1,357 research outputs found
Review on DNA Cryptography
Cryptography is the science that secures data and communication over the
network by applying mathematics and logic to design strong encryption methods.
In the modern era of e-business and e-commerce the protection of
confidentiality, integrity and availability (CIA triad) of stored information
as well as of transmitted data is very crucial. DNA molecules, having the
capacity to store, process and transmit information, inspires the idea of DNA
cryptography. This combination of the chemical characteristics of biological
DNA sequences and classical cryptography ensures the non-vulnerable
transmission of data. In this paper we have reviewed the present state of art
of DNA cryptography.Comment: 31 pages, 12 figures, 6 table
Scalable and Secure Aggregation in Distributed Networks
We consider the problem of computing an aggregation function in a
\emph{secure} and \emph{scalable} way. Whereas previous distributed solutions
with similar security guarantees have a communication cost of , we
present a distributed protocol that requires only a communication complexity of
, which we prove is near-optimal. Our protocol ensures perfect
security against a computationally-bounded adversary, tolerates
malicious nodes for any constant (not
depending on ), and outputs the exact value of the aggregated function with
high probability
Data transmission using aes encryption via email and sms
A computer, and other mobile computing devices, are generally accepted globally as a personal computing platform. Given the amount of sensitive information gathered by these devices, there are serious privacy and security implications for both individual use and enterprise organization. Confidentiality of the data can be effectively restricted by deploying an encryption file technique. All major computers Operating System now integrates some form of encryption. In certain situations, this is inadequate, as users may be forced into disclosing their decryption keys. In this case, the data must be hidden so that it is very certainly transmit sensitive information but unable to intercept easily if not encrypt before sending to the intended person. Encryption and decryption technique while the interior structure's strength of the data file depends on the key/password it used. This thesis priority is to avoid the using of the manual process such as hand-to-hand method transmission while maintaining the concealment of their sensitive or confidential data and explores the usefulness of encryption for computer devices. Users especially choose weak technique. The goal is to ensure the confidential data is not reachable for unauthorized personnel by implementing the use of passwords that are for encryption keys and to make ease for the transmission confidential data via email platform
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption
When working with joint collections of confidential data from multiple
sources, e.g., in cloud-based multi-party computation scenarios, the ownership
relation between data providers and their inputs itself is confidential
information. Protecting data providers' privacy desires a function for secretly
shuffling the data collection. We present the first efficient secure
multi-party computation protocol for secret shuffling in scenarios with a
central server. Based on a novel approach to random index distribution, our
solution enables the randomization of the order of a sequence of encrypted data
such that no observer can map between elements of the original sequence and the
shuffled sequence with probability better than guessing. It allows for
shuffling data encrypted under an additively homomorphic cryptosystem with
constant round complexity and linear computational complexity. Being a
general-purpose protocol, it is of relevance for a variety of practical use
cases
A Solution for Privacy-Preserving and Security in Cloud for Document Oriented Data (By Using NoSQL Database)
Cloud computing delivers massively scalable computing resources as a service with Internet based technologies those can share resources within the cloud users. The cloud offers various types of services that majorly include infrastructure as services, platform as a service, and software as a service and security as a services and deployment model as well. The foremost issues in cloud data security include data security and user privacy, data protection, data availability, data location, and secure transmission. In now day, preserving-privacy of data and user, and manipulating query from big-data is the most challenging problem in the cloud. So many researches were conducted on privacy preserving techniques for sharing data and access control; secure searching on encrypted data and verification of data integrity. This work included preserving-privacy of document oriented data security, user privacy in the three phases those are data security at rest, at process and at transit by using Full Homomorphic encryption and decryption scheme to achieve afore most mentioned goal. This work implemented on document oriented data only by using NoSQL database and the encryption/decryption algorithm such as RSA and Paillierâs cryptosystem in Java package with MongoDB, Apache Tomcat Server 9.1, Python, Amazon Web Service mLab for MongoDB as remote server. Keywords: Privacy-Preserving, NoSQL, MongoDB, Cloud computing, Homomorphic encryption/decryption, public key, private key, RSA Algorithm, Paillierâs cryptosystem DOI: 10.7176/CEIS/11-3-02 Publication date:May 31st 202
A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks
The Modulo 1 Factoring Problem (M1FP) is an elegant mathematical problem which could be exploited to design safe cryptographic protocols and encryption schemes that resist to post quantum attacks. The ELGAMAL encryption scheme is a well-known and efficient public key algorithm designed by Taher ELGAMAL from discrete logarithm problem. It is always highly used in Internet security and many other applications after a large number of years. However, the imminent arrival of quantum computing threatens the security of ELGAMAL cryptosystem and impose to cryptologists to prepare a resilient algorithm to quantum computer-based attacks. In this paper we will present a like-ELGAMAL cryptosystem based on the M1FP NP-hard problem. This encryption scheme is very simple but efficient and supposed to be resistant to post quantum attacks
Cryptographically Secure Information Flow Control on Key-Value Stores
We present Clio, an information flow control (IFC) system that transparently
incorporates cryptography to enforce confidentiality and integrity policies on
untrusted storage. Clio insulates developers from explicitly manipulating keys
and cryptographic primitives by leveraging the policy language of the IFC
system to automatically use the appropriate keys and correct cryptographic
operations. We prove that Clio is secure with a novel proof technique that is
based on a proof style from cryptography together with standard programming
languages results. We present a prototype Clio implementation and a case study
that demonstrates Clio's practicality.Comment: Full version of conference paper appearing in CCS 201
- âŠ