11 resultados para Cryptographic key

em Cochin University of Science


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm “MAJE4” and the popular asymmetric key algorithm “RSA”. The MAJE4 algorithm is used for encryption / decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as to accomplish scalability and message authentication. The focus is to develop a new hybrid system called MARS4 by combining the two cryptographic methods with an aim to get the advantages of both. The performance evaluation of MARS4 is done in comparison with MAJE4 and RSA.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we propose a cryptographic transformation based on matrix manipulations for image encryption. Substitution and diffusion operations, based on the matrix, facilitate fast conversion of plaintext and images into ciphertext and cipher images. The paper describes the encryption algorithm, discusses the simulation results and compares with results obtained from Advanced Encryption Standard (AES). It is shown that the proposed algorithm is capable of encrypting images eight times faster than AES.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Communication is the process of transmitting data across channel. Whenever data is transmitted across a channel, errors are likely to occur. Coding theory is a stream of science that deals with finding efficient ways to encode and decode data, so that any likely errors can be detected and corrected. There are many methods to achieve coding and decoding. One among them is Algebraic Geometric Codes that can be constructed from curves. Cryptography is the science ol‘ security of transmitting messages from a sender to a receiver. The objective is to encrypt message in such a way that an eavesdropper would not be able to read it. A eryptosystem is a set of algorithms for encrypting and decrypting for the purpose of the process of encryption and decryption. Public key eryptosystem such as RSA and DSS are traditionally being prel‘en‘ec| for the purpose of secure communication through the channel. llowever Elliptic Curve eryptosystem have become a viable altemative since they provide greater security and also because of their usage of key of smaller length compared to other existing crypto systems. Elliptic curve cryptography is based on group of points on an elliptic curve over a finite field. This thesis deals with Algebraic Geometric codes and their relation to Cryptography using elliptic curves. Here Goppa codes are used and the curves used are elliptic curve over a finite field. We are relating Algebraic Geometric code to Cryptography by developing a cryptographic algorithm, which includes the process of encryption and decryption of messages. We are making use of fundamental properties of Elliptic curve cryptography for generating the algorithm and is used here to relate both.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

“At resale stores I have seen brand new clothes with original price tag still hanging from the sleeve. Some children have so many toys that they stay frustrated, not knowing which one to pick up for their next amusement. Presumably sensible adults trade in perfectly good cars just to have something shinier and newer. Didn’t us once live productive normal lives, without all these gadgets” [Cunningham (2005)]. During late eighties, nearly forty four percent of the participants, who took part in a consumer survey conducted in the US, responded positively to the question “My closets are filled with still 2 unopened items” [Faber and O’Guinn (1988)]. Reading such excerpts does not greatly surprise us anymore; as such reports have become common now. For many people shopping has moved beyond something that caters to their needs and wants and has become a hobby [Cunningham (2005)], an activity that they engage in to satisfy their hedonistic or pleasure-seeking goals [Ramnathan and Menon(2006), O’Cass and McEween (2004), Faber and O’Guinn (1989)]. Others look at their new possession as something that fills a void in their lives [Belk (1985), Diener et al. (1993)].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new fast stream cipher, MAJE4 is designed and developed with a variable key size of 128-bit or 256-bit. The randomness property of the stream cipher is analysed by using the statistical tests. The performance evaluation of the stream cipher is done in comparison with another fast stream cipher called JEROBOAM. The focus is to generate a long unpredictable key stream with better performance, which can be used for cryptographic applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cooperative caching in mobile ad hoc networks aims at improving the efficiency of information access by reducing access latency and bandwidth usage. Cache replacement policy plays a vital role in improving the performance of a cache in a mobile node since it has limited memory. In this paper we propose a new key based cache replacement policy called E-LRU for cooperative caching in ad hoc networks. The proposed scheme for replacement considers the time interval between the recent references, size and consistency as key factors for replacement. Simulation study shows that the proposed replacement policy can significantly improve the cache performance in terms of cache hit ratio and query delay

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper highlights the prediction of learning disabilities (LD) in school-age children using rough set theory (RST) with an emphasis on application of data mining. In rough sets, data analysis start from a data table called an information system, which contains data about objects of interest, characterized in terms of attributes. These attributes consist of the properties of learning disabilities. By finding the relationship between these attributes, the redundant attributes can be eliminated and core attributes determined. Also, rule mining is performed in rough sets using the algorithm LEM1. The prediction of LD is accurately done by using Rosetta, the rough set tool kit for analysis of data. The result obtained from this study is compared with the output of a similar study conducted by us using Support Vector Machine (SVM) with Sequential Minimal Optimisation (SMO) algorithm. It is found that, using the concepts of reduct and global covering, we can easily predict the learning disabilities in children

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diabetes mellitus is a heterogeneous metabolic disorder characterized by hyperglycemia with disturbances in carbohydrate, protein and lipid metabolism resulting from defects in insulin secretion, insulin action or both. Currently there are 387 million people with diabetes worldwide and is expected to affect 592 million people by 2035. Insulin resistance in peripheral tissues and pancreatic beta cell dysfunction are the major challenges in the pathophysiology of diabetes. Diabetic secondary complications (like liver cirrhosis, retinopathy, microvascular and macrovascular complications) arise from persistent hyperglycemia and dyslipidemia can be disabling or even life threatening. Current medications are effective for control and management of hyperglycemia but undesirable effects, inefficiency against secondary complications and high cost are still serious issues in the present prognosis of this disorder. Hence the search for more effective and safer therapeutic agents of natural origin has been found to be highly demanding and attract attention in the present drug discovery research. The data available from Ayurveda on various medicinal plants for treatment of diabetes can efficiently yield potential new lead as antidiabetic agents. For wider acceptability and popularity of herbal remedies available in Ayurveda scientific validation by the elucidation of mechanism of action is very much essential. Modern biological techniques are available now to elucidate the biochemical basis of the effectiveness of these medicinal plants. Keeping this idea the research programme under this thesis has been planned to evaluate the molecular mechanism responsible for the antidiabetic property of Symplocos cochinchinensis, the main ingredient of Nishakathakadi Kashayam, a wellknown Ayurvedic antidiabetic preparation. A general introduction of diabetes, its pathophysiology, secondary complications and current treatment options, innovative solutions based on phytomedicine etc has been described in Chapter 1. The effect of Symplocos cochinchinensis (SC), on various in vitro biochemical targets relevant to diabetes is depicted in Chapter 2 including the preparation of plant extract. Since diabetes is a multifactorial disease, ethanolic extract of the bark of SC (SCE) and its fractions (hexane, dichloromethane, ethyl acetate and 90 % ethanol) were evaluated by in vitro methods against multiple targets such as control of postprandial hyperglycemia, insulin resistance, oxidative stress, pancreatic beta cell proliferation, inhibition of protein glycation, protein tyrosine phosphatase-1B (PTP-1B) and dipeptidyl peptidase-IV (DPPxxi IV). Among the extracts, SCE exhibited comparatively better activity like alpha glucosidase inhibition, insulin dependent glucose uptake (3 fold increase) in L6 myotubes, pancreatic beta cell regeneration in RIN-m5F and reduced triglyceride accumulation in 3T3-L1 cells, protection from hyperglycemia induced generation of reactive oxygen species in HepG2 cells with moderate antiglycation and PTP-1B inhibition. Chemical characterization by HPLC revealed the superiority of SCE over other extracts due to presence of bioactives (beta-sitosterol, phloretin 2’glucoside, oleanolic acid) in addition to minerals like magnesium, calcium, potassium, sodium, zinc and manganese. So SCE has been subjected to oral sucrose tolerance test (OGTT) to evaluate its antihyperglycemic property in mild diabetic and diabetic animal models. SCE showed significant antihyperglycemic activity in in vivo diabetic models. Chapter 3 highlights the beneficial effects of hydroethanol extract of Symplocos cochinchinensis (SCE) against hyperglycemia associated secondary complications in streptozotocin (60 mg/kg body weight) induced diabetic rat model. Proper sanction had been obtained for all the animal experiments from CSIR-CDRI institutional animal ethics committee. The experimental groups consist of normal control (NC), N + SCE 500 mg/kg bwd, diabetic control (DC), D + metformin 100 mg/kg bwd, D + SCE 250 and D + SCE 500. SCEs and metformin were administered daily for 21 days and sacrificed on day 22. Oral glucose tolerance test, plasma insulin, % HbA1c, urea, creatinine, aspartate aminotransferase (AST), alanine aminotransferase (ALT), albumin, total protein etc. were analysed. Aldose reductase (AR) activity in the eye lens was also checked. On day 21, DC rats showed significantly abnormal glucose response, HOMA-IR, % HbA1c, decreased activity of antioxidant enzymes and GSH, elevated AR activity, hepatic and renal oxidative stress markers compared to NC. DC rats also exhibited increased level of plasma urea and creatinine. Treatment with SCE protected from the deleterious alterations of biochemical parameters in a dose dependent manner including histopathological alterations in pancreas. SCE 500 exhibited significant glucose lowering effect and decreased HOMA-IR, % HbA1c, lens AR activity, and hepatic, renal oxidative stress and function markers compared to DC group. Considerable amount of liver and muscle glycogen was replenished by SCE treatment in diabetic animals. Although metformin showed better effect, the activity of SCE was very much comparable with this drug. xxii The possible molecular mechanism behind the protective property of S. cochinchinensis against the insulin resistance in peripheral tissue as well as dyslipidemia in in vivo high fructose saturated fat diet model is described in Chapter 4. Initially animal were fed a high fructose saturated fat (HFS) diet for a period of 8 weeks to develop insulin resistance and dyslipidemia. The normal diet control (ND), ND + SCE 500 mg/kg bwd, high fructose saturated fat diet control (HFS), HFS + metformin 100 mg/kg bwd, HFS + SCE 250 and HFS + SCE 500 were the experimental groups. SCEs and metformin were administered daily for the next 3 weeks and sacrificed at the end of 11th week. At the end of week 11, HFS rats showed significantly abnormal glucose and insulin tolerance, HOMA-IR, % HbA1c, adiponectin, lipid profile, liver glycolytic and gluconeogenic enzyme activities, liver and muscle triglyceride accumulation compared to ND. HFS rats also exhibited increased level of plasma inflammatory cytokines, upregulated mRNA level of gluconeogenic and lipogenic genes in liver. HFS exhibited the increased expression of GLUT-2 in liver and decreased expression of GLUT-4 in muscle and adipose. SCE treatment also preserved the architecture of pancreas, liver, and kidney tissues. Treatment with SCE reversed the alterations of biochemical parameters, improved insulin sensitivity by modifying gene expression in liver, muscle and adipose tissues. Overall results suggest that SC mediates the antidiabetic activity mainly via alpha glucosidase inhibition, improved insulin sensitivity, with antiglycation and antioxidant activities.