7 resultados para dual system encryption

em Cochin University of Science


Relevância:

40.00% 40.00%

Publicador:

Resumo:

A new design of' a dual-frequency dual-polarized square microsh'ip antenna fed along the diagonal, embedded with a square slot having three extended stubs for frequency tuning, is introduced. The proposed antenna was fabricated using a standard photolithographic method and the antenna was tested using the HP 3510(:; Vector Network Analyser. The antenna is capable of generating dual resonant frequencies with mutually perpendicular polarizations and broad radiation pattern characteristics. Such dual-frequency designs find wide applications in personal mobile handsets combining GSM and CDS 1800 modes, and applications in which different frequencies are used for emission and reception such as personal satellite communications and cellular network systems.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have their own shortcomings and consequently bring security issues to email systems. This paper proposes a new secure email system based on IBE which combines finger print authentication and proxy service for encryption and decryption

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A novel dual frequency design of a square microstrip antenna coaxially fed along the diagonal with a chip capacitor mounted at the bottom of the stub is introduced. This design provides enhanced area reduction and good cross-polarization levels. The antenna design can be used as a compact antenna system where limited size is a major requirement. The details of the antenna design and experimental results are presented

Relevância:

30.00% 30.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The co-operative credit structure in a state set up consists of 3 tiers — Primary Societies at the base, District Co-operative Banks at the middle and State Cooperative Bank at the top. But, some societies at the primary level are governed by, in addition to Co-operative Societies Act, the Banking Regulation Act. Thus they are under dual control. In addition, they are working under the direct purview of Reserve Bank of India. The scope of this study is restricted to such Primary Societies, District Co-operative Banks and State Co-operative Bank. For the evaluation of the working of Co-operative Banks, the board of directors and staff were interviewed with the help of pre-constructed and pre-tested interview schedules. However, the share holders and customers were not interviewed mainly because almost all respondents were reluctant to provide copies of an exhaustive list of share holders and non-share holder customers, for the purpose of maintaining secrecy. This being an individual work, it was found physically and financially very difficult to extend the study so as to cover the share holders and non-share holder customers. Limitations of time were also responsible for restricting this study. The period of study was restricted to 1980-'81 to 1983-'84 as the data relating to earlier periods were firstly not available from all banks and secondly the prior data was considered out of date for the purpose of the study.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The recent trends envisage multi-standard architectures as a promising solution for the future wireless transceivers. The computationally intensive decimation filter plays an important role in channel selection for multi-mode systems. An efficient reconfigurable implementation is a key to achieve low power consumption. To this end, this paper presents a dual-mode Residue Number System (RNS) based decimation filter which can be programmed for WCDMA and 802.11a standards. Decimation is done using multistage, multirate finite impulse response (FIR) filters. These FIR filters implemented in RNS domain offers high speed because of its carry free operation on smaller residues in parallel channels. Also, the FIR filters exhibit programmability to a selected standard by reconfiguring the hardware architecture. The total area is increased only by 33% to include WLANa compared to a single mode WCDMA transceiver. In each mode, the unused parts of the overall architecture is powered down and bypassed to attain power saving. The performance of the proposed decimation filter in terms of critical path delay and area are tabulated

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm “MAJE4” and the popular asymmetric key algorithm “RSA”. The MAJE4 algorithm is used for encryption / decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as to accomplish scalability and message authentication. The focus is to develop a new hybrid system called MARS4 by combining the two cryptographic methods with an aim to get the advantages of both. The performance evaluation of MARS4 is done in comparison with MAJE4 and RSA.