This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
The Hill cipher algorithm is one of the symmetric
key algorithms that have several advantages in data
encryption. But, the inverse of the key matrix used for
encrypting the plaintext does not always exist. Then if the
key matrix is not invertible, then encrypted text cannot be
decrypted. In the Involutory matrix generation method the
key matrix used for the encryption is itself invertible. So, at
the time of decryption we need not to find the inverse of the
key matrix. The objective of this paper is to encrypt an
image using a technique different from the conventional Hill
Cipher. In this paper a novel advanced Hill (AdvHill)
encryption technique has been proposed which uses an
involutory key matrix. The scheme is a fast encryption
scheme which overcomes problems of encrypting the images
with homogeneous background. A comparative study of the
proposed encryption scheme and the existing scheme is
made. The output encrypted images reveal that the
proposed technique is quite reliable and robust.
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
The Hill cipher algorithm is one of the symmetric
key algorithms that have several advantages in data
encryption. But, the inverse of the key matrix used for
encrypting the plaintext does not always exist. Then if the
key matrix is not invertible, then encrypted text cannot be
decrypted. In the Involutory matrix generation method the
key matrix used for the encryption is itself invertible. So, at
the time of decryption we need not to find the inverse of the
key matrix. The objective of this paper is to encrypt an
image using a technique different from the conventional Hill
Cipher. In this paper a novel advanced Hill (AdvHill)
encryption technique has been proposed which uses an
involutory key matrix. The scheme is a fast encryption
scheme which overcomes problems of encrypting the images
with homogeneous background. A comparative study of the
proposed encryption scheme and the existing scheme is
made. The output encrypted images reveal that the
proposed technique is quite reliable and robust.
Presently on a daily basis sharing the information over web is becoming a significant issue due to security problems. Thus lots of techniques are needed to protect the shared info in academic degree unsecured channel. The present work target cryptography to secure the data whereas causing inside the network. Encryption has come up as a solution, and plays an awfully necessary role in data security. This security mechanism uses some algorithms to scramble info into unclear text which can be exclusively being decrypted by party those possesses the associated key. This paper is expounded the varied forms of algorithmic rule for encryption & decryption: DES, AES, RSA, and Blowfish. It helps to hunt out the best algorithmic rule.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
What is cryptography,its types,two algorithms i.e RSA and DES.
explained well and referenced the slide share too to give more precise presentation. Thank you.
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Editor Jacotech
Direct-sequence code-division multiple access (DS-CDMA) is
currently the subject of much research as it is a promising
multiple access capability for third and fourth generations
mobile communication systems. The synchronous DS-CDMA
system is well known for eliminating the effects of multiple
access interference (MAI) which limits the capacity and
degrades the BER performance of the system. In this paper,
we investigate the bit error rate (BER) performance of a
synchronous DS-CDMA system over a wideband mobile
radio channel. The BER performance is affected by the
difference in path length ΔL and the number of arriving
signals N. Furthermore, the effect of these parameters is
examined on the synchronous DS-CDMA system for different
users’ number as well as different processing gain Gp. In this
environment and under the above conditions the performances
of the BPSK (Binary Phase Shift Keying) and the QPSK
(Quadrature Phase Shift Keying) modulations are compared.
The promising simulation results showed the possibility of
applying this system to the wideband mobile radio channel.
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISEditor Jacotech
With microblogging platforms such as Twitter generating
huge amounts of textual data every day, the possibilities of
knowledge discovery through Twitter data becomes
increasingly relevant. Similar to the public voting mechanism
on websites such as the Internet Movie Database (IMDb) that
aggregates movies ratings, Twitter content contains
reflections of public opinion about movies. This study aims to
explore the use of Twitter content as textual data for
predicting the movie rating. In this study, we extract number
of tweets and compiled to predict the rating scores of newly
released movies. Predictions were done with the algorithms,
exploring the tweet polarity. In addition, this study explores
the use of several different kinds of tweet classification
Algorithm and movie rating algorithm. Results show that
movie rating developed by our application is compared to
IMDB and Rotten Tomatoes.
Non integer order controller based robust performance analysis of a conical t...Editor Jacotech
The design of robust controller for any non linear process is a
challenging task because of the presence of various types of
uncertainties. In this paper, various design methods of robust
PID controller for the level control of conical tank are
discussed. Uncertainties are of different types, among that
structured uncertainty of 30% is introduced to the nominal
plant for analysing the robustness. As a first step, the control
of level is done by using conventional integer order controller
for both nominal and uncertain system. Then, the control is
done by means of Fractional Order Proportional Integral
Derivative (FOPID) controller for achieving robustness. With
the help of time series parameters, a comparison is made
between conventional PID and FOPID with respect to the
simulated output using MATLAB and also analyzed the
robustness.
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...Editor Jacotech
It is an important task of working women to handle two
important tasks. Balancing these two roles at home and
work is very challenging task and causes stress at different
levels. Different dimension of working women’s life
involves in evolving the stress in working women’s life.
These stresses cause the imbalance at the front of and
handling family responsibility. In the current scenario,
doctors face many stressors that are peculiar to the medical
profession and doctors are required to have more
competencies than before in diagnosis ongoing
management of medical conditions. This means increased
responsibilities which may contribute to stress. Stress
experienced at work can have adverse outcomes for the
well-being of individual employees and organization as
whole. My study is focusing on identifying the factors
causing stress among female doctors working for public
and private hospitals and their stress levels associations
with respect to sector. A sample of 300 female doctors
from urban area participated in this study. Out of this, 150
each are from public and private hospitals respectively. A
self-made standardized tool was administered based on five
point scale. Results indicates that the values were found to
be 0.000 in all the cases except, psychosomatic problems
(0.004) which is lesser than (0.05) p-value resulting into
rejection of null hypotheses , consequently revealing an
association between sector of female doctors and stress due
to workload, working condition, physical exertion,
emotional exhaustion, job security, organizational support,
work family conflict, family adjustment, task demands,
psychosomatic problems, patient’s expectation and working
hours.
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
The Impact of Line Resistance on the Performance of Controllable Series Compe...Editor Jacotech
In recent years controllable FACTS devices are increasingly
integrated into the transmission system. FACTS devices that
provide series control such as Controllable Series Compensator
(CSC) has significant effect on the voltage stability of Electric
Power system. In this work impact of line resistance on the
performance of CSC in a single-load infinitive-bus (SLIB)
model is investigated. The proposed framework is applied to
SLIB model and obtained results demonstrates that line
resistance has considerable effect on voltage stability limits and
performance of CSC.
Security Strength Evaluation of Some Chaos Based Substitution-BoxesEditor Jacotech
Recently, handful amount of S-boxes, using the various
methods such as affine transformations, gray coding,
optimization, chaotic systems, etc, have been suggested. It is
prudent to use cryptographically strong S-boxes for the design
of powerful ciphers. In this paper, we sampled some widely
used 8×8 S-boxes which are recently synthesized and security
analysis and evaluation is executed to uncover the best
candidate(s). The performance analysis is exercised against
the crucial measures like nonlinearity, linear approximation
probability, algebraic immunity, algebraic complexity,
differential uniformity. These parameters are custom selected
because their scores decide the security strength against
cryptographic assaults like linear cryptanalysis, algebraic
attacks, and differential cryptanalysis. The anticipated
analysis in this work facilitates the cryptographers, designers,
researchers to choose suitable candidate decided over many
parameters and can be engaged in modern block encryption
systems that solely rely on 8×8 S-box. Moreover, the analysis
assists in articulating efficient S-boxes and to evaluate the
attacks resistivity of their S-boxes.
Traffic Detection System is an Android application that aims at determining the behavior of traffic in a particular location. It calculates the speed of the vehicle and the level of congestion or the amount of traffic is determined on the basis of the values of sensors. If any such obstruct found, then the driver is provided an option to send messages regarding high traffic to his/her friends. After a distinct number of repeated low speed and breaks, the location of the vehicle (latitude and longitude) send to a pre-specified contact (selected in case of traffic congestion) through an SMS. This application uses the features of the Global positioning system. The Latitude, as well as the longitude of the location where traffic jams are formed, is sent to the friends of the user. The Goggle map of the location also sends to the friends. It uses the SMS Manager a functionality of Android. The friends receiving the messages will thereby avoid taking the congested route and hence the level of traffic on the congested road will decrease, and the friends will reach the destination in comparatively less time.
Performance analysis of aodv with the constraints of varying terrain area and...Editor Jacotech
Mobile Ad Hoc Networks (MANETs) are wireless networks,
where there is no requirement for any infrastructure support to
transfer data packets between mobile nodes. These nodes
communicate in a multi-hop mode; each mobile node acts
both as a host and router. The main job of Quality of Service
(QoS)[1][2] routing in MANETs is to search and establish
routes among different mobile nodes for satisfying QoS
requirements of wireless sensor networks as PDR, Average
end-to-end delay, Average Throughput. The QoS routing
protocols efficient for commercial, real-time and multimedia
applications are in demand for day to day activities[2].
Modeling of solar array and analyze the current transient response of shunt s...Editor Jacotech
Spacecraft bus voltage is regulated by power
conditioning unit using switching shunt voltage regulator having
solar array cells as the primary source of power. This source
switches between the bus loads and the shunt switch for fine
control of spacecraft bus voltage. The effect of solar array cell
capacitance [5][6] along with inductance and resistance of the
interface wires between solar cells and power conditioning
unit[1], generates damped sinusoidal currents superimposed on
the short circuit current of solar cell when shunted through
switch. The peak current stress on the shunt switch is to be
considered in the selection of shunt switch in power conditioning
unit. The analysis of current transients of shunt switch in PCU
considering actual spacecraft interface wire length by
illumination of solar panel (combination of series and parallel
solar cells) is difficult with hardware simulation. Software
simulation by modeling solar cell is carried out for a single string
(one parallel) in Pspice [6]. Since in spacecrafts number of
parallels and interface cable length are variable parameters the
analysis of current transients of shunt switch is carried out by
modeling solar array with the help of solar cell model[6] for the
actual spacecraft condition.
License plate recognition an insight to the proposed approach for plate local...Editor Jacotech
License Plate Recognition (LPR) system for vehicles is an innovative and a very challenging area for research due to the innumerous plate formats and the nonuniform outdoor illumination conditions during which images are acquired. Thus, most approaches developed, work under certain restrictions such as fixed illumination, stationary background and limited speed. Algorithms developed for LPR systems are generally composed of three significant stages: 1] localization of the license plate from an entire scene image; 2] segmentation of the characters on the plate; 3] recognition of each of the segmented characters. A simple approach for preprocessing of the images, localization and extraction phase has been described in this paper. Numerous procedures have been developed for LPR systems and are assessed in this paper taking into consideration issues like processing time, computational power and recognition rate wherever available.
Design of airfoil using backpropagation training with mixed approachEditor Jacotech
Levenberg-Marquardt back-propagation training method has some limitations associated with over fitting and local optimum problems. Here, we proposed a new algorithm to increase the convergence speed of Backpropagation learning to design the airfoil. The aerodynamic force coefficients corresponding to series of airfoil are stored in a database along with the airfoil coordinates. A feedforward neural network is created with aerodynamic coefficient as input to produce the airfoil coordinates as output. In the proposed algorithm, for output layer, we used the cost function having linear & nonlinear error terms then for the hidden layer, we used steepest descent cost function. Results indicate that this mixed approach greatly enhances the training of artificial neural network and may accurately predict airfoil profile.
Ant colony optimization based routing algorithm in various wireless sensor ne...Editor Jacotech
Wireless Sensor Network has several issues and challenges due to limited battery backup, limited computation capability, and limited computation capability. These issues and challenges must be taken care while designing the algorithms to increase the Network lifetime of WSN. Routing, the act of moving information across an internet world from a source to a destination is one of the vital issue associated with Wireless Sensor Network. The Ant Colony Optimization (ACO) algorithm is a probabilistic technique for solving computational problems that can be used to find optimal paths through graphs. The short route will be increasingly enhanced therefore become more attractive. The foraging behavior and optimal route finding capability of ants can be the inspiration for ACO based algorithm in WSN. The nature of ants is to wander randomly in search of food from their nest. While moving, ants lay down a pheromone trail on the ground. This chemical pheromone has the ability to evaporate with the time. Ants have the ability to smell pheromone. When selecting their path, they tend to select, probably the paths that has strong pheromone concentrations. As soon as an ant finds a food source, carries some of it back to the nest. While returning, the quantity of chemical pheromone that an ant lay down on the ground may depend on the quantity and quality of the food. The pheromone trails will lead other ants towards the food source. The path which has the strongest pheromone concentration is followed by the ant which is the shortest paths between their nest and food source. This paper surveys the ACO based routing in various Networking domains like Wireless Sensor Networks and Mobile Ad Hoc Networks.
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
Today, the Wireless Sensor Network is increasingly gaining popularity and importance. It is the more interesting and stimulating area of research. Now, the WSN is applied in object tracking and environmental monitoring applications. This paper presents the self-optimized model of multipath routing algorithm for WSN which considers definite parameters like delay, throughput level and loss and generates the outcomes that maximizes data throughput rate and minimizes delay and loss. This algorithm is based on ANT optimization technique that will bring out an optimal and organized route for WSN and is also to avoid congestion in WSN, the algorithm incorporate multipath capability..
A mobile monitoring and alert sms system with remote configuration – a case s...Editor Jacotech
One of the parent´s main concerns nowadays it to know their children´s whereabouts. Some applications exist to address this issue and most of them rely on internet connection which makes the solution expensive. In this paper we present a low cost solution, based on SMS, and with the ability to remotely configure the child monitoring process. We also present the architecture and the full flowchart of the child application whenever a SMS is received. This case study uses Android and the more recent location API – the Fused Location Provider. For obvious reasons, the security issue has been a concern, which resulted in a configuration module in the child application to specify authorized senders
Leader Election Approach: A Comparison and SurveyEditor Jacotech
In distributed system, the coordinator is needed to manage the use of the resources in the shared environment. Many algorithms have been proposed for the same. They have various positive and negative parts. Here we will discuss those issues which ensure the efficiency of the algorithm for election leader. Here a comparison will be provided to show the advantages and disadvantages of different election algorithms. The comparison would be based on the number of messages passing and the order of time complexity.
Leader election approach a comparison and surveyEditor Jacotech
In distributed system, the coordinator is needed to manage the use of the resources in the shared environment. Many algorithms have been proposed for the same. They have various positive and negative parts. Here we will discuss those issues which ensure the efficiency of the algorithm for election leader. Here a comparison will be provided to show the advantages and disadvantages of different election algorithms. The comparison would be based on the number of messages passing and the order of time complexity
Modeling of solar array and analyze the current transientEditor Jacotech
Spacecraft bus voltage is regulated by power
conditioning unit using switching shunt voltage regulator having
solar array cells as the primary source of power. This source
switches between the bus loads and the shunt switch for fine
control of spacecraft bus voltage. The effect of solar array cell
capacitance [5][6] along with inductance and resistance of the
interface wires between solar cells and power conditioning
unit[1], generates damped sinusoidal currents superimposed on
the short circuit current of solar cell when shunted through
switch. The peak current stress on the shunt switch is to be
considered in the selection of shunt switch in power conditioning
unit. The analysis of current transients of shunt switch in PCU
considering actual spacecraft interface wire length by
illumination of solar panel (combination of series and parallel
solar cells) is difficult with hardware simulation. Software
simulation by modeling solar cell is carried out for a single string
(one parallel) in Pspice [6]. Since in spacecrafts number of
parallels and interface cable length are variable parameters the
analysis of current transients of shunt switch is carried out by
modeling solar array with the help of solar cell model[6] for the
actual spacecraft condition.
Traffic Detection System is an Android application that aims at determining the behavior of traffic in a particular location. It calculates the speed of the vehicle and the level of congestion or the amount of traffic is determined on the basis of the values of sensors. If any such obstruct found, then the driver is provided an option to send messages regarding high traffic to his/her friends. After a distinct number of repeated low speed and breaks, the location of the vehicle (latitude and longitude) send to a pre-specified contact (selected in case of traffic congestion) through an SMS. This application uses the features of the Global positioning system. The Latitude, as well as the longitude of the location where traffic jams are formed, is sent to the friends of the user. The Goggle map of the location also sends to the friends. It uses the SMS Manager a functionality of Android. The friends receiving the messages will thereby avoid taking the congested route and hence the level of traffic on the congested road will decrease, and the friends will reach the destination in comparatively less time.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
1. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No. 1, February 2014
Survey on Asymmetric Key Cryptography Algorithms
S. Nithya , Dr. E. George Dharma Prakash Raj
Computer Science and Engineering, Bharathidasan University, Trichy, India.
Computer Science and Engineering ,Bharathidasan University, Trichy, India.
niyaa20@yahoo.co.in,georgeprakashraj@yahoo.com
ABSTRACT
II. PUBLIC KEY CRYPTOGRAPHY
ALGORITHMS
Asymmetric key encryption is also called
public key encryption. It uses two keys known as a
public and a private key. Data encrypted with one key
can be decrypted only with the other key. This paper
discusses some public key algorithms and its
advantages and disadvantages such as Rivest Shamir
Adleman,
Diffi-Hellman,
Elliptic
Curve
Cryptography,
Elliptic
Curve
Diffi-Hellman,
ElGamal
Encryption
Algorithm,
Knapsack
Algorithm, Digital Signature Algorithm and Short
Range Natural Numbers.
A. Rivest Adi Adleman (RSA)
In 1978, Ron Rivest, Adi Shamir, and
Leonard Adleman introduced a cryptographic
algorithm, which was essentially to replace the less
secure National Bureau of Standards (NBS)
algorithm. In RSA, this asymmetry is based on the
practical difficulty of factoring the product of two
large prime numbers, the factoring problem [2].
In such a cryptosystem, the encryption key
is public and differs from the decryption key which
is kept secret. The RSA algorithm involves three
steps: key generation, encryption and decryption.
(i)
Key generation:
R1. Users of RSA must determine two primes
at random: p, q
R2. Select either e or d and compute the other
Primes p, q must not be easily derived from
modulus N=p*q
R3. Exponent e, d is inverses, so use inverse
algorithm to compute the other.
Keywords
Cryptography, Rivest Shamir Adleman, Elliptic Curve
Cryptography, Diffi - Hellman, Digital Signature.
I. INTRODUCTION
All public key cryptosystems are based on
the notion of a one-way function. Which depending
on the public key, converts plaintext into cipher
text using are relatively small amount of computing
power but whose inverse function is extremely
expensive to compute, so that an attacker is not
able to derive the original plaintext from the
transmitted cipher text within a reasonable time
frame. In public key cryptography, each user or the
device taking part in the communication have a pair
of keys, a public key and a private key, and a set of
operations associated with the keys to do the
cryptographic operations. Only the particular
user/device knows the private key whereas the
public key is distributed to all users/devices taking
part in the communication. It increased security and
convenience: private keys never need to be
transmitted or revealed to anyone [1].
This paper work focuses on brief
descriptions of various public key cryptography
algorithms which are discussed on section II and in
section III advantages and disadvantages of these
algorithms were made in the form of comparative
study.
(ii)
Encryption:
R4. To encrypt a message m the sender
R5. Obtains public key of recipient Pu= {e.N}
R6. Computes: C=Me mod N, where 0≤M<N
(iii)
Decryption:
R7.To decrypts the cipher text c the owner
R8.Uses their private key PR= {d, p, q}
R9. Computes: M=Md mod N
B. Diffi-Hellman key exchange (D-H)
The DH algorithm, introduced by Whitfield
Diffie and Martin Hellman in 1976, was the first
system to utilize “public-key” or “asymmetric”
cryptographic keys. These systems overcome the
difficulties of “private-key” or “symmetric” key
systems because asymmetric key management is
much easier [3]. DH is a mathematical algorithm
that allows two computers to generate an identical
shared secret on both systems, even though those
systems may never have communicated with each
1
2. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No. 1, February 2014
S7.Compute r= (αk mod p) mod q
S8.Compute k-1 mod q
S9.Compute s=k-1 ∗(h (m) + ar) mod q
S10.Signature = (r, s)
other before. That shared secret can then be used to
securely exchange a cryptographic encryption key.
That key then encrypts traffic between the two
systems.
The Diffi-Hellman Key Exchange is one of the
more popular and interesting methods of key
distribution. It is a public-key cryptographic system
whose sole purpose is for distributing keys.
(iii)
Verification:
S11.Verify 0<r<q and 0<s<q, if not, invalid
S12.Compute w= s-1mod q and h (m)
S13.Compute u1=w∗h (m) mod q, u2=r∗w mod
q
S14. Compute v = (αu1yu2 mod p) mod q
S15. Valid if v=r
(i)
Key algorithm:
It is also possible to use Diffi–Hellman as part
of a public key infrastructure.
D1. First, both Alice and Bob agree upon a
prime number and another number that has no
factor in common. Let’s call the prime number
as p and the other number as g. Note that g is
also known as the generator and p is known as
prime modulus.
D2. Now, g a mod p and g b mod p is the public
key for Alice and Bob respectively.
D3. Alice and Bob exchanged their public
keys.
D4. Alice computes (g b mod p) a mod p that is
equal to g ba mod p.
D5. Bob computes (g a mod p) b mod p that is
equal to g ab mod p.
D6. K= g ba mod p=g ab mod p, shared secret
=k.
D. Elliptic curve cryptography (ECC)
Elliptic curve cryptography (ECC) is an
approach to public-key cryptography based on the
algebraic structure of elliptic curves over finite
fields. The use of elliptic curves in cryptography
was suggested independently by Neal Koblit and
Victor S. Millerin 1985. Elliptic curves are also
used in several integer factorization algorithms that
have applications in cryptography [5].
E. Elliptic curve Diffie–Hellman (ECDH)
Elliptic curve Diffie-Hellman is an
anonymous key agreement protocol that allows two
parties, each having an elliptic curve public–private
key pair, to establish a shared secret over an
insecure channel. This shared secret may be
directly used as a key, or better yet, to derive
another key which can then be used to encrypt
subsequent communications using a symmetric key
cipher. It is a variant of the Diffie–Hellman
protocol using elliptic curve cryptography [6].
C. Digital Signature Algorithm (DSA)
The Digital Signature Algorithm (DSA) is
a Federal Information Processing Standard for
digital signatures. It was proposed by the National
Institute of Standards and Technology (NIST) in
August 1991 for use in their Digital Signature
Standard (DSS) and adopted as FIPS 186 in 1993.
A digital signature scheme typically
consists of three algorithms: A key generation
algorithm that selects a private key uniformly at
random from a set of possible private keys. The
algorithm outputs the private key and a
corresponding public key [4]. A signing algorithm
that, given a message and a private key, produces a
signature. A signature verifying algorithm that,
give a message, public key and a signature, either
accepts or rejects the message's claim to
authenticity.
(i) Key generation algorithm:
E1. Alice wants to establish a shared key with
Bob.
E2. The domain parameters must be agreed
upon.
E3. Let Alice's key pair be ( 𝑑 𝐴 ,𝑄 𝐴 ) and Bob's
key pair be (𝑑 𝐵 , 𝑄 𝐵 ).
E4. Alice computes (𝑥 𝐾 ,𝑦 𝑘 ) =𝑑 𝐴 𝑄 𝐵 . Bob
computes (𝑥 𝐾 ,𝑦 𝑘 ) =𝑑 𝐵 𝑄 𝐴 .
E5. The shared secret calculated by both
parties is equal 𝑑 𝐴 𝑄 𝐵 =𝑑 𝐴 𝑑 𝐵 G=𝑑 𝐵 𝑑 𝐴
G=𝑑 𝐵 𝑄 𝐴 .
(i)
Key generation:
S1.select a prime q of 160 bits
S2.Choose 0≤t≤8, select 2511+64t <p< 2512+64t
with q|p-1
S3.Select g in Zp*, and α = g (p-1)/q mod p, α≠1
S4.Select 1 ≤ a ≤q-1, compute y= αa mod p
S5.public key (p, q,α, y), private key a
F. ElGamal Encryption Algorithm
In cryptography, the ElGamal encryption
system is an asymmetric key encryption algorithm
for public-key cryptography which is based on the
Diffie–Hellman key exchange. It was described by
Taher Elgamal in 1984. ElGamal encryption
(ii)
Signing:
S6.Select a random integer k, 0 < k < q
2
3. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No. 1, February 2014
consists of three components: the key generator, the
encryption algorithm, and the decryption algorithm
[7].
q is larger than the sum of every subset of w, no
sums are congruent mod q and therefore none of
the private key's sums will be equal. r must be co
prime to q or else it will not have an inverse mod q.
The existence of the inverse of r is necessary so
that decryption is possible.
(i) Key generation:
G1. Alice generates an efficient description of
a multiplicative cyclic group G of order q with
generator g. See below for a discussion on the
required properties of this group.
G2. Alice chooses a random x from {1... q-1}.
G3. Alice computes h=𝑔 𝑥 .
G4. Alice publishes h, along with the
description of g, q, g, as her public key. Alice
retains x as her private key which must be kept
secret.
Now calculate the sequence
β = (β1, β2... βn) where βi = rwi mod q.
The public key is β, while the private key is (w, q,
and r).
(ii)
Encryption:
To encrypt an n-bit message
α = (α1, α2... αn),
Where
Is the i-th bit of the message and
calculate
(ii) Encryption:
The encryption algorithm works as follows: to
encrypt a message m to Alice under her public key
(g, q, g, h)
G5. Bob chooses a random y from {1..., q-1},
then calculates 𝑐1 =𝑔 𝑦 .
G6. Bob calculates the shared secret s=ℎ 𝑦 .
G7. Bob converts his secret message m into an
element 𝑚′ of G.
G8. Bob calculates 𝑐2 =𝑚′ .s.
G9. Bob sends the ciphertext (𝑐1 , 𝑐2 =
(𝑔 𝑦 , 𝑚′ . ℎ 𝑦 ) = 𝑔 𝑦 , 𝑚′ . (𝑔 𝑥𝑦 ) to Alice.
{0, 1},
The cryptogram then is c.
(iii)
Decryption:
In order to decrypt a cipher text c a receiver has to
find the message bits αi such that they satisfy
(iii) Decryption:
The decryption algorithm works as follows: to
decrypt a ciphertext (𝑐1 , 𝑐2 ) with her private key x,
G10. Alice calculates the shared secret s= 𝑐1𝑥 .
G11. Then computes 𝑚′ = 𝑐2 . 𝑠 −1 which she
then converts back into the plaintext message
m, where 𝑠 −1 is inverse of in the group G.
The decryption algorithm produces the
intended message.
This would be a hard problem if the βi were random
values because the receiver would have to solve an
instance of the subset sum problem, which is
known to be NP-hard. However, the values βi were
chosen such that decryption is easy if the private
key (w, q, and r) is known [8].
H. Short Range Natural Numbers Algorithm
(SRNN)
G. Knapsack Algorithm
The
Merkle–Hellman
knapsack
cryptosystem was one of the earliest public key
cryptosystems invented by Ralph Merkle and
Martin Hellman in 1978.
In asymmetric key cryptography, also
called Public Key cryptography, two different keys
are used. One key is used for encryption & only the
other corresponding key must be used for
decryption. No other key can decrypt the message not even the original (i.e. the first) key used for
encryption [9]. The beauty of this scheme is that
every communicating party needs just a key pair
for communicating with any number of other
communicating parties. Once someone obtains a
key pair, he /she can communicate with anyone
else. The Short Range Natural Number (SRNN)
algorithm is similar to RSA algorithm with some
modification. This modification increases the
security of the cryptosystem [10].
(i)
Key generation:
To encrypt n-bit messages, choose a super
increasing sequence
w = (w1, w2... wn) of n nonzero natural numbers.
Pick a random integer q, such that
𝑛
q> ∑ 𝑖=1 𝑤𝑖 ,
And a random integer, r, such that gcd (r, q) = 1
(i.e. r and q are co prime).
q Is chosen this way to ensure the uniqueness of the
cipher text. If it is any smaller, more than one
plaintext may encrypt to the same cipher text. Since
(i) Key generation:
N1. Generate two large random prime p, q.
3
4. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No. 1, February 2014
N2. Compute n=p*q
N3. Compute phi= (p-1) (q-1)
N4. Choose an integer e, 1<e<phi, such that
gcd (e, phi) =1 compute the such that (e*d)
mod phi=1
N5.Pick short range natural number u
randomly such that u<phi-1
N6.Pick another Short range natural number a
randomly such that phi>a>u and compute ua
N7.Find d such that,
e*d mod ((p-1) (q-1)) =1
N8. Public key is (n, e, ua)
N9. Private Key is (d, a, u) P, q, phi should
also be kept secret.
6
7
III. Advantages and Disadvantages
The various asymmetric key cryptography
algorithms’ advantage and disadvantage is
discussed in the following table.
Advantages
Only intended
user can read
the
message
using
their
private key.
2
DiffieHellman
3
DSA
The shared key
(i.e. the secret)
is never itself
transmitted over
the channel
It is used for
authentication
and
Integrity
4
ECC
5
ECDH
Short key is
faster
and
requires
less
computing
power.
Very
secure
means
of
deciphering keys are
easy
sequences, they are
breakable
Increase the timeperformance.
REFERENCES
[1]. Caregia Mellon Software Engineering institute, “Public Key
Cryptography”.
[2]. Yaun Xue, “Public key Cryptography and RSA Algorithm”,
Technical notes and papers.
[3]. Alese, B. K.Philemon E. D., Falaki, S. O., “Comparative
Analysis of Public-Key Encryption Schemes”, International
Journal of Engineering and Technology Volume 2 No. 9,
September, 2012
[4]. Aqeel Khalique, Kuldip Singh Sandeep Sood,
“Implementation of Elliptic Curve Digital Signature Algorithm”,
International Journal of computer Application, May 2010.
[5]. Kamlesh Gupta, Sanjay Silakari, “ECC over RSA for
Asymmetric Encryption: A Review”, IJCSI May 2011.
[6]. Ruchika Markan , Gurvinder Kaur, “ Literature Survey on
Elliptic Curve Encryption Techniques”, International Journal of
Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 9, September 2013.
[7]. Rashmi Singh, Shiv Kumar, “ElGamal Algorithm in
Cryptography”, International Journal of Scientific &
Engineering Research Volume 3, Issue 12, December-2012.
[8]. Preeti L. Darade, “Knapsack Based ECC with Encryption
and Decryption”, International Journal of Emerging Technology
and Advanced Engineering, April 2012.
[9].Mr. Hemant Kumar, Dr. Ajith Singh, “An Efficient
Implementation of digital signature Algorithm with SRNN
Public Key Cryptography”, IJRREST, June 2012.
[10]. E. George Dharma Prakash Raj, k. Sheela, “Survey on
public key cryptography algorithms”, IJSRCSMS July 2013.
Table 1. Advantage and disadvantage of various
asymmetric key cryptography algorithms
Algorithms
RSA
SRNN
The
need
for
randomness, and its
slower speed and
has long ciphertext.
IV. CONCLUSION
Public-key authentication, on the other
hand, prevents type of repudiation; each user has
sole responsibility for protecting his or her private
key. This property of public-key authentication is
often
called
non-repudiation.
Secret-key
cryptography
lags
behind
asymmetric
cryptography. Combinations of the two can be
implemented for improved security but secret-key
cryptography by itself proves insecure against man
in the middle attacks. Asymmetric cryptography
has been the foundation for secure data exchange
over networks and while it still has its
shortcomings, new ideas still come forth as the
field continues to evolve.
(iii) Decryption:
N13. Use Recipient private key (d, a, u)
N14. Compute M= (ve c) d mod n where v=
phi-a mod n
N15. Extracts the plaintext from the integer
representative M
S.NO
1
Knapsack
8
(ii) Encryption:
N10. Obtains the recipient’s public key (n, e,
ua)
N11. Represent the plaintext message as
positive integer M
N12. Computes the cipher text C= (m ua) e
mod n
Send the cipher text C to recipient.
ElGamal
exchanging
keys between
two parties
The same
plaintext gives a
different
ciphertext (with
near certainty)
each time it is
encrypted
A perfect
protocol for
distribution of
secret keys
The attack can
be avoided by
increasing the
key size.
Disadvantages
Many
secret-key
encryption methods
that is significantly
faster
than
any
currently available
public-key
encryption.
Lack
of
authentication
The security of the
private key depends
entirely on
the security of the
computer.
It is more expensive
and it shortens the
life time of batteries.
Little difficulty in
exchanging keys
4