25,254 research outputs found

    Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time

    Get PDF
    Computer, Internet technology have grown exponentially, and constant evolution until today. The usage of digital data such as text, images, audio, animation and videos are commonly used in many aspects of daily activity. The continuous increase in the use of digital data transmission over a network and it exposed to the various kinds of attacks, unauthorized access and network hacking. Thus, it is very hard to ensure that the digital data transmission are secure from any attacks and unauthorized access especially for sensitive and important digital data. This has been raised researcher’s concerns on security of the digital data. Digital data security has become one of the most important aspects in communication. Cryptography is one of the most important technology for protecting digital data. As there is need for secure communication, efficient and secure cryptographic processing is needed for desirable platform overall performance. Improvement of any communication platform with secure and complicated cryptographic algorithms incredibly relies on ideas of data safety that is essential within the current technological global. This paper propose a Secured Modified Advanced Encryption Standard Algorithm with decreasing the rounds of Advanced Encryption Standard (AES) to 14 rounds in order to minimize encryption and decryption process time and increasing digital data security as well. The results have been proved that the proposed technique provides higher efficiency in term of encryption and decryption process time compared to other researches while increase security which has been proved by using avalanche effect test

    Implementation and evaluation of EMAES – A hybrid encryption algorithm for sharing multimedia files with more security and speed

    Get PDF
    In this era of smartphones, a huge amount of multimedia files like audio, video, images, animation, and plain text are shared. And with this comes the threat of data being stolen and misused. Most people don’t think about the security of data before uploading it to any platform. Most apps used on smartphones upload our data to their server. Not only this, but other third-party apps can also read that data while it is being transmitted. One solution to this problem is encrypting the data before sharing it and decrypting it back at the other end so that even if it is intercepted in between the transmission, it would be impossible to decrypt it. In this paper, a newly designed hybrid encryption algorithm EMAES that includes the efficiency of MAES (Modified Advanced Encryption Standard) and security of ECC (Elliptic Curve Cryptography) was implemented in MATLAB as well as in android studio 4.0. using a mobile messaging application. Also, it was tested for different speeds and security parameters. Further, it was compared with standard algorithms like the RC4, RC6 and Blowfish as well as with other hybrid algorithms like RC4+ECC, RC6+ECC and Blowfish+ECC. The EMAES was found 30% more efficient in terms of encryption and decryption time. The security of EMAES also showed improvement when compared with other hybrid algorithms for parameters like SSIM (structural similarity index measure), SNR (Signal to Noise Ratio), PSNR(Peak Signal to Noise Ratio), MSE (Mean Squared Error) and RMSE (Root Mean Squared Error). And finally, no significant improvement was found in the CPU and RAM usage

    Low Complexity Security Algorithm for CPS / IoT Networks

    Get PDF
    Due to its noisy nature, wireless channel plays a dominant role in deciding the performance of data communication between the smart objects in the cyberphysical systems (CPS) or the internet of things (IoT). Open and heterogeneous nature of these networks makes them susceptible to vulnerable attacks. So, to keep up the confidentiality and integrity of the transmitted data against the adversaries, it should be secured before transmission. However, issues such as power efficiency, low computational complexity need to be considered when designing security algorithms for CPS/IoT networks. Traditional encryption algorithms, such as Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA) can be used for security purpose, but they do not satisfy power and complexity criteria as per CPS/IOT networks requirements. Moreover, they exhibit poor bit error ratio (BER) performance in a noisy wireless channel. This paper presents a modified security algorithm, AES-P, with X-OR mapping on AES to make them suitable for CPS/IoT applications. Simulation and analysis of the proposed algorithm showed that its power consumption and complexity are reduced as compared to traditional AES. It also performed better in the wireless channel, while maintaining the required security level satisfied by Avalanche effect

    AES-CBC Software Execution Optimization

    Full text link
    With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process. This paper investigates the performance and efficiency of IEEE 802.11i approved Advanced Encryption Standard (AES)-Rijndael ciphering/deciphering software in Cipher Block Chaining (CBC) mode. Simulations are used to analyse the speed, resource consumption and robustness of AES-CBC to investigate its viability for image encryption usage on common low power devices. The detailed results presented in this paper provide a basis for performance estimation of AES cryptosystems implemented on wireless devices. The use of optimized AES-CBC software implementation gives a superior encryption speed performance by 12 - 30%, but at the cost of twice more memory for code size.Comment: 8 pages, IEEE 200

    Agonistic behavior of captive saltwater crocodile, crocodylus porosus in Kota Tinggi, Johor

    Get PDF
    Agonistic behavior in Crocodylus porosus is well known in the wild, but the available data regarding this behavior among the captive individuals especially in a farm setting is rather limited. Studying the aggressive behavior of C. porosus in captivity is important because the data obtained may contribute for conservation and the safety for handlers and visitors. Thus, this study focuses on C. porosus in captivity to describe systematically the agonistic behaviour of C. porosus in relation to feeding time, daytime or night and density per pool. This study was carried out for 35 days in two different ponds. The data was analysed using Pearson’s chi-square analysis to see the relationship between categorical factors. The study shows that C. porosus was more aggressive during daylight, feeding time and non-feeding time in breeding enclosure (Pond C, stock density =0.0369 crocodiles/m2) as compared to non-breeding pond (Pond B, stock density =0.3317 crocodiles/m2) where it is only aggressive during the nighttime. Pond C shows the higher domination in the value of aggression in feeding and non-feeding time where it is related to its function as breeding ground. Chi-square analysis shows that there is no significant difference between ponds (p=0.47, χ2= 2.541, df= 3), thus, there is no relationship between categorical factors. The aggressive behaviour of C. porosus is important for the farm management to evaluate the risk in future for the translocation process and conservation of C. porosus generally

    A First Practical Fully Homomorphic Crypto-Processor Design: The Secret Computer is Nearly Here

    Get PDF
    Following a sequence of hardware designs for a fully homomorphic crypto-processor - a general purpose processor that natively runs encrypted machine code on encrypted data in registers and memory, resulting in encrypted machine states - proposed by the authors in 2014, we discuss a working prototype of the first of those, a so-called `pseudo-homomorphic' design. This processor is in principle safe against physical or software-based attacks by the owner/operator of the processor on user processes running in it. The processor is intended as a more secure option for those emerging computing paradigms that require trust to be placed in computations carried out in remote locations or overseen by untrusted operators. The prototype has a single-pipeline superscalar architecture that runs OpenRISC standard machine code in two distinct modes. The processor runs in the encrypted mode (the unprivileged, `user' mode, with a long pipeline) at 60-70% of the speed in the unencrypted mode (the privileged, `supervisor' mode, with a short pipeline), emitting a completed encrypted instruction every 1.67-1.8 cycles on average in real trials.Comment: 6 pages, draf
    corecore