Conventional encryption schemes are susceptible to brute-force attacks. This is because bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a ciphertext and tries to decrypt the message by brute-forcing with an incorrect key can filter out some of the combinations of the decrypted message by observing that some of the sequences are a combination of characters which are distributed non-uniformly and form no plausible meaning. Honey encryption (HE) scheme was proposed to curtail this vulnerability of conventional encryption by producing ciphertexts yielding valid-looking, uniformly distributed but fake plaintexts upon decryption with incorrect keys. However, the scheme works for only passwords and PINS. Its adaptation to support encoding natural language messages (e-mails, human-generated documents) has remained an open problem. Existing proposals to extend the scheme to support encoding natural language messages reveals fragments of the plaintext in the ciphertext, hence, its susceptibility to chosen ciphertext attacks (CCA). In this paper, we modify the HE schemes to support the encoding of natural language messages using Natural Language Processing techniques. Our main contribution was creating a structure that allowed a message to be encoded entirely in binary. As a result of this strategy, most binary string produces syntactically correct messages which will be generated to deceive an attacker who attempts to decrypt a ciphertext using incorrect keys. We evaluate the security of our proposed scheme.
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
Survey of universal authentication protocol for mobile communicationAhmad Sharifi
This document provides a survey of universal authentication protocols. It begins with an introduction to authentication protocols and some examples of protocols that were later found to have flaws. It then discusses the cryptographic prerequisites for authentication protocols, including symmetric key cryptography, classical cryptography, and modern cryptography. The document describes several block cipher algorithms and modes of using block ciphers. The overall purpose is to provide an overview of authentication protocols and related cryptographic concepts.
This document is a project report submitted by Gaurav Shukla for his internship at IIT Kanpur under the guidance of Mr. B.M. Shukla. The report compares secured message delivery using SSL and GPG. It provides background on cryptography, describes how SSL and GPG work to securely transmit messages, and analyzes parts of the GPG source code to observe cryptographic flaws. The document contains sections on certificate, acknowledgements, introduction to cryptography concepts, descriptions of SSL and GPG, results and analysis of comparing the two methods, conclusions, and bibliography.
Survey Paper: Cryptography Is The Science Of Information SecurityCSCJournals
Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerce. Cryptography is used to ensure that the contents of a message are confidentiality transmitted and would not be altered. Confidentiality means nobody can understand the received message except the one who has the decipher key, and data cannot be changed means the original information would not be changed or modified; this is done when the sender includes a cryptographic operation called a hash function in the original message. A hash function is a mathematical representation of the information, when any information arrives at its receiver; the receiver calculates the value of this hash function. If the receiver’s hash function value is equivalent to the sender’s, the integrity of the message is assured .
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
Survey of universal authentication protocol for mobile communicationAhmad Sharifi
This document provides a survey of universal authentication protocols. It begins with an introduction to authentication protocols and some examples of protocols that were later found to have flaws. It then discusses the cryptographic prerequisites for authentication protocols, including symmetric key cryptography, classical cryptography, and modern cryptography. The document describes several block cipher algorithms and modes of using block ciphers. The overall purpose is to provide an overview of authentication protocols and related cryptographic concepts.
This document is a project report submitted by Gaurav Shukla for his internship at IIT Kanpur under the guidance of Mr. B.M. Shukla. The report compares secured message delivery using SSL and GPG. It provides background on cryptography, describes how SSL and GPG work to securely transmit messages, and analyzes parts of the GPG source code to observe cryptographic flaws. The document contains sections on certificate, acknowledgements, introduction to cryptography concepts, descriptions of SSL and GPG, results and analysis of comparing the two methods, conclusions, and bibliography.
Survey Paper: Cryptography Is The Science Of Information SecurityCSCJournals
Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerce. Cryptography is used to ensure that the contents of a message are confidentiality transmitted and would not be altered. Confidentiality means nobody can understand the received message except the one who has the decipher key, and data cannot be changed means the original information would not be changed or modified; this is done when the sender includes a cryptographic operation called a hash function in the original message. A hash function is a mathematical representation of the information, when any information arrives at its receiver; the receiver calculates the value of this hash function. If the receiver’s hash function value is equivalent to the sender’s, the integrity of the message is assured .
This document discusses network security and cryptography. It begins by introducing network security concepts like secrecy, authentication, nonrepudiation, and integrity. It then discusses cryptography topics such as symmetric and public key encryption. Specific algorithms like RSA are explained. The document also discusses security issues at different layers of the network and summarizes techniques used at each layer.
This document proposes a novel method to defend against IP spoofing attacks using packet filtering and marking techniques. It involves a network architecture model with trusted nodes that can access each other after authentication. The proposed method uses packet tracing and cooperation between trusted adjacent nodes to detect and block spoofed packets entering the trusted network from external sources. It aims to effectively defend against distributed denial of service attacks and IP spoofing attacks.
This document provides a survey of metamorphic cryptography techniques. It begins with an introduction to cryptography and steganography individually, explaining how cryptography encrypts messages and steganography hides messages. It then discusses the benefits of combining these approaches in metamorphic cryptography, including providing multiple layers of security. Two examples of metamorphic cryptography techniques are described: one using static parsing steganography to hide bits of a secret message in cover image pixels, and another combining AES encryption with discrete cosine transform to hide encrypted text in an image. The document concludes that non-metamorphic approaches are less secure because they rely on single methodologies and simpler encoding algorithms.
Cryptography On Android Message Application Using Look Up Table And Dynamic ...IOSR Journals
This document describes a proposed cryptography algorithm called CAMA for encrypting SMS messages on Android devices. CAMA uses a static lookup table and dynamic key for symmetric encryption and decryption. The algorithm converts plain text to cipher text using the lookup table and encrypts the dynamic key, which is a combination of characteristics of the message, for decryption. The goals of the algorithm are to provide secure and simple encryption of SMS messages on mobile phones.
The document provides information about the members of a group - Abdullah Rashid Baig, Adnan Haider, Muhammad Zakria, and Muhammad Zeeshan Khan. It then provides definitions and explanations of cryptography, cryptographic algorithms, encryption, decryption, plaintext, ciphertext, keys, secret key cryptography, public key cryptography, hashing, digital signatures, and security goals like confidentiality, authentication, integrity, availability, non-repudiation, and access control. It also discusses potential attacks on cryptography like viruses, traffic analysis, electromagnetic detection, and dictionary attacks.
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
Cryptography means storing and transmitting data or information in a particular form that allow to be kept secret.
Symmetric key cryptography:- Both sender and receiver share the secret key.The symmetric key is kept private.both parties use the same key for encryption and decryption.
Asymmetric key cryptography:- Asymmetric key cryptography uses public or private key for encryption and decryption.Public key is kept by publically and private is kept secret.sender use the public key to send message and receiver use the private or secret key to decrypt the message.
This document summarizes Sabiha Batool's presentation on cryptography in information security. The presentation covered the history and basic concepts of cryptography, including definitions of encryption, decryption, plaintext and ciphertext. It discussed symmetric and asymmetric key cryptography as well as hash functions and the RSA algorithm. The presentation explained how cryptography helps achieve the goals of information security - data integrity, authentication, confidentiality and non-repudiation. It reviewed literature on the topic and concluded by discussing the advantages and limitations of cryptography as well as its applications.
This document provides an introduction to cryptography. It discusses security goals like confidentiality and integrity. Cryptography is defined as transforming messages to make them secure. There are two main types: symmetric key cryptography where the same key is used to encrypt and decrypt, and asymmetric key cryptography where different public and private keys are used. Basic cryptography terms like cipher, ciphertext, encryption and decryption are also explained. Examples of cipher types like substitution and transposition ciphers are given. Applications of cryptography include defense, e-commerce, and data security.
Today, more than ever, computer networks are utilized for sharing services and resources. Information travelling across a shared IP-based network, such as the Internet, could be exposed to many devious acts such as eavesdropping, forgery and manipulation. Fortunately, there are several mechanisms that can protect any information that needs to be sent over a network. This paper introduces security threats to today’s IP-based networks and explains available security mechanisms to effectively prevent such threats from happening.
A Study of Different Partitioning Clustering Techniqueijsrd.com
In the field of software, Data mining is very useful to identify the interesting patterns and trends from the large amount of stored data into different database and data repository. Clustering technique is basically used to extract the unknown pattern from the large set of data for electronic stored data, business and real time applications. Clustering is a division of data into different groups. Data are grouped into clusters with high intra group similarity and low inter group similarity [2]. Clustering is an unsupervised learning technique. Clustering is useful technique that applied into many areas like marketing studies, DNA analysis, text mining and web documents classification. In the large database, the clustering task is very complex with many attributes. There are many methods to deal with these problems. In this paper we discuss about the different Partitioning Based Methods like- K-Means, K-Medoids and Fuzzy K-Means and compare the advantages or disadvantages over these techniques.
The document discusses the history and concepts of cryptography, especially in the context of e-commerce. It explains how cryptography evolved from ancient times to modern applications. Symmetric and asymmetric encryption methods are described, including how public/private key pairs work. Digital signatures are introduced as a way to provide authentication, integrity, and non-repudiation for electronic transactions.
Advanced cryptography and implementationAkash Jadhav
The document discusses a technical presentation on advanced cryptography and its implementation. It provides an overview of cryptography, including its history and basic concepts such as encryption, decryption, and cryptanalysis. Examples of cryptography applications discussed include ATM cards, credit cards, e-mail, and lottery tickets.
Bt0088 cryptography and network security1Techglyphs
The document discusses various topics related to cryptography and network security including:
1. The need for network security to prevent damage to organizations from hostile software or intruders.
2. Security attacks are any actions that compromise information security, while vulnerabilities are weaknesses that can be exploited by threats to cause harm.
3. The difference between substitution and transposition techniques for encryption, where substitution exchanges letters and transposition rearranges them.
4. Caesar cipher encryption of a sample plaintext using a key of 3.
Secret writing refers to cryptography and steganography. Cryptography involves encrypting messages so only authorized users can read them, while steganography hides information within other files or mediums. Common cryptographic techniques include symmetric and asymmetric encryption methods. Symmetric encryption uses a shared key between sender and receiver, while asymmetric encryption uses public and private key pairs. Steganography hides information by embedding it within images or other files.
This document discusses network security. It covers the need for security, goals of security like integrity, confidentiality, authentication, non-repudiation and availability. It then discusses famous malware types like viruses, worms and trojan horses. Viruses attach to programs and run when the program runs, worms replicate endlessly without causing harm, and trojan horses provide unauthorized access. The document also covers phishing scams and cryptography techniques like encryption, decryption, symmetric and asymmetric key cryptography.
Communication networks are used to transfer valuable and confidential information for a variety of purposes. As a consequence, they attract the attention of people who intend to steal or misuse information, or to disrupt or destroy the systems storing or communicating it.
Review on feature-based method performance in text steganographyjournalBEEI
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.
Enhancement in network security with security protocolseSAT Journals
Abstract Network security is a wider term used habitually to be an eternal security medium to the broadcasting environment. Cryptography, Authentication and access control Mechanisms play a vital role in secure communication over the network. The computer network is a collection of network that shares information across wired or wireless technology. In order to transfer data in a protected and confidential manner there are several security measures available. Network security can also be referred to as network safety. Network security is used to prevent the attacks by using protocols during the communication of data. This paper describes the several types of attacks, threats and protocols which attempts the secure communication between client and server. Keywords: - DSA, DDOS, HTTPS, RADIUS, VPN, IPSEC etc…
This document discusses various network security protocols and techniques. It begins with an introduction to network security and describes common network attacks such as denial of service attacks, spoofing, sniffing, and hijacking. It then discusses protocols for enhancing network security such as Kerberos, RADIUS, TACACS+, IPSec, and virtual private networks (VPNs). The document provides details on how these various protocols provide authentication, authorization, access control, integrity, and confidentiality to secure network communications.
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
This document proposes an encryption technique that uses binary coded decimal (BCD) and bit complementation. The technique encrypts the key first using a two's complement before encrypting the data with the encrypted key. This provides three levels of encryption. The algorithm uses basic binary operations and computation, making it faster than other algorithms. An experimental analysis showed it outperformed similar variants in terms of performance. The document provides background on symmetric key cryptography and reviews related work on other encryption algorithms.
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...IRJET Journal
This document presents a study that aims to develop a secure messaging system using honey encryption to prevent brute force attacks. It proposes combining honey encryption with the Blowfish encryption algorithm. The study first describes honey encryption and how it works to thwart brute force attacks by producing plausible-looking fake plaintexts from incorrect decryption keys. It then evaluates using honey encryption with the AES and Blowfish algorithms by implementing them and measuring processing times. The results show that honey encryption with Blowfish has significantly lower processing times than with AES, suggesting Blowfish may be better suited for integration with honey encryption in secure messaging systems.
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
This document summarizes and compares several symmetric encryption algorithms, including DES, 3DES, Blowfish, AES, and HiSea. It discusses the components, workings, and security aspects of symmetric block ciphers and stream ciphers. It also briefly covers asymmetric encryption and key schedule algorithms. The document evaluates and compares the performance of the symmetric algorithms based on encryption speed, throughput, key size, security properties, and other factors to help users select the most suitable algorithm for their needs.
This document discusses network security and cryptography. It begins by introducing network security concepts like secrecy, authentication, nonrepudiation, and integrity. It then discusses cryptography topics such as symmetric and public key encryption. Specific algorithms like RSA are explained. The document also discusses security issues at different layers of the network and summarizes techniques used at each layer.
This document proposes a novel method to defend against IP spoofing attacks using packet filtering and marking techniques. It involves a network architecture model with trusted nodes that can access each other after authentication. The proposed method uses packet tracing and cooperation between trusted adjacent nodes to detect and block spoofed packets entering the trusted network from external sources. It aims to effectively defend against distributed denial of service attacks and IP spoofing attacks.
This document provides a survey of metamorphic cryptography techniques. It begins with an introduction to cryptography and steganography individually, explaining how cryptography encrypts messages and steganography hides messages. It then discusses the benefits of combining these approaches in metamorphic cryptography, including providing multiple layers of security. Two examples of metamorphic cryptography techniques are described: one using static parsing steganography to hide bits of a secret message in cover image pixels, and another combining AES encryption with discrete cosine transform to hide encrypted text in an image. The document concludes that non-metamorphic approaches are less secure because they rely on single methodologies and simpler encoding algorithms.
Cryptography On Android Message Application Using Look Up Table And Dynamic ...IOSR Journals
This document describes a proposed cryptography algorithm called CAMA for encrypting SMS messages on Android devices. CAMA uses a static lookup table and dynamic key for symmetric encryption and decryption. The algorithm converts plain text to cipher text using the lookup table and encrypts the dynamic key, which is a combination of characteristics of the message, for decryption. The goals of the algorithm are to provide secure and simple encryption of SMS messages on mobile phones.
The document provides information about the members of a group - Abdullah Rashid Baig, Adnan Haider, Muhammad Zakria, and Muhammad Zeeshan Khan. It then provides definitions and explanations of cryptography, cryptographic algorithms, encryption, decryption, plaintext, ciphertext, keys, secret key cryptography, public key cryptography, hashing, digital signatures, and security goals like confidentiality, authentication, integrity, availability, non-repudiation, and access control. It also discusses potential attacks on cryptography like viruses, traffic analysis, electromagnetic detection, and dictionary attacks.
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
Cryptography means storing and transmitting data or information in a particular form that allow to be kept secret.
Symmetric key cryptography:- Both sender and receiver share the secret key.The symmetric key is kept private.both parties use the same key for encryption and decryption.
Asymmetric key cryptography:- Asymmetric key cryptography uses public or private key for encryption and decryption.Public key is kept by publically and private is kept secret.sender use the public key to send message and receiver use the private or secret key to decrypt the message.
This document summarizes Sabiha Batool's presentation on cryptography in information security. The presentation covered the history and basic concepts of cryptography, including definitions of encryption, decryption, plaintext and ciphertext. It discussed symmetric and asymmetric key cryptography as well as hash functions and the RSA algorithm. The presentation explained how cryptography helps achieve the goals of information security - data integrity, authentication, confidentiality and non-repudiation. It reviewed literature on the topic and concluded by discussing the advantages and limitations of cryptography as well as its applications.
This document provides an introduction to cryptography. It discusses security goals like confidentiality and integrity. Cryptography is defined as transforming messages to make them secure. There are two main types: symmetric key cryptography where the same key is used to encrypt and decrypt, and asymmetric key cryptography where different public and private keys are used. Basic cryptography terms like cipher, ciphertext, encryption and decryption are also explained. Examples of cipher types like substitution and transposition ciphers are given. Applications of cryptography include defense, e-commerce, and data security.
Today, more than ever, computer networks are utilized for sharing services and resources. Information travelling across a shared IP-based network, such as the Internet, could be exposed to many devious acts such as eavesdropping, forgery and manipulation. Fortunately, there are several mechanisms that can protect any information that needs to be sent over a network. This paper introduces security threats to today’s IP-based networks and explains available security mechanisms to effectively prevent such threats from happening.
A Study of Different Partitioning Clustering Techniqueijsrd.com
In the field of software, Data mining is very useful to identify the interesting patterns and trends from the large amount of stored data into different database and data repository. Clustering technique is basically used to extract the unknown pattern from the large set of data for electronic stored data, business and real time applications. Clustering is a division of data into different groups. Data are grouped into clusters with high intra group similarity and low inter group similarity [2]. Clustering is an unsupervised learning technique. Clustering is useful technique that applied into many areas like marketing studies, DNA analysis, text mining and web documents classification. In the large database, the clustering task is very complex with many attributes. There are many methods to deal with these problems. In this paper we discuss about the different Partitioning Based Methods like- K-Means, K-Medoids and Fuzzy K-Means and compare the advantages or disadvantages over these techniques.
The document discusses the history and concepts of cryptography, especially in the context of e-commerce. It explains how cryptography evolved from ancient times to modern applications. Symmetric and asymmetric encryption methods are described, including how public/private key pairs work. Digital signatures are introduced as a way to provide authentication, integrity, and non-repudiation for electronic transactions.
Advanced cryptography and implementationAkash Jadhav
The document discusses a technical presentation on advanced cryptography and its implementation. It provides an overview of cryptography, including its history and basic concepts such as encryption, decryption, and cryptanalysis. Examples of cryptography applications discussed include ATM cards, credit cards, e-mail, and lottery tickets.
Bt0088 cryptography and network security1Techglyphs
The document discusses various topics related to cryptography and network security including:
1. The need for network security to prevent damage to organizations from hostile software or intruders.
2. Security attacks are any actions that compromise information security, while vulnerabilities are weaknesses that can be exploited by threats to cause harm.
3. The difference between substitution and transposition techniques for encryption, where substitution exchanges letters and transposition rearranges them.
4. Caesar cipher encryption of a sample plaintext using a key of 3.
Secret writing refers to cryptography and steganography. Cryptography involves encrypting messages so only authorized users can read them, while steganography hides information within other files or mediums. Common cryptographic techniques include symmetric and asymmetric encryption methods. Symmetric encryption uses a shared key between sender and receiver, while asymmetric encryption uses public and private key pairs. Steganography hides information by embedding it within images or other files.
This document discusses network security. It covers the need for security, goals of security like integrity, confidentiality, authentication, non-repudiation and availability. It then discusses famous malware types like viruses, worms and trojan horses. Viruses attach to programs and run when the program runs, worms replicate endlessly without causing harm, and trojan horses provide unauthorized access. The document also covers phishing scams and cryptography techniques like encryption, decryption, symmetric and asymmetric key cryptography.
Communication networks are used to transfer valuable and confidential information for a variety of purposes. As a consequence, they attract the attention of people who intend to steal or misuse information, or to disrupt or destroy the systems storing or communicating it.
Review on feature-based method performance in text steganographyjournalBEEI
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.
Enhancement in network security with security protocolseSAT Journals
Abstract Network security is a wider term used habitually to be an eternal security medium to the broadcasting environment. Cryptography, Authentication and access control Mechanisms play a vital role in secure communication over the network. The computer network is a collection of network that shares information across wired or wireless technology. In order to transfer data in a protected and confidential manner there are several security measures available. Network security can also be referred to as network safety. Network security is used to prevent the attacks by using protocols during the communication of data. This paper describes the several types of attacks, threats and protocols which attempts the secure communication between client and server. Keywords: - DSA, DDOS, HTTPS, RADIUS, VPN, IPSEC etc…
This document discusses various network security protocols and techniques. It begins with an introduction to network security and describes common network attacks such as denial of service attacks, spoofing, sniffing, and hijacking. It then discusses protocols for enhancing network security such as Kerberos, RADIUS, TACACS+, IPSec, and virtual private networks (VPNs). The document provides details on how these various protocols provide authentication, authorization, access control, integrity, and confidentiality to secure network communications.
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
This document proposes an encryption technique that uses binary coded decimal (BCD) and bit complementation. The technique encrypts the key first using a two's complement before encrypting the data with the encrypted key. This provides three levels of encryption. The algorithm uses basic binary operations and computation, making it faster than other algorithms. An experimental analysis showed it outperformed similar variants in terms of performance. The document provides background on symmetric key cryptography and reviews related work on other encryption algorithms.
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...IRJET Journal
This document presents a study that aims to develop a secure messaging system using honey encryption to prevent brute force attacks. It proposes combining honey encryption with the Blowfish encryption algorithm. The study first describes honey encryption and how it works to thwart brute force attacks by producing plausible-looking fake plaintexts from incorrect decryption keys. It then evaluates using honey encryption with the AES and Blowfish algorithms by implementing them and measuring processing times. The results show that honey encryption with Blowfish has significantly lower processing times than with AES, suggesting Blowfish may be better suited for integration with honey encryption in secure messaging systems.
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
This document summarizes and compares several symmetric encryption algorithms, including DES, 3DES, Blowfish, AES, and HiSea. It discusses the components, workings, and security aspects of symmetric block ciphers and stream ciphers. It also briefly covers asymmetric encryption and key schedule algorithms. The document evaluates and compares the performance of the symmetric algorithms based on encryption speed, throughput, key size, security properties, and other factors to help users select the most suitable algorithm for their needs.
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET Journal
This document discusses improved anonymous identity-based broadcast encryption with chosen ciphertext security. It begins by defining broadcast encryption and how it allows a sender to encrypt messages that can only be decrypted by authorized receivers, without revealing the identities of the receivers. It then discusses previous research on providing anonymity in broadcast encryption systems through techniques like identity-based encryption. The goal of this work is to improve existing anonymous identity-based encryption schemes using bilinear groups and decisional bilinear Diffie-Hellman problems to provide stronger ciphertext security. The methodology uses an object-oriented design approach and implementation is done using PHP and SQL.
This document summarizes a survey about latest trends and research issues in cryptographic elements. It compares symmetric and asymmetric encryption techniques and discusses their characteristics. Digital signatures, hash functions, and message authentication codes are also compared. Performance factors for chaotic image encryption are summarized in tables. The survey identifies key issues like appropriate selection of encryption schemes, increased security needs for multimedia information transfer, and future requirements regarding cryptographic keys, algorithms, and privacy.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round-robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man-in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring attack risk if a very small amount of information is exchanged. It raises the bar on the standards of information security, ensuring more efficiency.
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYAsia Smith
This document discusses cryptography and steganography techniques for securing communications. It defines cryptography as encoding messages to disguise their meaning and steganography as hiding messages within other files to conceal their existence. The document proposes combining these methods by encrypting a message with cryptography and then hiding the encrypted output in a file like an image using steganography. This provides two layers of security that are harder for attackers to breach than a single technique alone. The document also compares and contrasts cryptography and steganography, discusses different types of each technique, and analyzes the benefits of an integrated cryptographic-steganographic approach to security.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
Seps aka a secure evolved packet system authentication and key agreement sch...csandit
In this paper, we propose a secure authentication of the Evolved Packet System Authentication
and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the
problem of sending the IMSI as a clear text, and hence prevents the mobility management entity
attack. We will use public key (PK) cryptography to protect the transmitted messages, the RSA
scheme computation to compute a temporary value to the IMSI, and nonce to generate
challenge messages toward the opposite side. Our scheme does not need to change the original
framework and the infrastructure of the LTE-A network, although a ciphered IMSI is
transmitted. The authentication procedure is performed by the HSS to authenticate the UEs and
the MME; therefore, the impersonating of the MME and UEs is not possible. Our evaluation
demonstrates that the proposed scheme is secure and achieves the security requirements of the
LTE-A subscribers such as privacy, authentication, confidentiality and integrity. In our scheme,
we try to maintain the problems defined in the previous related works.
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...cscpconf
In this paper, we propose a secure authentication of the Evolved Packet System Authentication and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the
problem of sending the IMSI as a clear text, and hence prevents the mobility management entity attack. We will use public key (PK) cryptography to protect the transmitted messages, the RSA scheme computation to compute a temporary value to the IMSI, and nonce to generate challenge messages toward the opposite side. Our scheme does not need to change the original
framework and the infrastructure of the LTE-A network, although a ciphered IMSI is transmitted. The authentication procedure is performed by the HSS to authenticate the UEs and
the MME; therefore, the impersonating of the MME and UEs is not possible. Our evaluation demonstrates that the proposed scheme is secure and achieves the security requirements of the
LTE-A subscribers such as privacy, authentication, confidentiality and integrity. In our scheme, we try to maintain the problems defined in the previous related works.
This document discusses various cryptographic techniques used for secure communication. It begins by introducing cryptography and its basic concepts like encryption, decryption, keys etc. It then describes the two main cryptographic techniques - symmetric encryption which uses a single shared key for encryption and decryption, and examples like DES, AES, Blowfish are discussed. Asymmetric encryption which uses public-private key pairs is also explained along with examples like RSA and Diffie-Hellman key exchange algorithm. The document provides detailed information about the algorithms, their working principles and security aspects in concise manner.
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
The process of protecting information by transformi
ng (encrypting) it into an unreadable format is cal
led
cryptography. Only those who possess secret key can
decipher (decrypt) the message into plain text.
Encrypted messages can sometimes be broken by crypt
analysis, also called code breaking, so there is a
need for strong and fast cryptographic methods for
securing the data from attackers. Although modern
cryptography techniques are virtually unbreakable,
sometimes they also tend to attack.
As the Internet, big data, cloud data storage and
other forms of electronic communication become more
prevalent, electronic security is becoming increasi
ngly important. Cryptography is used to protect e-m
ail
messages, credit card information, corporate data,
cloud data and big data so on... So there is a need
for
best and fast cryptographic methods for protecting
the data. In this paper a method is proposed to pro
tect
the data in faster way by using classical cryptogra
phy. The encryption and decryption are done in par
allel
using threads with the help of underlying hardware.
The time taken by sequential and parallel method i
s
analysed
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONadeij1
Cloud storage services are a lot of well-liked today . To secure information from those that don't have access, several encoding schemes are projected. Most of the projected schemes assume cloud storage service suppliers or trustworthy third parties handling key management are trustworthy and can't be hacked; but, in follow, some entities could intercept communications between users and cloud storage suppliers and so compel storage suppliers to unleash user secrets by victimisation government power or alternative means that. During this case, encrypted information are assumed to be identified and storage suppliers are requested to unleash user secrets. Since it's tough to fight against outside coercion, we tend to aimed to create Associate in Nursing encoding theme that might facilitate cloud storage suppliers avoid this plight. We provide cloud storage suppliers means that to make pretend user secrets. Given such pretend user secrets, outside coercers will solely obtained solid information from a user’s keep cipher text. Once coercers suppose the received secrets are real, they'll be happy and a lot of significantly cloud storage suppliers won't have discovered any real secrets. Therefore, user privacy continues to be protected.
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
This document summarizes text steganography methods. It begins with a brief history of steganography from ancient times to modern uses. It then discusses text steganography specifically, including format-based, linguistic, and random/statistical generation methods. Examples of text steganography techniques are provided, such as selective hiding, hiding using whitespace, and semantic hiding using synonyms. The basic mechanism of text steganography is outlined as concealing a secret message in cover text using an embedding algorithm, transmitting the stego-text, and extracting the secret message using a recovery algorithm and stego-key at the receiving end.
Secured and Encrypted Data Transmission over the Web Using Cryptographyijtsrd
Information security has emerged as one of the most pressing issues in data transmission, and it is now an inextricable aspect of the process. To solve this problem, cryptography can be used. This study presents a secure data transmission method and describes how data might be securely transmitted. Cryptography creates a secure and reliable transmission mechanism that can withstand attacks. The Vigenere cipher is employed in this work to encrypt the plain text content of the electronic mail that will be transmitted to the receiver, and a decryption key is required to convert the encrypted data to plain text. Confidentiality, honesty, usability, and efficacy are all important factors in our tests. The outcome of this study will serve as a guide to better methods for safeguarding and delivering data over the internet. The system was created with the Visual Basic Programming Language and the Microsoft Access Database, and it was successfully installed on the Windows Operating System. All electronic mail users, the military, and organizations that demand a high level of security in messages sent to and from their systems would benefit from our effort. Okpalla, C. L. | Madumere, U. | Benson-Emenike M. E. | Onwuama T. U. | Onukwugha, C. G. "Secured and Encrypted Data Transmission over the Web Using Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52545.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/52545/secured-and-encrypted-data-transmission-over-the-web-using-cryptography/okpalla-c-l
Similar to Modified honey encryption scheme for encoding natural language message (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
This presentation is about Food Delivery Systems and how they are developed using the Software Development Life Cycle (SDLC) and other methods. It explains the steps involved in creating a food delivery app, from planning and designing to testing and launching. The slide also covers different tools and technologies used to make these systems work efficiently.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878
1872
Cryptography is the study of the science and art of concealing information to prevent a distrusted
party from learning the content of the message [9]. State-of-the-art conventional cryptographic schemes are
prone to brute-force attack. A brute force attack is a trial and error approach used by an adversary to decrypt
a ciphertext, for instance, an attempt to crack a user’s password. The conventional encryption schemes make
it easy for an adversary to continue to employ this method and achieve success. In hindsight, all conventional
encryption schemes are encoded in utf8 (or ASCII) characters. Consequently, an adversary that intercepts a
ciphertext and tries to decrypt the message using a wrong key can filter out some of the combinations of the
decrypted message by observing that some of the sequences are a combination of characters from different
languages and also symbols which are non-uniformly distributed [10], [11]. It is safe to conclude that an
adversary can judge if his attack is successful based on the structure/distribution of the message he recovers
during his attacks [12], [13]. A non-uniform distribution, which forms no plausible meaning signifies an
incorrect plaintext and key. Moreover, the advent of high-processing tools such as FPGA, GPU also makes
the brute-force attack to be highly successful [14], [15], [16]. Therefore, an attacker that intercepts an
encrypted message has a high chance of recovering the key and subsequently the message encrypted under
such key by using the distinguisher technique – which is to judge the decryption output based on the
distribution/structure of the message.
Security experts and the cryptographic community have proposed several countermeasures to
mitigate the brute-force attack on conventional encryption schemes by increasing the length of the key,
computational complexity. Nevertheless, all these methods fail to address the underlying problem, which is
using the distinguisher technique to inform the output of the decryption. An attacker can continue to make
repeat decryptions on an oracle by trying random keys until he finds a plausible message [17-18].
A breakthrough was made in the year 2014 when Juels and Ristenpart [19-20] proposed the Honey
Encryption (HE) scheme in a conference, Eurocrypt 2014. Honey encryption is a paradigm that provides and
improves security beyond the conventional brute-force bounds. It provides a plausible, valid-looking but fake
message when an incorrect key is used for decrypting a ciphertext. It does not yield under a brute-force attack
and it was proposed for passwords and PINs and have been implemented in this regard successfully [19-20].
However, HE has not been applied for the security of natural language messages such as emails,
human-generated documents and certain formats of message. The applications of the standard HE proposed
by [19-20] are precisely for passwords to protect passwords or low min-entropy keys to protect high
min-entropy keys. Indeed, the authors of HE left as an open challenge, its adaptation to natural language
message when they made this statement,
“...for human-generated messages (password vaults, e-mail, etc.) (...) is interesting as a natural
language processing problem.” [19], [20].
While some research efforts have been made towards adapting the scheme to encode
human-generated message, the current proposals are all susceptible to a Chosen-Ciphertext Attack (CCA).
A CCA is an attack model for cryptanalysis in which the adversary collects information, at least in part,
by selecting a ciphertext and decrypting it by trying random keys. This attack is inevitable when parts or
fragments of the plaintext message is revealed in the decrypted message. A practical attacker can easily use
the revealed parts of the message to form other parts of the message and recover the plaintext and the key.
Moreover, some of the proposed approaches do not scale well; they fail to model human language when used
to encode human-generated documents, thus, failing to convince the attacker that he has the target message.
This paper seeks to address the shortfalls of the standard Honey encryption scheme and proposals made by
the notable research efforts in this domain. The principal objective is to extend the HE schemes to adapt it for
encoding natural language message. Our approach also addresses the CCA attacks which current approach
fail to curtail. We employed Natural language processing tools and techniques to build convincing decoy
message which will be served to an attacker that tries to decrypt a ciphertext using incorrect keys.
This strategy will ultimately allow encryption of other formats specifically human-generated messages,
such as emails, written documents, etc. Figure 1 presents how the conventional encryption scheme works
during a brute-force attack. In summary, the contributions of this research include the following:
a. Creating a structure that allows a message to be encoded entirely in binary. As a result of the encoding
strategy, most binary strings produce a syntactically correct message which is capable of fooling an
adversary in search of the plaintext and key.
b. The proposed scheme address CCA attack by generating a message structure that does not reveal any part
of the plaintext in the decoy message and failed decryption (incorrect key) produces radically different
messages from the plaintext.
c. Length of plaintext is concealed by appending a random binary string to the ciphertext since the decoder
runs until the sentence is parsed and then stops. This way the attacker is unable to determine the length of
the plaintext.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Modified honey encryption scheme for encoding natural language message (Abiodun Esther Omolara)
1873
d. First successful implementation of a provable secured natural-language-based honey encryption scheme
and its adaptation to natural language messages.
Figure 1. Brute-force attack on current conventional encryption method on a password vault
An attacker that intercepts a plaintext and submits random passwords get non-uniformly distributed
characters as long as he supplies an incorrect key. This is a clear distinguisher that he has not achieved the
plaintext. He continues to try random keys until he gets a valid-looking message. As soon as he gets
plausible, uniformly distributed characters, then he is sure he has achieved the message and the key.
For example, in Figure 1, when the attacker gets ‘123456’, he knows that he has achieved the key. He is
certain he has the correct key because ‘123456’ is distributed evenly and this is made worst as users tend to
use simple, easy-to-guess passwords. Also, the attackers are aware of how users choose weak passwords
(based on the past release of compromised passwords).
2. HONEY ENCRYPTION
The intuition of Honey encryption was borne by Juels and Ristenpart [19-20] after observing the
high rate of password been compromised. For instance, using conventional encryption scheme, if plaintext,
P is a 16-digit Master card number encoded via ASCII and the conventional password-based encryption
scheme is used as cipher, the probability that any Pi≠P is a valid ASCII encoding of a 16-digit string which is
negligible, at t (10/256)16
< 2 −74
. Hence, an adversary can reject incorrect messages and recover P with a
high probability [19-20].
Honey encryption provides security beyond the brute-force barrier by producing ciphertexts which,
upon decryption with incorrect keys, yields plausible-looking plaintexts. The strategy here is to confound the
life of the adversary by making message recovery even after trying every candidate keys to be impossible.
The central component of HE is called a distribution transforming encoder (DTE). This component is
constructed with an estimate of the message distribution pm. Encoding a message sampled from pm should
produce a “seed” value which is uniformly distributed. The DTE is a pair of encoding and
decoding algorithm.
The encoding algorithm is randomized, it takes as input a message M ∈ M and outputs a value in a
set S. Also, the decoding algorithm is deterministic and takes as input a value S ∈ S and outputs a message M
∈ M. When the seed is supplied, a DTE must decode correctly to the plaintext but for every incorrect key,
it should decode to a plausible message sampled from the message distribution. A DTE scheme is correct
if for any M ∈ M, Pr[decode(encode(M)) = M] = 1 [19-20].
The HE scheme consists of two steps usually referred to as DTE-then Encrypt. In the first step,
the DTE is applied to the Message, M to obtain a Seed S. In the second step, the seed S is encrypted under a
conventional encryption scheme using the key K, yielding an HE ciphertext C. The steps are as follows:
a. The encoding process, where the Distribution Transforming Encoder (DTE) is applied to the plaintext
followed by a conventional encryption scheme.
b. The decoding process, where the Distribution Transforming Decoder (DTD) is applied to the ciphertext
followed by a conventional encryption scheme.
The HE algorithm showing the encode and decode process is presented in Figure 2.
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878
1874
Honey Encryption Algorithm:
HEnc (K, M)
S ¬$ encode(M)
R ¬$ {0, 1}n
S’ ¬ H (R, K)
C ¬ S’⊕ S
return (R, C)
Honey Decryption Algorithm:
HDec (K, (R, C))
S’¬ H (R, K)
S ¬ C ⊕ S’
M ¬ decode(S)
return M
Figure 2. Honey encoding and decoding algorithms
H represents the cryptographic hash function, K represents a key, M represents the message,
S represents the seed, R represents a random string, C represents the ciphertext, and ¬$ represents uniform
random assignment.
3. PROPOSED APPROACH
Our approach leverages the power of deception to persuade and confuse the attacker that he has the
original message. The experiment of this research are implemented with Python 3.63 and Natural Language
Processing (NLP) libraries. The NLP tools capture the relationship between words and how they combine to
form meaningful sentences. Readers interested in detail treatment of NLP should see [21]-[22]. The decoy
message will have a completely different message structure from the original message (plaintext) but will
have a semantic and contextual meaning. Each message to be encoded is treated as a string of sentence and
processed as a grammatical feature in the English Language. Each word is classified based on the part of
speech by its syntactic functions. In the English Language, the main parts of speech are noun, pronoun, verb,
adverb, adjective, preposition, interjection, conjunction and determiner. Figure 3 shows how nouns are
processed and encrypted, and Figure 4 shows a flowchart of the complete system of our proposed scheme.
Figure 5 shows how nouns are processed and decrypted and Figure 6 shows a flowchart of the complete
system of our proposed scheme. In summary, we create a structure that allowed a sentence to be encoded
completely in binary. As a result of the encoding strategy, most binary strings produce a syntactically
correct sentence.
Algorithm 1: Noun Encoding
1: Get synsets for the noun
if personal noun
Drop synsets with non-personal meaning for the noun (i.e., using mum to refer to a flower)
Else
Drop synsets with personal meaning for the noun (i.e., using a dog to refer to a person)
if synset list is non-empty
Randomly select synset from list
Else
if the noun is a pronoun
Set offset to the length of the list of nouns in wordnet plus one and encode in binary
Encode pronoun
Else
Set offset to the length of the list of nouns in wordnet plus two and encode in binary
Encode unknown word
return binary string
2: Get the path from the root of wordnet noun tree to selected synset
if personal noun
Drop nodes in the path that are parents to "person noun" synset
Else
Drop nodes in the path until "person noun" synset is not in the path
Randomly select a node in the remaining path to be subtree root
Encode offset of the selected node in the list of wordnet's nouns in binary
while not at the desired node (noun passed in)
Append 1 to binary encoding to indicate that search is not complete
Find the index of next node in the path in the list of current root's children
Encode index in binary and append to a string
Append 0 to binary encoding to indicate that search is complete
Find index in the list of synset's lemmas of lemma containing the desired noun
Encode index in binary and append to a string
3: return binary string
Figure 3. Pseudocode for implementing Encrypt Algorithm of the Proposed (Modified) Honey Encryption
5. Int J Elec & Comp Eng ISSN: 2088-8708
Modified honey encryption scheme for encoding natural language message (Abiodun Esther Omolara)
1875
Figure 4. Proposed encoding algorithm
Algorithm 2: Noun Decoding
1: Extract offset from binary string
if pronoun
return decoding of the pronoun
if unknown word
return decoding of the unknown word
2: Get synset of a noun at given offset in the list of wordnet's nouns and set as root
while not at the desired node (the first character in the binary string is non-zero)
Extract offset from binary string
Set child at offset in the list of root's children to new root
3: Extract lemma number from a binary string
4: Get specified lemma
5: return the name of the lemma (desired noun)
Figure 5. Pseudocode for implementing decrypt algorithm of the proposed (modified) honey encryption
Figure 6. Proposed decoding algorithm
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878
1876
Note that:
Nouns in Wordnet are organized using a tree structure with general concepts at the root, moving to specific
nodes at the leaves. We utilize this structure for encoding of all nouns within the encoding algorithm.
Verb lemmas in Wordnet are stored with lists of verb frames. These are the possible structures of sentences
using that verb. For example, "Somebody appears" is a valid sentence structure but "Somebody appears
something" is not.
Pronoun encoding/decoding: Have a list of pronouns, encoded as an offset in the list.
Unknown encoding/decoding: Each letter encoded as a position in the alphabet (0-25)
Article encoding/decoding: 0/1 for not exists/exists, then 1/0 if the/a
Conjunction encoding/decoding: Have a list of conjunctions, encoded as an offset in the list.
A general use case of the proposed algorithm is to combine it with any conventional cipher.
For instance, the sender will encrypt this binary string with a cipher (AES, RC4, Twofish, etc.). A wrong key
will produce an incorrectly encoded string which should decode to a semantically correct message.
Only when the correct key is applied should the plaintext decode correctly. Any incorrect key (flipping a bit)
will decode correctly to a valid message with completely different length and structure from the plaintext.
Our approach is completely different from existing approach because no part of the plaintext will be revealed
during decryption with incorrect key. This approach makes it impossible for the adversary to carry out a
chosen ciphertext attack.
We consider a case where an email is to be encoded using our approach. For instance, each email
usually starts with some greeting and will usually end with a goodbye message. An adversary expecting an
email who gets instead a text not starting from this type of greetings will quickly discard the message. In this
case, we define encryption protocol differently. We assume that email-message should always start from the
greeting and first few bits will encode one of the possible greeting’s variations. This way it is not possible for
any encryption key to get the results without greetings and goodbye. Therefore, the higher probability of the
decoy message is done by restricting potential user format of the message.
An easy implementation will be to define three parts of the message which are allowed.
For instance, 1) Greetings with one of the following options: 00 - "Hello", 01 - "Hi", 10 - "Greetings",
11 - "Good time of day"; 2) middle sentence with the following options: 00 - "how are you? "; 01-"Fine";
10-"having a hard day"; 11 - "let's meet"; 3) Good byes: 00 - "Bye"; 10 - "Looking forward"; 01 - "have a
nice day"; 11-"Best wishes” This protocol will limit amount communication very much, but every
combination or key can lead to a meaningful message. There is no way for the attacker to guess if his key
was incorrect.
4. RESULTS AND ANALYSIS
To evaluate our proposed system, we test with a controlled amount of noise added to a ciphertext
(i.e., 1% wrong, 5% wrong, etc.) and compare the sanity of resulting messages.
Word Count: The number of words encoded
Noise Added: Percentage of random bits flipped (incorrect key)
Change in the Word Count: When the adversary tries to decrypt with the key, how many sane words
were generated.
Pimportant: How many important words from the underlying plaintext appear in the decrypted message
when the adversary tries incorrect keys. We define Pimportant as very important keywords in the plaintext
(nouns, pronoun, verb, adverb, adjective) which must not appear in the event of decryption with wrong keys.
Pregular: How many regular words from the underlying plaintext appear in the decrypted message
when the adversary tries incorrect keys. We define Pregular as common words in the plaintext (determiner,
conjunction, interjection, preposition). This is essential because regular words help form a sentence and they
appear in every message and cannot be used to recover the plaintext. For example, a, the, of, on etc are
essential to form sentence. Time-taken: The time it takes to decrypt using our proposed method. Performance
of the proposed modified honey encryption scheme as shown in Table 1.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Modified honey encryption scheme for encoding natural language message (Abiodun Esther Omolara)
1877
Table 1. Performance of the Proposed Modified Honey Encryption Scheme
Word Count Noise Added (%)
(brute-forcing with
incorrect keys)
Change in the word
and word count during
decryption
Check if CCA is possible (Any
revealed word from the plaintext in
the decrypted ciphertext?) Pimportant
Pregular Time-taken to
decrypt (ms)
4 4 53 0 0 1.90
7 2 59 0 4 2.23
10 3 54 0 5 3.12
15 2 62 0 4 3.23
20 3 71 0 7 4.40
25 4 88 0 6 4.89
28 5 97 0 9 7.10
38 1 105 0 6 9.30
43 8 127 0 8 10.11
48 7 156 0 9 13.21
82 5 304 0 12 31.11
5. DISCUSSION
The proposed modified honey encryption scheme employs a novel approach for adapting the honey
encryption scheme to support the successful encoding of human-generated message which has been an open
problem since the scheme was proposed [19,20]. This novel invention brings new benefits as well as
some limitations.
In summary, we were able to create a structure where messages are encoded in binary such that
message recovery becomes impossible for an adversary that intercepts a ciphertext and tries to decrypt it
using random keys. The standard HE scheme was designed and provides provable security only in the
context of Passwords, Pins and RSA Keys. Research efforts over the years to extend it for encoding larger
domains (such as human-generated message) has failed to produce convincing decoy message, do not scale
well. Worst is they reveal structural information of the underlying plaintext, thus, the vulnerability to chosen
ciphertext attack (CCA) which makes the probability of message recovery high. Our proposed approach is
the first successful implementation of adapting the honey encryption scheme for supporting encoding of
human-generated message. It produces a plausible message that is good enough to deceive the adversary.
More importantly, the critical message (keywords) that the sender might want to protect is completely
concealed and cannot appear during decryption with incorrect keys, thereby, countering the CCA. However,
we must state that our approach impacts time when the message gets larger. For this limitation, we are
thinking of other ways to curtail this in our next research efforts.
6. CONCLUSION
In the conventional encryption scheme, messages are encoded in ASCII (or UTF-8, etc.) which
makes them prone to a brute-force attack, as an adversary who tries to decrypt a ciphertext can easily filter
out correct messages from incorrect ones based on the non-uniform distribution of the characters. Honey
encryption (HE) offers a countermeasure to the conventional encryption scheme by offering a barrier against
brute-force attacks. HE is a decoy-based encryption scheme which yields plausible looking plaintexts under
decryption with incorrect keys such that decryption attempts alone are insufficient to recover the correct
plaintext. As a result, an adversary is made to believe he has the plaintext when what he has is a
decoy-message.
In this paper, we modified the HE scheme to support the encoding of human-generated message by
leveraging natural language processing techniques. Our approach models the connection between words with
the specific goal of capturing the patterns of language to form syntactically and semantically meaningful
message as a framework to build realistic but fake messages as decoys which is served to an adversary trying
to decrypt the ciphertext using an invalid-key. For instance, an attacker that intercepts an encrypted email
message and tries to decrypt the message gets a plausible email message, and he is fooled into believing he
has the original email message. The message structure and message length contained in the underlying
message is kept entirely secret and failed decryption produces radically different message from the original
message as decoys message, and such features can be useful for successfully concealing and protecting
emails and human-written documents that are top secret.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878
1878
REFERENCES
[1] Gamido HV, Sison AM, Medina RP., "Modified AES for Text and Image Encryption," Indonesian Journal of
Electrical Engineering and Computer Science (IJEECS), vol. 11(3), pp. 27, May 2018.
[2] Chandrakala N, Rao BT., "Migration of Virtual Machine to improve the Security of Cloud Computing,"
International Journal of Electrical and Computer Engineering (IJECE). vol. 8(1), pp. 210-9, Feb 2018.
[3] Sultanpure KA, Gupta A, Reddy LS., “An Efficient Cloud Scheduling Algorithm for the Conservation of Energy
through Broadcasting,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8(1),
pp.179-88, Feb 2018.
[4] Singh JP, Kumar S. "Authentication and encryption in cloud computing," In Smart Technologies and Management
for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on 2015
May 6 , IEEE, pp. 216-219.
[5] Jaber AN, Zolkipli MF, "Use of cryptography in cloud computing. In Control System," Computing and
Engineering (ICCSCE), 2013 IEEE International Conference on 2013 Nov 29. IEEE, pp. 179-184.
[6] Chen D, Zhao H., "Data security and privacy protection issues in cloud computing," In Computer Science and
Electronics Engineering (ICCSEE), 2012 International Conference on 2012 Mar 23. IEEE, vol. 1, pp. 647-651.
[7] Omolara OE, Oludare AI, Abdulahi SE., "Developing a modified Hybrid Caesar cipher and Vigenere cipher for
secure Data Communication," Computer Engineering and Intelligent Systems, vol. 5, pp. 34-46, 2014.
[8] Stallings W, Brown L, Bauer MD, Bhattacharjee AK, "Computer security: principles and practice," Pearson
Education 2012.
[9] Lorek P, Zagórski F, Kulis M., "Strong stationary times and its use in cryptography," arXiv preprint
arXiv:1709.02631, Sep 2017.
[10] Jo HJ, Yoon JW, "A new countermeasure against brute-force attacks that use high-performance computers for big
data analysis," International Journal of Distributed Sensor Networks. vol. 11(6), pp. 406915, Jun 2015.
[11] Beunardeau M, Ferradi H, Géraud R, Naccache D., "Honey Encryption for Language," In International Conference
on Cryptology in Malaysia. Springer, Cham, pp. 127-144, Dec 2016.
[12] Kim JI, Yoon JW, "Honey chatting: A novel instant messaging system robust to eavesdropping over
communication," In Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on
2016 Mar 20. IEEE, pp. 2184-2188.
[13] Omolara AE, Jantan A, Abiodun OI, Poston HE, "A Novel Approach for the Adaptation of Honey Encryption to
Support Natural Language Message," In Proceedings of the International MultiConference of Engineers and
Computer Scientists 2018, vol. 1, 2018.
[14] Cousins DB, Rohloff K, Sumorok D., "Designing an FPGA-accelerated homomorphic encryption co-processor,"
IEEE Transactions on Emerging Topics in Computing. vol. 5(2), pp. 193-206, Apr 2017.
[15] Kestur S, Davis JD, Williams O, "Blas comparison on FPGA, CPU and GPU. VLSI (ISVLSI)," 2010 IEEE
computer society annual symposium on 2010 Jul 5. IEEE, pp. 288-293.
[16] Sutikno T, Idris NR, Jidin A., "High-Speed Computation using FPGA for Excellent Performance of Direct Torque
Control of Induction Machines," Telecommunication Computing Electronics and Control (TELKOMNIKA),
vol. 14(1) pp. 1-3, Mar 2016.
[17] Marks M, Jantura J, Niewiadomska-Szynkiewicz E, Strzelczyk P, Góźdź K., "Heterogeneous GPU&CPU cluster
for high-performance computing in cryptography," Computer Science, vol. 13, pp. 63-79, 2012
[18] Couture N, Kent KB, "The effectiveness of brute force attacks on RC4," Communication Networks and Services
Research, 2004. Proceedings. Second Annual Conference on 2004 May 19. IEEE, pp. 333-336.
[19] Juels A, Ristenpart T., "Honey encryption: Security beyond the brute-force bound," In Annual International
Conference on the Theory and Applications of Cryptographic Techniques 2014 May 11, Springer, Berlin,
Heidelberg, pp. 293-310.
[20] Juels A, Ristenpart T., "Honey Encryption: Encryption beyond the brute-force barrier," IEEE Security & Privacy,
vol. 12(4), pp. 59-62, Jul 2014.
[21] Bird S, Loper E., "NLTK: the natural language toolkit," In Proceedings of the ACL 2004 on Interactive poster and
demonstration sessions 2004 Jul 21, Association for Computational Linguistics, pp. 31.
[22] Chowdhury GG., “Natural language processing,” Annual review of information science and technology, vol. 37(1),
pp. 51-89, Jan 2003.