES) algorithm.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
Cryptography using artificial neural networkMahira Banu
This document proposes using artificial neural networks for cryptography. It describes using a backpropagation neural network for decryption, where the network is trained on encrypted-decrypted message pairs. Boolean algebra is used for encryption, permuting messages and "doping" with additional bits. The neural network can then be used as a public key for decryption, with a private key for encryption. Simulation results showed the neural network approach weakened key guessing compared to other methods.
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
Презентация с форума http://hackit-ukraine.com/
Сергей Мартыненко
Ст.преп. кафедры комп. систем и сетей, ХАИ
Малоресурсная криптография
О спикере: Ст. преподаватель кафедры компьютерных сетей и систем. Опыт в области криптографической защиты информации и критических систем более 5 лет. Занимается защитой информации в малоресурсных системах.
The document discusses secure data sharing in cloud storage using a key-aggregate cryptosystem (KAC) which allows efficient delegation of decryption rights for any set of ciphertexts. KAC produces constant size ciphertexts and allows any set of secret keys to be aggregated into a single key encompassing the power of the keys being aggregated. This aggregate key can then be sent to others for decryption of the ciphertext set while keeping files outside the set confidential.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
This document summarizes a research paper on using elliptic curve cryptography for message authentication. It begins with an introduction to elliptic curve cryptography and how it can provide equivalent security to other public key encryption methods but with smaller key sizes. It then describes the proposed methodology which includes generating an ECC key pair, encrypting a message with the public key, transmitting the encrypted message, and decrypting it with the private key. The results show a message being encrypted and decrypted correctly using this ECC process. It concludes that ECC can provide an efficient method for authentication in systems like vehicular networks due to its lower computation and communication overhead compared to other encryption methods.
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
This document presents a case study on authentication in wireless sensor networks using virtual certificate authorities. It discusses how sensor nodes can securely transmit data when moving across different wireless sensor networks. The proposed approach uses virtual certificates issued by a virtual certificate authority to authenticate moving sensor nodes. Simulation results show that the virtual certificate scheme reduces collisions compared to previous authentication algorithms. The scheme enhances security, scalability and interoperability while supporting node mobility across wireless sensor networks.
This document discusses virtualization and homomorphic encryption in cloud computing. Virtualization allows multiple operating systems to run on the same server at the same time by creating virtual versions. It improves hardware utilization and saves costs. Homomorphic encryption allows computations to be performed on encrypted data without decrypting it first, preserving data privacy. While some encryption schemes allow limited mathematical operations, fully homomorphic encryption remains an area of research.
The document discusses lightweight cryptography for constrained devices. It presents the objectives of designing a lightweight bit-permutation instruction called PERMS to accelerate cryptography in software, and a new lightweight block cipher called Khudra suitable for both FPGAs and ASICs. It also aims to analyze Khudra's security against cryptanalysis techniques. The PERMS instruction is based on bit swapping to achieve permutation efficiently in hardware using control bits.
Wireless communication systems, multi-input multi-output (MIMO) technology has been recognized as the key ingredient to support higher data rate as well as better transmission quality after using this algorithm of a XTEA or MTEA scheme. Modified TEA is used for encryption of the text. Then decryption unit for decrypting the cipher text and convert that to plain text. Key generation unit is to generate 128bit key and these keys are send along with cipher text. Encryption and decryption system ensures the original data are send and received by the users in secured environment. The Received data are retrieving by the authorized users by providing key generation like private keys this Key Pattern generations provide more security to the messages. Extended tiny encryption algorithm or modified tiny encryption algorithm and tiny encryption algorithm are used to enhance the size, speed and security in the system. These algorithms are better compared to configurable joint detection decoding algorithm (CJDD) and valid symbol finder algorithm.
File transfer using cryptography techniquesmiteshkumar82
The document discusses implementing IT auditing mechanisms for cloud computing applications to ensure security. It proposes using checklists based on cloud computing deployment and service models to audit the lifecycle of cloud applications like customer relationship management. The goal is to present implications for large enterprises and achieve desired security levels by designing and implementing IT auditing techniques. Practical investigations show IT auditing can assure security, regulations, and compliance for enterprise applications in the cloud.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelMohit Goel
1) The document presents a technique for visual cryptographic steganography that uses RSA encryption and discrete wavelet transform (DWT) for data security.
2) In the proposed method, data is first encrypted using RSA encryption and then embedded in an image using Haar-DWT based steganography.
3) Experimental results on 100 images show the proposed technique achieves higher PSNR values compared to other techniques like LSB and LSB-DCT steganography, indicating better image quality and security of the hidden data.
Technical Seminar on Securing the IoT in the Quantum WorldSiri Murthy
This document summarizes research on securing Internet of Things (IoT) communication in a quantum world. Currently, IoT relies on cryptographic algorithms like AES and RSA, but these may be broken by quantum computers. The document reviews symmetric key and asymmetric key cryptography. It proposes using hash-based and code-based cryptosystems, like SPHINCS and McEliece, which are quantum-resistant. Doubling the key size of AES to 256 bits could also secure it against quantum attacks. The development of practical quantum computers may take 5-10 more years, so it is important to adopt quantum-resistant algorithms now to protect data in the future.
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
This document presents a secure encryption technique based on an advanced Hill cipher for a public key cryptosystem. The technique uses an involutory matrix and permuted key to encrypt plaintext into ciphertext. It further encrypts the ciphertext through two levels of scrambling and adds tamper detection by calculating and transmitting the determinant of the ciphertext matrix. The decryption process reverses these steps to recover the original plaintext. The technique aims to make the cipher highly secure against cryptanalytic attacks by introducing multiple transformations and ensuring the integrity of the ciphertext through determinant verification.
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...Mahmud Hossain
The document presents Boot-IoT, a privacy-aware authentication scheme for secure bootstrapping of IoT nodes. Boot-IoT uses combined public key cryptography to enable secure network admission and authentication based on elliptic curve cryptography. It also provides a lightweight certificateless mutual authentication scheme for secure access to services. Experimental results show that Boot-IoT has lower communication and computation costs compared to other authentication methods like EAP, making it more efficient for resource-constrained IoT devices.
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
The document discusses improving security for automation in the Internet of Things using one-time passwords. It proposes generating one-time passwords using AES algorithms to provide highly authorized authentication and access to equipment. The proposal includes using elliptic curve cryptography to generate one-time passwords and extending the AES symmetric encryption scheme with Lamport's one-time password algorithm. It analyzes the performance and security of the proposed scheme, finding it can be implemented in IoT networks to provide two-factor authentication between devices, applications, and their communications securely and efficiently with a smaller key size and lower computational requirements compared to other existing one-time password schemes.
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
The document describes a proposed system for secure data storage on cloud systems using elliptic curve cryptography and Shamir's secret sharing algorithm. It discusses how ECC and secret sharing can be used to encrypt data before storing it on the cloud to preserve privacy. The system aims to provide security services like confidentiality. It generates keys using ECC and secret sharing that are shared with authenticated users to allow access to encrypted data stored on the cloud. The system reduces storage and computational overhead for the customer and cloud storage server.
This document analyzes and compares the performance of various cryptography algorithms. It discusses symmetric key algorithms like DES, AES, Blowfish and IDEA as well as asymmetric algorithms like RSA and Diffie-Hellman. The performance is evaluated based on parameters like encryption/decryption time, memory usage and throughput. Experiments show that Blowfish has better performance than AES for encrypting audio files, with lower average encryption and decryption times. In conclusion, cryptography is important for network security and Blowfish performs encryption/decryption more efficiently than AES for audio files.
(1) The document proposes an energy efficient protocol for wireless sensor networks (WSNs) that employs replicated data sinks to achieve resiliency against data sink failures and efficient storage and retrieval of sensor data.
(2) It introduces a simple address assignment scheme that partitions the sensor field into cells, with each cell containing one data sink and sensors closest to that sink. This scheme is scalable and resilient against data sink and sensor node failures.
(3) The protocol uses five types of messages and a routing approach based on de Bruijn digraphs to minimize energy consumption during data transmission between sensors and sinks. It aims to maximize the lifetime of the sensor network.
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
This document discusses using public-key cryptography for data security in wireless sensor networks. It begins with an abstract that introduces public-key infrastructure for sensor networks to allow services like digital signatures. It then provides background on wireless sensor networks and discusses their limitations, including limited resources and vulnerability of nodes. It reviews different techniques for distributing public keys, including public announcement, publicly available directories, using a public-key authority, and public-key certificates. It analyzes whether a public-key infrastructure is feasible for sensor networks given their constraints. The document concludes by discussing potential public-key schemes that could work for wireless sensor networks.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
This document presents three algorithms for discovering conditional functional dependencies (CFDs) from sample data:
1) CFDMiner uses techniques for mining closed itemsets to discover constant CFDs efficiently.
2) CTANE extends the TANE algorithm to discover general CFDs through a levelwise search of an attribute-set/pattern tuple lattice.
3) FastCFD employs a depth-first search strategy and leverages closed-itemset mining to prune the search space, scaling better than CTANE for relations with large arity.
Experimental results show CFDMiner can be orders of magnitude faster for constant CFDs. CTANE performs well for large samples but not high
This document presents a design for an elastic buffer using tri-state buffers to reduce power consumption, area, and delay compared to an elastic buffer design using D flip-flops. It describes elastic buffer designs using D flip-flops and tri-state buffers, comparing their transistor counts, power, area, delay, and functionality. The proposed tri-state elastic buffer design is implemented using Cadence tools and shown to achieve a 48.68% reduction in total power, 5.62% reduction in delay, and 40.98% reduction in area over an elastic buffer design using D flip-flops.
The document discusses secure data sharing in cloud storage using a key-aggregate cryptosystem (KAC) which allows efficient delegation of decryption rights for any set of ciphertexts. KAC produces constant size ciphertexts and allows any set of secret keys to be aggregated into a single key encompassing the power of the keys being aggregated. This aggregate key can then be sent to others for decryption of the ciphertext set while keeping files outside the set confidential.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
This document summarizes a research paper on using elliptic curve cryptography for message authentication. It begins with an introduction to elliptic curve cryptography and how it can provide equivalent security to other public key encryption methods but with smaller key sizes. It then describes the proposed methodology which includes generating an ECC key pair, encrypting a message with the public key, transmitting the encrypted message, and decrypting it with the private key. The results show a message being encrypted and decrypted correctly using this ECC process. It concludes that ECC can provide an efficient method for authentication in systems like vehicular networks due to its lower computation and communication overhead compared to other encryption methods.
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
This document presents a case study on authentication in wireless sensor networks using virtual certificate authorities. It discusses how sensor nodes can securely transmit data when moving across different wireless sensor networks. The proposed approach uses virtual certificates issued by a virtual certificate authority to authenticate moving sensor nodes. Simulation results show that the virtual certificate scheme reduces collisions compared to previous authentication algorithms. The scheme enhances security, scalability and interoperability while supporting node mobility across wireless sensor networks.
This document discusses virtualization and homomorphic encryption in cloud computing. Virtualization allows multiple operating systems to run on the same server at the same time by creating virtual versions. It improves hardware utilization and saves costs. Homomorphic encryption allows computations to be performed on encrypted data without decrypting it first, preserving data privacy. While some encryption schemes allow limited mathematical operations, fully homomorphic encryption remains an area of research.
The document discusses lightweight cryptography for constrained devices. It presents the objectives of designing a lightweight bit-permutation instruction called PERMS to accelerate cryptography in software, and a new lightweight block cipher called Khudra suitable for both FPGAs and ASICs. It also aims to analyze Khudra's security against cryptanalysis techniques. The PERMS instruction is based on bit swapping to achieve permutation efficiently in hardware using control bits.
Wireless communication systems, multi-input multi-output (MIMO) technology has been recognized as the key ingredient to support higher data rate as well as better transmission quality after using this algorithm of a XTEA or MTEA scheme. Modified TEA is used for encryption of the text. Then decryption unit for decrypting the cipher text and convert that to plain text. Key generation unit is to generate 128bit key and these keys are send along with cipher text. Encryption and decryption system ensures the original data are send and received by the users in secured environment. The Received data are retrieving by the authorized users by providing key generation like private keys this Key Pattern generations provide more security to the messages. Extended tiny encryption algorithm or modified tiny encryption algorithm and tiny encryption algorithm are used to enhance the size, speed and security in the system. These algorithms are better compared to configurable joint detection decoding algorithm (CJDD) and valid symbol finder algorithm.
File transfer using cryptography techniquesmiteshkumar82
The document discusses implementing IT auditing mechanisms for cloud computing applications to ensure security. It proposes using checklists based on cloud computing deployment and service models to audit the lifecycle of cloud applications like customer relationship management. The goal is to present implications for large enterprises and achieve desired security levels by designing and implementing IT auditing techniques. Practical investigations show IT auditing can assure security, regulations, and compliance for enterprise applications in the cloud.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelMohit Goel
1) The document presents a technique for visual cryptographic steganography that uses RSA encryption and discrete wavelet transform (DWT) for data security.
2) In the proposed method, data is first encrypted using RSA encryption and then embedded in an image using Haar-DWT based steganography.
3) Experimental results on 100 images show the proposed technique achieves higher PSNR values compared to other techniques like LSB and LSB-DCT steganography, indicating better image quality and security of the hidden data.
Technical Seminar on Securing the IoT in the Quantum WorldSiri Murthy
This document summarizes research on securing Internet of Things (IoT) communication in a quantum world. Currently, IoT relies on cryptographic algorithms like AES and RSA, but these may be broken by quantum computers. The document reviews symmetric key and asymmetric key cryptography. It proposes using hash-based and code-based cryptosystems, like SPHINCS and McEliece, which are quantum-resistant. Doubling the key size of AES to 256 bits could also secure it against quantum attacks. The development of practical quantum computers may take 5-10 more years, so it is important to adopt quantum-resistant algorithms now to protect data in the future.
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
This document presents a secure encryption technique based on an advanced Hill cipher for a public key cryptosystem. The technique uses an involutory matrix and permuted key to encrypt plaintext into ciphertext. It further encrypts the ciphertext through two levels of scrambling and adds tamper detection by calculating and transmitting the determinant of the ciphertext matrix. The decryption process reverses these steps to recover the original plaintext. The technique aims to make the cipher highly secure against cryptanalytic attacks by introducing multiple transformations and ensuring the integrity of the ciphertext through determinant verification.
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...Mahmud Hossain
The document presents Boot-IoT, a privacy-aware authentication scheme for secure bootstrapping of IoT nodes. Boot-IoT uses combined public key cryptography to enable secure network admission and authentication based on elliptic curve cryptography. It also provides a lightweight certificateless mutual authentication scheme for secure access to services. Experimental results show that Boot-IoT has lower communication and computation costs compared to other authentication methods like EAP, making it more efficient for resource-constrained IoT devices.
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
The document discusses improving security for automation in the Internet of Things using one-time passwords. It proposes generating one-time passwords using AES algorithms to provide highly authorized authentication and access to equipment. The proposal includes using elliptic curve cryptography to generate one-time passwords and extending the AES symmetric encryption scheme with Lamport's one-time password algorithm. It analyzes the performance and security of the proposed scheme, finding it can be implemented in IoT networks to provide two-factor authentication between devices, applications, and their communications securely and efficiently with a smaller key size and lower computational requirements compared to other existing one-time password schemes.
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
The document describes a proposed system for secure data storage on cloud systems using elliptic curve cryptography and Shamir's secret sharing algorithm. It discusses how ECC and secret sharing can be used to encrypt data before storing it on the cloud to preserve privacy. The system aims to provide security services like confidentiality. It generates keys using ECC and secret sharing that are shared with authenticated users to allow access to encrypted data stored on the cloud. The system reduces storage and computational overhead for the customer and cloud storage server.
This document analyzes and compares the performance of various cryptography algorithms. It discusses symmetric key algorithms like DES, AES, Blowfish and IDEA as well as asymmetric algorithms like RSA and Diffie-Hellman. The performance is evaluated based on parameters like encryption/decryption time, memory usage and throughput. Experiments show that Blowfish has better performance than AES for encrypting audio files, with lower average encryption and decryption times. In conclusion, cryptography is important for network security and Blowfish performs encryption/decryption more efficiently than AES for audio files.
(1) The document proposes an energy efficient protocol for wireless sensor networks (WSNs) that employs replicated data sinks to achieve resiliency against data sink failures and efficient storage and retrieval of sensor data.
(2) It introduces a simple address assignment scheme that partitions the sensor field into cells, with each cell containing one data sink and sensors closest to that sink. This scheme is scalable and resilient against data sink and sensor node failures.
(3) The protocol uses five types of messages and a routing approach based on de Bruijn digraphs to minimize energy consumption during data transmission between sensors and sinks. It aims to maximize the lifetime of the sensor network.
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
This document discusses using public-key cryptography for data security in wireless sensor networks. It begins with an abstract that introduces public-key infrastructure for sensor networks to allow services like digital signatures. It then provides background on wireless sensor networks and discusses their limitations, including limited resources and vulnerability of nodes. It reviews different techniques for distributing public keys, including public announcement, publicly available directories, using a public-key authority, and public-key certificates. It analyzes whether a public-key infrastructure is feasible for sensor networks given their constraints. The document concludes by discussing potential public-key schemes that could work for wireless sensor networks.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
This document presents three algorithms for discovering conditional functional dependencies (CFDs) from sample data:
1) CFDMiner uses techniques for mining closed itemsets to discover constant CFDs efficiently.
2) CTANE extends the TANE algorithm to discover general CFDs through a levelwise search of an attribute-set/pattern tuple lattice.
3) FastCFD employs a depth-first search strategy and leverages closed-itemset mining to prune the search space, scaling better than CTANE for relations with large arity.
Experimental results show CFDMiner can be orders of magnitude faster for constant CFDs. CTANE performs well for large samples but not high
This document presents a design for an elastic buffer using tri-state buffers to reduce power consumption, area, and delay compared to an elastic buffer design using D flip-flops. It describes elastic buffer designs using D flip-flops and tri-state buffers, comparing their transistor counts, power, area, delay, and functionality. The proposed tri-state elastic buffer design is implemented using Cadence tools and shown to achieve a 48.68% reduction in total power, 5.62% reduction in delay, and 40.98% reduction in area over an elastic buffer design using D flip-flops.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The document proposes a dynamic state feedback controller to improve acceptable uncertainty bounds for second order systems. It introduces a dynamic state feedback controller and applies it to a second order system to regulate the state variables within tighter bounds compared to a conventional state feedback controller. The dynamic controller is shown to reduce the steady state error and improve disturbance rejection for second order systems.
This document reviews literature on benefits of customer relationship management (CRM) for customers. It identifies 8 key benefits of CRM for customers based on a review of previous studies from 2005-2012: 1) improved customer service, 2) increased personalized service, 3) being responsive to customer needs, 4) customer segmentation, 5) improved customization of marketing, 6) multichannel integration, 7) time savings, and 8) improved customer knowledge. The document argues that understanding these benefits can help companies increase customer satisfaction and retention.
Los mundos posibles son construcciones teóricas que representan formas en que el mundo podría haber sido o podría ser. Los mundos narrativos son mundos posibles que se desarrollan a través de una historia o narrativa.
A empresa de tecnologia anunciou um novo smartphone com câmera avançada, bateria de longa duração e processador rápido. O dispositivo também possui tela grande e armazenamento expandível. O lançamento está programado para o final do ano com preço inicial sugerido de US$799.
O documento discute o marketing, definindo-o como o conjunto de meios que uma empresa usa para vender produtos de forma rentável. Explica que o marketing evoluiu de se iniciar após a concepção do produto para antes da concepção, e distingue marketing estratégico de operacional. Também discute técnicas de marketing como segmentação e individualização do mercado.
This document reviews experiences with advanced practice nursing roles in 12 countries. It defines advanced practice nursing and describes different categories of nurses taking on these roles, such as nurse practitioners and clinical nurse specialists. The development of advanced practice nursing aims to address doctor shortages, changing healthcare needs, and rising costs. Evaluations show advanced practice nurses can improve access and provide similar quality care to doctors for minor illnesses and routine follow-ups. Their impact on costs depends on whether roles involve substituting or supplementing doctor tasks. Barriers to development include professional interests, how care is organized and funded, regulations, and education opportunities.
Cyprus International Documentary Film Festival ProgrammeAnima Slides
8th international Cyprus Documentary Film Festival - In August showing in Limassol, Cyprus Θέατρο Ένα Theatro Ena - more info: http://filmfestival.com.cy/
El documento habla sobre un viaje a Ticaco donde se visitaron el museo de Ticaco y las cuevas de Cala Cala, y donde el alcalde mostró su cariño por los visitantes.
O documento descreve a história do Palácio da Justiça de Manaus no Amazonas. Construído no século XIX em estilo neoclássico francês, serviu como principal tribunal da cidade até 2006 quando passou a ser um monumento histórico aberto à visitação pública.
La videoconferencia permite mantener conversaciones virtuales en tiempo real a través de video, audio y texto entre usuarios distantes. Ofrece beneficios como reducir tiempos y costos de viaje, aumentar la productividad y participación entre equipos distribuidos. Requiere hardware, software, una buena conexión a internet y habilidades técnicas para su uso efectivo.
Manoel e Aline conversam sobre problemas financeiros de Aline. Manoel oferece ajuda para melhorar a situação de Aline, sugerindo que ela envie seu currículo.
Este documento descreve uma proposta de ação de formação para professores sobre a integração de quadros interativos multimédia nos contextos de aprendizagem. A ação visa apoiar as escolas e professores no uso educativo destas tecnologias, promovendo novas práticas pedagógicas e materiais didáticos. A formação inclui sessões presenciais e trabalho autónomo, abordando conceitos sobre quadros interativos, elaboração de recursos educativos e aplicação nas diferentes didáticas.
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...IRJET Journal
This document proposes a key exchange mechanism for wireless sensor networks that reduces the number of keys each sensor node must store. It presents a protocol where each sensor node stores (n+1)/2 keys, rather than the n-1 keys required in the original protocol, where n is the number of sensor nodes. The protocol uses a "key sender" that distributes keys to sensor nodes. It proves this approach is optimal by showing any secure keying protocol must store at least (n-1)/2 keys per node. The protocol provides mutual authentication and secure data exchange between neighboring sensor nodes using these shared keys.
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
Wireless Sensor Networks (WSNs) are critical component in many applications that used for data collection. Since sensors have limited resource, Wireless Sensor Networks are more vulnerable to attacks than other wireless networks. It is necessary to design a powerful key management scheme for WSNs and take in consideration the limited characteristics of sensors. To achieve security of communicated data in the network and to extend the WSNs lifetime; this paper proposes a new scheme called Symmetric Key Management Scheme (SKMS). SKMS used Symmetric Key Cryptography that depends only on a Hash function and XOR operation for securing homogeneous and heterogeneous hierarchical WSNs. Symmetric Key Cryptography is less computation than Asymmetric Key Cryptography. Simulation results show that the proposed scheme provides security, save the energy of sensors with low computation overhead.
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
Wireless Sensor Networks (WSNs) are critical component in many applications that used for data
collection. Since sensors have limited resource, Wireless Sensor Networks are more vulnerable to
attacks than other wireless networks. It is necessary to design a powerful key management scheme for WSNs
and take in consideration the limited characteristics of sensors. To achieve security of communicated
data in the network and to extend the WSNs lifetime; this paper proposes a new scheme called
Symmetric Key Management Scheme (SKMS). SKMS used Symmetric Key Cryptography that depends
only on a Hash function and XOR operation for securing homogeneous and heterogeneous hierarchical
WSNs. Symmetric Key Cryptography is less computation than Asymmetric Key Cryptography. Simulation
results show that the proposed scheme provides security, save the energy of sensors with low
computation overhead.
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTINGecij
This document summarizes a research paper on generating secret keys for multiple wireless devices using multipath routing. It proposes a framework that uses AES encryption to generate unique 128-bit keys for each device pair, overcoming issues of limited signal range and centralized networks. The methodology observes devices to compare RSS signals and encrypts keys using AES. Performance analysis shows AES key generation is faster than DES and provides stronger security due to longer, randomly generated keys.
The document contains a series of questions and answers related to the topics of cryptography and network security. It is divided into 5 units, with questions ranging from defining basic terms to explaining concepts in more depth. Some of the questions ask for examples or demonstrations of algorithms and techniques. The document serves as a study guide or practice test for a course on cryptography and security.
The document contains a series of questions and answers related to the topics of cryptography and network security. It is divided into 5 units, with questions ranging from basic concepts and definitions to practical applications and algorithms. Some of the key topics covered include symmetric and asymmetric encryption, cryptanalysis techniques like brute force attacks, cryptographic hash functions, digital signatures, authentication protocols, and network security mechanisms like IPsec.
This document contains questions and answers related to the topics of cryptography and network security. It covers topics such as information security, data integrity, cryptanalysis, cryptographic algorithms, symmetric and asymmetric key cryptography, hashing, digital signatures, network attacks, and security protocols. The questions range from definitions of technical terms to short explanations of cryptographic concepts and mechanisms.
This document summarizes various data encryption techniques for securing data in cloud computing. It discusses hybrid encryption algorithms that combine Caesar cipher, RSA, and monoalphabetic substitution. It also describes the DES algorithm and its structure. Finally, it explores identity-based encryption (IBE) where a third party generates public keys based on user identifiers like email addresses. The document concludes that data security is an important issue for cloud computing and more research is still needed to enhance security features using cryptographic techniques.
The document discusses artificial neural networks and their application to cryptography. It begins by explaining that artificial neural networks are designed to model the way the brain performs tasks in a massively parallel manner. It then provides details on the basic structure of artificial neural networks, including processing units, weighted connections, and learning rules. The document next discusses using artificial neural networks for cryptography, including implementing a sequential machine with a Jordan network for encryption/decryption and using a chaotic neural network to encrypt digital signals in a secure manner. It concludes that artificial neural networks provide a novel approach for encrypting and decrypting data.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
This document provides an overview of network security concepts including cryptography, digital signatures, security at various layers, and firewalls. It discusses cryptography principles like plaintext, ciphertext, and keys. Symmetric and asymmetric key cryptography algorithms are explained along with digital signatures and hashing. Network layer security standards like IPsec and its authentication header and encapsulating security payload are described. Transport layer security including TLS handshake, alert, and cipher protocols is also summarized. The roles and types of firewalls in providing access control between networks are defined.
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...Karthikeyan Ece venkatesan
This document summarizes a research paper that proposes a three-tier security architecture for wireless body area networks (WBANs). The architecture consists of three tiers: 1) Proxy re-encryption is used between biomedical sensors to establish the first tier; 2) Data is encrypted using DES when sent from sensors to a network controller/coordinator to form the second tier; 3) The third tier uses AODV routing to encrypt data being sent from a home access point to a hospital gateway. The goal is to securely transmit biosignals in WBANs using an efficient key management approach based on existing cryptographic algorithms.
Secure Checkpointing Approach for Mobile Environmentidescitation
The document describes a secure checkpointing approach for mobile environments. It proposes using elliptic curve cryptography combined with checkpointing to provide a low overhead, secure, fault tolerant system. Key points:
- Checkpointing is used to save system states to allow recovery from failures. Elliptic curve cryptography provides security by encrypting communication and generating digital signatures.
- The approach shifts cryptographic calculations to base stations to reduce mobile node overhead. Checkpoints and recovery information are stored at base stations.
- Mobile nodes save checkpoints and transfer them to the current base station they are connected to. A recovery algorithm allows processes to rollback and resume from the last saved checkpoint if a failure occurs.
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
This document proposes a lightweight cryptography solution for secure communication in mobile ad hoc networks (MANETs). It describes creating a distributed public key infrastructure (PKI) using Shamir's secret sharing to decentralize the certificate authority role among MANET nodes. Each node holds a share of the private key. It then proposes using Tiny Encryption Algorithm (TEA), an efficient symmetric-key cipher, along with elliptic curve Diffie-Hellman key exchange to establish secure communication between nodes with limited resources. The system initializes by having founding MANET nodes act as dealers to distribute secret shares. Nodes then use Diffie-Hellman to independently derive a secret key to encrypt communications.
Neural Cryptography for Secret Key ExchangeIJMTST Journal
The goal of any cryptography system is the exchange of information among the intended user without any leakage of information to other who may have unauthorized access to it. A common secret key could be created over a public channel accessible to any opponent. Neural networks can be used to generate common secret key. In case of neural cryptography, both the communicating networks receive an identical input vector, generate an output bit and are trained based on the output bit. The two networks and their weights vectors exhibit a new phenomenon, where the networks synchronize to a state with identical time-dependent weights. The generated secret key over a public channel is used for encryption and decryption of the message or information send over the channel.
Analytical Study On Artificial Neural NetworkKristen Carter
This document analyzes the use of artificial neural networks in cryptography. It discusses how neural networks can be used for secret key exchange and encryption. Specifically, it examines how synchronizing two neural networks through mutual learning can generate a secret key that is then used to encrypt and decrypt messages. The document also reviews various soft computing techniques like fuzzy logic that can be integrated with neural networks for cryptography applications. It concludes that artificial neural networks have potential for building more secure and effective cryptographic systems by overcoming some of the drawbacks of traditional approaches.
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDijait
This document discusses and compares two public key cryptosystems - RSA and Elliptic Curve Cryptography (ECC) - for use in smart cards. It finds that ECC provides equivalent security to RSA but with significantly smaller key sizes, making it more efficient and suitable for smart cards with limited storage and processing capabilities. The document outlines the principles, key generation algorithms, and encryption/signature schemes for both RSA and ECC, including specific algorithms like Menezes-Vanstone and Nyberg-Rueppel. It analyzes the security level, efficiency, and space requirements of RSA and ECC, finding that ECC requires keys 10 times smaller than RSA for the same security level and its operations are an order of magnitude faster.
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
The document describes a proposed method for generating an encryption key from biometric cryptosystems to securely transfer data over a network. It involves extracting minutiae points from a fingerprint scan, generating a cryptographic key from the biometric template, and using an RSA encryption algorithm with the biometric-derived private key. A public key is also calculated based on ridge and furrow patterns in the fingerprint scan. The goal is to uniquely generate encryption keys for each individual using their biometric fingerprint information to add an extra layer of security beyond traditional encryption techniques.
The Internet of Things (IoT) offers many industries significant new opportunities, but it also exposes them and their customers to a host of security issues. Securing the IoT requires new ways of thinking that can defend the enterprise and its customers against attackers and privacy abuses.
1. Lino Zachariah, Dr. Poonam Sinha / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 6, November- December 2012, pp.043-047
Analysis and comparison of ECC & ECIES using IBE for
securing patient’s privacy
Lino Zachariah Dr. Poonam Sinha
M-Tech(IT), BU Bhopal HOD-Information Technology
BU, Bhopal (MP)
ABSTRACT
The work that we are presenting here denotes the communications device, a small microcontroller,
comparison between Elliptic curve cryptography and an energy source, usually a battery. The
and elliptic curve integrated Encryption Scheme envisaged size of a single sensor node can vary from
using Identity Based Encryption implemented on shoebox-sized nodes down to devices the size of
sensor networks, motivated by those networks' grain of dust although functioning 'motes' of
need for an efficient, secure mechanism for genuine microscopic dimensions have yet to be
shared cryptographic keys' distribution and created. The cost of sensor nodes is similarly
redistribution among nodes. Both the variable, ranging from hundreds of dollars to a few
cryptographic technique can be implemented as cents, depending on the size of the sensor network
an application for securing the patient’s privacy and the complexity required of individual sensor
in wireless body sensor networks. Hence, we are nodes. Size and cost constraints on sensor nodes
comparing the their implementation on body result in corresponding constraints on resources
sensor network for the encryption and such as energy, memory, computational speed and
decryption of patient’s private record. bandwidth. Sensor nodes can be imagined as small
computers, extremely basic in terms of their
INTRODUCTION interfaces and their components. They usually
Body Sensor Networks (also known as consist of a processing unit with limited
bodynets or Body Area Networks) have the potential computational power and limited memory, sensors
to revolutionize healthcare monitoring. These (including specific conditioning circuitry), a
networks are comprised of wearable devices with communication device (usually radio transceivers or
attached sensors that can measure various alternatively optical), and a power source usually in
physiological and environmental signals. Bodynet the form of a battery. The base stations are one or
devices communicate wirelessly with networked more distinguished components of the WSN with
gateways (mobile phones, computers and PDAs) much more computational, energy and
which store, analyse and communicate vital communication resources. They act as a gateway
information in real-time. A Bodynet can be designed between sensor nodes and the end user.
to immediately alert emergency personnel to a
critical situation like a heart attack or a debilitating IDENTITY BASED ENCRYPTION
fall. Bodynets can also help physicians catch Identity-based encryption (IBE) is a public-
warning signs of a disease earlier or remotely key encryption technology that allows a public key
monitor the progress of a recovering surgery patient. to be calculated from an identity and a set of public
A Wireless Sensor Network (WSN) is a mathematical parameters and for the corresponding
wireless network consisting of spatially distributed private key to be calculated from an identity, a set of
autonomous devices using sensors to cooperatively public mathematical parameters and a domain-wide
monitor physical or environmental conditions, such secret value. An IBE public key can be calculated
as temperature, sound, vibration, pressure, motion or by anyone who has the necessary public parameters;
pollutants, at different locations. The development a cryptographic secret is needed to calculate an IBE
of wireless sensor networks was originally private key, and the calculation can only be
motivated by military applications such as performed by a trusted server which has this secret.
battlefield surveillance. However, wireless sensor Identity-based systems allow any party to generate a
networks are now used in many civilian application public key from a known identity value such as an
areas, including environment and habitat monitoring, ASCII string. A trusted third party, called the
healthcare applications, home automation, and Private Key Generator (PKG), generates the
traffic control. corresponding private keys. To operate, the PKG
In addition to one or more sensors, each first publishes a master public key, and retains the
node in a sensor network is typically equipped with corresponding master private key (referred to as
a radio transceiver or other wireless master key). Given the master public key, any party
can compute a public key corresponding to the
identity ID by combining the master public key with
1|Page
2. Lino Zachariah, Dr. Poonam Sinha / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 6, November- December 2012, pp.043-047
the identity value. To obtain a corresponding private hash function h(). Finally, we have the secret key x
key, the party authorized to use the identity ID and public parameters (y, P, p, q, h(.)). Encrypting a
contacts the PKG, which uses the master private key message m using public key y as EccEncrypt(m, y).
to generate the private key for identity ID. The resulting ciphertext is denoted by c. The
As a result, parties may encrypt messages decryption of ciphertext c using the secret key x is
(or verify signatures) with no prior distribution of given as EccDecrypt(c, x).
keys between individual participants. This is The algorithms for EccEncrypt and EccDecrypt
extremely useful in cases where pre-distribution of are found in following Alg. 1 and Alg. 2
authenticated keys is inconvenient or infeasible due respectively.
to technical restraints. However, to decrypt or sign
messages, the authorized user must obtain the Algorithm1: EccEncrypt(m, y)
appropriate private key from the PKG. A caveat of
this approach is that the PKG must be highly trusted, 1: Generate a random number r ∈ GF(p). Encrypt m
as it is capable of generating any user's private key with r, Er(m)
and may therefore decrypt (or sign) messages 2: Calculate Ar = h(r) · y
without authorization. Because any user's private 3: Calculate Br = h(r) · P
key can be generated through the use of the third 4: Calculate α r = r ⊕x(Ar), where x(Ar) is the x
party's secret, this system has inherent key escrow. coordinate of Ar
A number of variant systems have been proposed 5: Return ciphertext c = < α r, Br, Er(m)>
which remove the escrow including certificate-based
encryption, secure key issuing cryptography and
certificate less cryptography [25]. Algorithm2: EccDecrypt(c, x)
IBE scheme consists of four algorithms:
1: Calculate x · Br = x · h(r) · P = h(r)·y = Ar
(1) Setup generates global system parameters and a 2: Determine the x coordinate, x(Ar)
master-key. 3: Derive symmetric key r with αr ⊕x(Ar) = r
(2) Extract uses the master-key to generate the ⊕x(Ar) ⊕x(Ar) = r
private key corresponding to an arbitrary public key 4: Apply r to Er(m) to return m
string ID.
(3) Encrypt encrypts messages using the public key
ID, and
ELLIPTIC CURVE INTEGRATED
(4) Decrypt decrypts messages using the
corresponding private key.
ENCRYPTION SCHEME
In 1997, Mihir Bellare and Philip Rogaway
(1) Setup: IBE systems rely upon a trusted central
[28] presented the Discrete Logarithm Augmented
authority that manages the parameters with which
Encryption Scheme (DLAES), which was
keys are created. This authority is called the Private
subsequently improved by the same authors and
Key Generator or PKG. The PKG creates its
Michel Abdalla, being first renamed as the Diffie-
parameters, including a master secret from which
Hellman Augmented Encryption Scheme (DHAES)
private keys are created.
in 1998 [26] and later as the Diffie-Hellman
(2) Extraction: When doctor wishes to decrypt the
Integrated Encryption Scheme (DHIES) in 2001
message C that was encrypted, he/she authenticates
[27], in order to avoid confusions with the
himself to the PKG and obtains the secret key that
Advanced Encryption Standard (AES). DHIES
he/she uses to decrypt messages.
represents an enhanced version of the ElGamal
(3) Encryption: When patient wishes to encrypt a
encryption scheme, using elliptic curves in an
message, he encrypts the message by computing or
integrated scheme which includes public key
obtaining the public key, and then encrypting a
operations, symmetric encryption algorithms, MAC
plaintext message M with public key to obtain
codes, and hash computations. Because of the
ciphertext C.
integration of different functions, DHIES is secure
(4) Decryption: When doctor has C and private key,
against chosen ciphertext attacks without having to
he/she decrypts C to obtain the plaintext message M.
increase the number of operations or the key length
Here we are providing the application of Identity
[27].
Based Encryption on ECC and ECIES.
ELLIPTIC CURVE CRYPTOGRAPHY ECIES FUNCTIONAL COMPONENENT
As it name indicates, ECIES is an
To setup ECC, we first select a particular
integrated encryption scheme that uses the following
elliptic curve E over GF (p), where p is a big prime
functions:
number. We also denote P as the base point of E and
q as the order of P, where q is also a big prime. We Key Agreement (KA): Function used by
then pick a secret key x, and the corresponding two parties for the creation of a shared
public key y, where y = x · P, and a cryptographic secret.
2|Page
3. Lino Zachariah, Dr. Poonam Sinha / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 6, November- December 2012, pp.043-047
Key Derivation (KDF): Mechanism that ECIES Encryption
produces a set of keys from keying material
and some optional parameters. INPUT: Message m and public key
Hash (HASH): Digest function. OUTPUT: The ciphertext ( U,c,r)
Encryption (ENC): Symmetric encryption
1. Choose k € R(1…………….q-1)
algorithm.
2. U [k]G
Message Authentication Code (MAC):
3. T [k]Y
Information used to authenticate a message.
4. (k1||k2) KD(T,l)
5. Encrypt the message c Ek1(m)
The elliptic curve integrated encryption
6. Compute the MAC on the ciphertext r
system (ECIES) is the standard elliptic curve based
MACk2(c)
encryption algorithm. It is called integrated, since it
7. Output (U,c,r)
is a hybrid scheme that uses a public –key system to
transport a session key for use by a symmetric
ECIES encryption requires a message and
cipher.
the key to encrypt the message.First a random prime
ECIES is a public-key encryption
number is selected between range.then U is
algorithm where there is assumed to be a set of
predicted which is public key.
domain parameters (K,E,q,h,G). With these
Each element of the ciphertext (U,c,r) is important:
parameters, we also add a choice of symmetric
U is needed to agree the ephemeral Diffie Hellman
encryption/decryption functions which we shall
key T.
denote Ek(m) and Dk(c). The use of a symmetric
c is actual encryption of the message.
encryption function makes it easy to encrypt long
r is used to avoid adaptive chosen ciphertext attacks.
messages. In addition instead of a simple hash
function we require two special types of hash
Notice that the data item U can be
function:
compressed to reduce bandwisth, since it is an
A message authentication code MAC k(c).
elliptic curve point.
Notice that the T computed in the decryption
MAC : {0.1}^n * {0,1}^* {0,1}^m
algorithm is the same as the T computed in the
encryption algorithm since
This acts precisely like a standard hash function
Tdecryption = [r]U = [x][k]G = [k]([x]G) =
except that it has a secret key passed to it as well as
[k]Y=Tencryption.
a message to be hashed.
A key derivation function KD(T,l)
ECIES Decryption
KD : E * N {0,1}^*
INPUT: Ciphertext ( U,c,r) and a private key r.
A key derivation function acts precisely OUTPUT: The message m or an ‘invalid
like a hash function except that output length could ciphetext’ message.
be quite large. The output is used as a key to encrypt
a message hence if the key is to be used in a xor- 1. T [x]U
based encryption algorithm the output needs to be as 2. (k1||k2) KD(T,l)
long as the message being encrypted. 3. Decrypt the message m Dk(c).
The x-or based encryption requires key 4. if r ≠ MACk2(c) then output ‘Invalid
derivation and the MAC function to encrypt the Ciphertext’
message on the basis of x-or operation on bits. 5. output m.
The ECIES scheme works like a one-pass
Diffie Hellman key transport, where one of the BACKGROUND
parties is using a fixed long term rather than an The Elliptic curve with identity based
ephemeral one. This is followed by symmetric encryption technique provides the security of single
encryption of the actual message. For example the data over the network, but here we are comparing
combined length of the required MAC key and the the Elliptic curve integrated encryption scheme
required key for the symmetric encryption is given using IBE and analyse the comparison between the
by l. The recipient is assumed to have a long-term two elliptic curve standards to secure patient’s
public /private key pair ( Y,x) where record. The elliptic curve using Identity based
encryption is the technique where the data reading
Y = [x] G from the sensors can be encrypted using n number
of identities, one for each record of the patient. The
doctor can only decrypt a particular data even if he
knows the identity of the other records also. The
3|Page
4. Lino Zachariah, Dr. Poonam Sinha / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 6, November- December 2012, pp.043-047
elliptic curve integrated encryption system (ECIES) As shown in the fig. 1 that the proposed algorithm
is the standard elliptic curve based encryption when implemented gives less time than the
algorithm. It is called integrated, since it is a hybrid existing ECC technique, Also the proposed
scheme that uses a public –key system to transport a algorithm requires less storage in the sensor to
session key for use by a symmetric cipher. The store the data. Hence requires less storage.
algorithm provides an x-or based encryption
technique over key distribution function and the Storage (bytes) ECC-IBE ECIES
MAC code. The idea is to use multiple sensors in
multiple patients, where the sensors notes different 2500 50 N*50
reading and collect over to the storage site. The 5000 100 N*100
ECIES has an advantage over ECC as our algorithm 10000 200 N*200
is very useful for the integration of more than one 25000 500 N*500
data at the storage site and to encrypt and decrypt 50000 1000 N*1000
them easily. Also our algorithm used a MAC Figure 1.2 Key Required Vs Storage Size in Byte
function to generate number in a more secure way
and also this algorithm uses the concept of
Where ‘N’ is the number of patients.
symmetric as well as asymmetric key. As our proposed algorithm generates ‘n’
A body sensor network (BSN), is a network of number of public keys and different on the number
sensors de- of public keys the sensors read that number of data.
ployed on a person’s body, usually for health care As shown in the fig. 1.2 that as the memory required
monitor-ing. Since the sensors collect personal
to store the data will depends on the number of
medical data, secu-rity and privacy are important
public keys and the storage will increase if the
components in a body sensor network. At the same
number of public keys generated will increase.
time, the collected data has to read- ily available in
the event of an emergency.
Time(S) 3.45 6.9 10.35 13.8 17.25 20.7
RESULTS COMPASION BETWEEN ECC
& ECIES Keys 5 10 15 20 25 30
Public key: The key generated when the sensors
starts reading from the patient. Figure 1.3 Time Required Vs Key Required
Signature: The sensors when reads the data and
encrypted that data using signatures Result Analysis
(verification of the sender and the receiver The fig. 1.3 shows the time required to
so that the unauthorised user can’t access generate the public key, as our proposed algorithm
the data) so that data can’t be access generates ‘n’ number of public keys, so the time
eavesdropped and the signatures when required for generating ‘n’ public keys will increase
matched can be decrypted. the time according to the number of public keys
Encrypted Data: The data which is not in actual generated.
form but can be converted into another
form such that the even if the data is Conclusion
accessed can’t understand by the others. This paper has presented the working of a
Decrypted Data: The data which is encrypted to system of compact, wearable, wireless body sensing
provide a security to the data will be devices implanted in the human body. The novel
decrypted by the same technique used for achievement is that we have proposed is the
encryption such that data is correct and improvement in the existing protocol for data
readable. encryption, decryption and transfer between BSN,
Data storage: The memory required to store a single storage site and doctor with the need for high data
data from the patient in the sensor. rates.
The main idea to implement the elliptic
Parameters ECC-IBE ECIES curve algorithms that may be used for securing of
multiple patient’s data over sensor network, here we
Public key 0.74 sec 0.69 sec are implementing and analysing two elliptic curve
technique and comparing on different parameters.
Signature time 0.77 sec 0.7 sec
Time to encrypt 5.7 sec 5.5 sec
Time to decrypt 1.12 sec 2.07 sec
Storage 1.6 KB 45 bytes
Fig. 1.1 Analysis on different parameters
4|Page
5. Lino Zachariah, Dr. Poonam Sinha / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 6, November- December 2012, pp.043-047
REFERENCES [18] D. J. Malan, M. Welsh, and M. D. Smith. A
[1] N. Asokan, K. Kostiainen, P. Ginzboorg, J. public-key infrastructure for key
Ott, and C. Luo. Applicability of identity- distribution in tinyos based on elliptic
based cryptography for disruption-tolerant curve cryptography. In SECON 2004.
networking. In MobiOpp 2007. [19] K. Malasri and L. Wang. Addressing
[2] D. Boneh and M. Franklin. Identity-based security in medical sensor networks. In
encryption from the Weil pairing. In HealthNet 2007.
CRYPTO 2001. [20] M. Mont, P. Bramhall, and K. Harrison. A
[3] S. Capkun, L. Butty´an, and J.-P. Hubaux. flexible role-based secure messaging
Self organized public-key management for service: exploiting IBE technology for
mobile ad hoc networks. IEEE TMC 2003. privacy in health care. In International
[4] H. Chan, A. Perrig, and D. Song. Random Workshop on Database and Expert Systems
key predistribution schemes for sensor Applications 2003.
networks. In IEEE SP 2003. [21] E. Mykletun, J. Girao, and D. Westhoff.
[5] C. Cocks. An identity based encryption Public key based cryptoschemes for data
scheme based on. quadratic residues. In concealment in wireless sensor networks.
LNCS 2260 (2001). In ICC2006.
[6] W. Du, R. Wang, and P. Ning. An efficient [22] A. Perrig, R. Szewczyk, V. Wen, D. Culler,
scheme for authenticating public keys in and J. D. Tygar. SPINS: Security protocols
sensor networks. In MobiHoc 2005. for sensor networks. In Mobicom 2001.
[7] L. Eschenauer and V. D. Gligor. A key- [23] A. Shamir. Identity-based cryptosystems
management scheme for distributed sensor and signature schemes. In CRYPTO 1984.
networks. In CCS 2002. [24] L. Zhong, M. Sinclair, and R. Bittner. A
[8] R. Ganti, P. Jayachandran, and T. phone centered body sensor network
Abdelzaher. Satire: A software architecture platform: cost, energy efficiency and user
for smart attire. In Mobisys 2006. interface. In BSN 2006.
[9] J. Girao, D. Westhoff, E. Mykletun, and T. [25]
Araki.Tinypeds: Tiny persistent encrypted http://en.wikipedia.org/wiki/Identity_based
data storage in asynchronous wireless _encryption.
sensor networks. Ad Hoc Networks 2007. [26] M. Abdalla, M. Bellare, P. Rogaway.
[10] U. Hengartner and P. Steenkiste. DHAES: An Encryption Scheme Based on
Exploiting hierarchical identity-based the Diffie-Hellman Problem, contribution
encryption for access control to pervasive to IEEE P1363a, 1998.
computing information. In SecureComm [27] M. Abdalla, M. Bellare, P. Rogaway. The
2005. Oracle Diffie- Hellman Assumptions and
[11] C. Karlof, N. Sastry, and D. Wagner. an Analysis of DHIES, Lecture Notes in
Tinysec: a link layer security architecture Computer Science, 2020, pp. 143–158,
for wireless sensor networks. In SenSys 2001.
2004. [28] M. Bellare and P. Rogaway. Minimizing
[12] A. Kate, G. Zaverucha, and U. Hengartner. the Use of Random Oracles in
Anonymity and security in delay tolerant Authenticated Encryption Schemes,
networks. In SecureComm 2007. Lecture Notes in Computer Science, 1334,
[13] L. Lazos and R. Poovendran. Serloc: pp. 1–16, 1997.
Secure range independent localization for
wireless sensor networks. ACM TOSN
2005.
[14] A. Liu, P. Kampanakis, and P. Ning.
Tinyecc: Elliptic curve cryptography for
sensor networks (version 0.3). 2007.
[15] D. Liu and P. Ning. Establishing pairwise
keys in distributed sensor networks. In
CCS 2003.
[16] B. Lo and G. Z. Yang. Key technical
challenges and current implementations of
body sensor networks. In BSN 2005.
[17] D. Malan, T. Fulford-Jones, M. Welsh, and
S. Moulton. Codeblue: An ad hoc sensor
network infrastructure for emergency
medical care. In BSN 2004.
5|Page