In a recent era, Network security is playing the important role in communication system. Almost all organization either private or government can transfer the data over internet. So the security of electronic data is very important issue.... more
This paper addresses the challenges posed by Quantum Computing on Encryption under a technical, logistical and economic point of view.
Objective: To develop a multi-layered encryption framework (Phablet) that ensures robust security and efficient performance. Contributions: Introduction of a multi-key architecture using 7 public keys and 2 private keys and integration... more
A new technique proposed with the combination of cryptography and steganography enhanced with new secure feature for generating a new security system. Cryptography and Steganography are two popular ways for secure data transmission in... more
This study highlights the interesting potential of a new multilayer cryptography scheme for reliable data protection in the field of cybersecurity. To do so, an intensive examination of a multi-layer encryption mechanism is proposed to... more
In the bounded storage model introduced by Maurer, the adversary is computationally unbounded and has a bounded storage capacity. In this model, information-theoretic secrecy is guaranteed by using a publicly available random string whose... more
In this study, we reviewed biometric template protection schemes in subsisting literature and established that there is no reliable, efficacious and foolproof technique that assures diversity, revocability, security and optimal... more
The Cipher Block Chaining (CBC) and the Merkle-Hellman algorithm are two different cryptosystems for encrypting messages. But using these cryptosystems separately has many drawbacks. However there are several ways of getting rid of these... more
Attribute-based encryption (ABE) with outsourced decoding not as it were empowering fine-grained sharing of scrambled information, but too overcomes the proficiency downside (in terms of cipher content estimate and decoding fetched) of... more
Data security is a top priority in today's digital world, and encryption is the best method to keep secret information safe. Cyber threats evolve, and traditional encryption techniques become less reliable, unable to protect data, and... more
Let yC be an almost surely compact, almost everywhere super-embedded system. The goal of the present article is to examine maximal isometries. We show that every injective subring is contravariant. It was Kovalevskaya who first asked... more
Investigating the Challenges and Solutions in Cybersecurity using Quantum Computing and Cryptography
The advent of quantum computing presents a transformative challenge to contemporary cryptographic systems, threatening the security of widely used encryption algorithms such as RSA, ECC, and Diffie-Hellman. Leveraging principles like... more
The advent of quantum computing poses a formidable challenge to the security landscape, particularly in the realm of encryption. Current encryption algorithms, which have safeguarded sensitive data for decades, face unprecedented threats... more
Cryptography is taught with the basic rule that there is no such thing as an unbreakable encryption because "If someone tries enough keys he is bound to get the right one," which gives rise to the basis of the brute force attack. Brute... more
The main objective of this paper is to provide stronger security for communication network over the Internet by enhancing the overall strength of the AES algorithm. Rijndael's algorithm was been selected as the Advanced Encryption... more
In the field of medicine, the preservation of medical confidentiality stands as paramount, for it directly influences the secure treatment and dissemination of medical data. Safeguarding against falsification or unauthorized access to... more
Blockchain technology, first introduced with Bitcoin, has evolved into a powerful system for secure data exchange across numerous industries. Its foundation relies on cryptographic methods like hash algorithms, public key cryptography,... more
Internet of things is comprised of smart machines interacting with other machines, objects environments, and infrastructure. As a result, the huge volume of data is being generated; so the necessity to protect such data have become... more
Because of the high complexities issues in the Internet of Things and its applications, there is a need to propose an appropriate security model that would help in managing and controlling it. This paper critically examined Rijndael’s... more
In this paper we study the possibilities and advantages of replacing basic operators such as XOR into more complex table functions inside encryption algorithm. We define the E# and RTGE# operators instead of XOR in simplified form and... more
In this paper, a new method for digital data cryptography is proposed to increase the speed of data cryptography, simplify the processes of data encryption - decryption, and to strengthen the degree of data protection. The proposed data... more
The rise of Internet of Things (IoT) networks has highlighted vulnerabilities related to devices' limited resources. As a result, it has become essential to delegate encryption services to cloud and fog platforms. Encryption as a Service... more
This paper address the cryptographic keys management problem: how to generate the cryptographic keys and apply them to secure encryption. The purpose of this research was to study on utilizing graph labeling for generating stream-keys and... more
This study investigates the broadcast/multicast authentication problems in wireless sensor networks (WSNs), particularly sensor nodes broadcast authentication and outside user authentication, and proposes efficient and secure solutions... more
This study investigates the broadcast/multicast authentication problems in wireless sensor networks (WSNs), particularly sensor nodes broadcast authentication and outside user authentication, and proposes efficient and secure solutions... more
Finding the Right Processing Architecture for AES Encryption Even before September 11, 2001, security processing has been a mainstay concern for today's communication design engineers. With rogue attacks growing, broadband deployments on... more
This document represents the considered judgement and personal views of the participating individuals listed on the following page with expertise in the subject field. It shall not be considered the official position of IEEE or any of its... more
In an era where communication plays the most important role it is very crucial to secure the data end to end. Cryptography helps with data authentication at the execution levels. Not just communication, cryptography also helps to transfer... more
The need for a reliable and fast encryption algorithm to encrypt medical data for patients is an extremely important topic to be considered especially during pandemic times such as the pandemic COVID-19. This pandemic forced governments... more
An approach for designing fast public key encryption systems using white-box cryptography techniques
In this paper we present an approach for designing fast public key encryption cryptosystems using random primitives and error permutation. An encryption speed of such systems allows to use them for "on-the-fly" public key encryption and... more
In containerized environments, securing interservice communication is paramount, and Mutual TLS (mTLS) offers a robust solution. However, traditional mTLS implementations face challenges in scaling and scalable environments. This paper... more
Chaotic Encryption Method seems to be much better than traditional encryption methods used today. Chaotic encryption is the new direction of cryptography. It makes use of chaotic system properties such as sensitive to initial condition... more
Huge amount of information is exchanged electronically in most enterprises and organisations. In particular, in all financial and e-business set ups the amount of data stored or exchanged is growing enormously over public network among... more
The motivations and interests of students qualifying for the Students’ Industrial Work Experience Scheme (SIWES) have been found to vary, often based on their perceptions of the program's benefits and drawbacks. The importance of an... more
Implementation of AES DUKPT in Software Point of Sale- Enhancing Security in Digital Payment Systems
This paper explores the implementation of the Advanced Encryption Standard (AES) with Derived Unique Key Per Transaction (DUKPT) in Software Point of Sale (SoftPOS) systems. The rapid advancement of digital payment technologies... more
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to construct covert channels are given. Current methods of covert channels elimination, detection and capacity limitation are examined. Detection... more
Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used... more
Encryption is essential in preventing unauthorized access to sensitive data in light of the growing concerns about data security in cloud computing. Homomorphic encryption promises to enable secure calculations on encrypted data without... more
Some arguments more are presented to illustrate a need for careful security evaluation of the encryption algorithms for possible use in the wireless networks. Particularly, the security evaluation of a recently proposed fast encryption... more
Big Data Analytics are said to help in transforming huge amounts of raw data towards valuable information that can be used, but there are formidable challenges in feature selection and classification due to the complexity and high... more
Traditional encryption allows encrypted data to be decrypted before any computation could be performed on such data. This approach could compromise the security of the data when an untrusted party is involved in the computation. To be... more
Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems. An enormous set of cryptographic schemes persist in which each... more
Приготовьтесь к очередному эпизоду "Кибербезопасности", в котором будут показаны наши любимые кибер-злодеи, и их громкие облачные выходки! На этот раз АНБ и ФБР объединились, чтобы рассказать захватывающую историю о том, что атакующим... more
HTTP merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang digunakan untuk komunikasi atau pertukaran data antara server dengan client. Terdapat kelemahan pada protokol HTTP dimana pada pengiriman data atau informasi tidak... more
Nowadays, due to the rapid development of the internet, it is prominent to guard mystery data from cyberpunks through communicating. The steganography technique utilizes for trading mystery data in an approach to stay away from doubt.... more
The Internet is the essential wellspring of data in the present life where it offers the trade of data to the clients.The exchange of such data prompts an incredible security danger. Cryptography and steganography are two issues in... more
Preserving confidentiality, integrity and authenticity of images is becoming very important. There are so many different encryption techniques to protect images from unauthorized access. Matrix multiplication can be successfully used to... more