32 research outputs found

    Analysing the IOBC Authenticated Encryption Mode

    Get PDF
    Abstract. The idea of combining a very simple form of added plaintext redundancy with a special mode of data encryption to provide data in-tegrity is an old one; however, despite its wide deployment in protocols such as Kerberos, it has largely been superseded by provably secure au-thenticated encryption techniques. In this paper we cryptanalyse a block cipher mode of operation called IOBC, possibly the only remaining en-cryption mode designed for such use that has not previously been ana-lyzed. We show that IOBC is subject to known-plaintext-based forgery attacks with a complexity of around 2n=3, where n is the block cipher block length.

    An Overview of Cryptography (Updated Version, 3 March 2016)

    Get PDF
    There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography...While cryptography is necessary for secure communications, it is not by itself sufficient. This paper describes the first of many steps necessary for better security in any number of situations. A much shorter, edited version of this paper appears in the 1999 edition of Handbook on Local Area Networks published by Auerbach in September 1998

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)

    Get PDF
    Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. Department of Defense and launched in the eighties to the world. Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. It was called MOLAZ. It used two algorithms AES 128 and AES 256 bits, and switching between them using special key (K,). In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. Therefore, in 2011 appeared MOLAZ-SM. It presents a study is the development of this system by adding the mask technique to prevent the use of the style of repeated attempts to enter the key. The system depends on the base "If you enter a true key, you obtain to the truth information, but if you enter the false key; you obtains to the false information.

    A Literature Survey on the Cryptographic Encryption Algorithms for Secured Data Communication

    Get PDF
    Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population has internet access (June 2018). Hence, it is obvious that huge volume of data is exchanged among the users over the internet. As a result, everybody is worried about data security while transmission of any confidential data. In this proposed paper, several cryptographic algorithms are discussed based on concepts of encryption and decryption. Cryptography algorithms provide the mechanisms necessary to implement accountability, accuracy and confidentiality in secured communication. This is further preceded with the widespread adoption of secure protocols such as secure Internet Protocol and virtual private networks. Efficient cryptographic processing, therefore, will become increasingly vital to good system improvement results. Cryptographic algorithms provide many key building block for network security related services. Cyber attacks (intrusion) were up 44% globally during Q1 2018, and the speed of attacks continues to increase exponentially. 75% of organizations have experienced a breach, but only 25–35% believes they are equipped to deal with these intrusions effectively

    HUC-HISF: A Hybrid Intelligent Security Framework for Human-centric Ubiquitous Computing

    Get PDF
    制度:新 ; 報告番号:乙2336号 ; 学位の種類:博士(人間科学) ; 授与年月日:2012/1/18 ; 早大学位記番号:新584

    Supporting NAT traversal and secure communications in a protocol implementation framework

    Get PDF
    Dissertação apresentada na Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa para obtenção do Grau de Mestre em Engenharia Electrotécnica e de ComputadoresThe DOORS framework is a versatile, lightweight message-based framework developed in ANSI C++. It builds upon research experience and subsequent knowledge garnered from the use and development of CVOPS and OVOPS, two well known protocol development frameworks that have obtained widespread acceptance and use in both the Finnish industry and academia. It conceptually resides between the operating system and the application, and provides a uniform development environment shielding the developer from operating system speci c issues. It can be used for developing network services, ranging from simple socket-based systems, to protocol implementations, to CORBA-based applications and object-based gateways. Originally, DOORS was conceived as a natural extension from the OVOPS framework to support generic event-based, distributed and client-server network applications. However, DOORS since then has evolved as a platform-level middleware solution for researching the provision of converged services to both packet-based and telecommunications networks, enterprise-level integration and interoperability in future networks, as well as studying application development, multi-casting and service discovery protocols in heterogeneous IPv6 networks. In this thesis, two aspects of development work with DOORS take place. The rst is the investigation of the Network Address Translation (NAT) traversal problem to give support to applications in the DOORS framework that are residing in private IP networks to interwork with those in public IP networks. For this matter this rst part focuses on the development of a client in the DOORS framework for the Session Traversal Utilities for NAT (STUN) protocol, to be used for IP communications behind a NAT. The second aspect involves secure communications. Application protocols in communication networks are easily intercepted and need security in various layers. For this matter the second part focuses on the investigation and development of a technique in the DOORS framework to support the Transport Layer Security (TLS) protocol, giving the ability to application protocols to rely on secure transport layer services

    SECURITY AND PRIVACY ISSUES IN MOBILE NETWORKS, DIFFICULTIES AND SOLUTIONS

    Get PDF
    Mobile communication is playing a vital role in the daily life for the last two decades; in turn its fields gained the research attention, which led to the introduction of new technologies, services and applications. These new added facilities aimed to ease the connectivity and reachability; on the other hand, many security and privacy concerns were not taken into consideration. This opened the door for the malicious activities to threaten the deployed systems and caused vulnerabilities for users, translated in the loss of valuable data and major privacy invasions. Recently, many attempts have been carried out to handle these concerns, such as improving systems’ security and implementing different privacy enhancing mechanisms. This research addresses these problems and provides a mean to preserve privacy in particular. In this research, a detailed description and analysis of the current security and privacy situation in the deployed systems is given. As a result, the existing shortages within these systems are pointed out, to be mitigated in development. Finally a privacy preserving prototype model is proposed. This research has been conducted as an extensive literature review about the most relevant references and researches in the field, using the descriptive and evaluative research methodologies. The main security models, parameters, modules and protocols are presented, also a detailed description of privacy and its related arguments, dimensions and factors is given. The findings include that mobile networks’ security along with users are vulnerable due to the weaknesses of the key exchange procedures, the difficulties that face possession, repudiation, standardization, compatibility drawbacks and lack of configurability. It also includes the need to implement new mechanisms to protect security and preserve privacy, which include public key cryptography, HIP servers, IPSec, TLS, NAT and DTLS-SRTP. Last but not least, it shows that privacy is not absolute and it has many conflicts, also privacy requires sophisticated systems, which increase the load and cost of the system.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Қолданбалы криптология: шифрлау әдістері

    Get PDF
    Оқулыққа жалпы мәліметтер кіреді: криптология, криптография және криптографиялық талдау негіздері; дәстүрлі тарихи ауыстыру және алмастыру шифрлары; блокты және құрамдас шифрлар және оларға шабуылдар; ағынды шифрлар және псевдокездейсоқ сандар генераторлары; криптографиялық түрлендіру және шифрлау стандарттары; блокты симметриялық криптографиялық алгоритмдер; ақпараттық-коммуникациялық жүйелерде деректердің конфиденциалдығын камтамасыз ету үшін қолданатын шифрлаудың симметриялық және асимметриялық криптографиялық жүйелерін құрастыру принциптері, сонымен қатар шешімдері бар мысалдар, бақылау тапсырмалары жауаптармен. Оқулық "Ақпараттық қауіпсіздік" білімдер аймағында оқитын жоғары оқу орындарының бакалаврлар, магистранттар, докторанттарына арналған. Оқулық Қ.И. Сәтбаев атындағы Қазақ ұлттық техникалық зерттеу университетінің және Украинаның Ұлттық авиациялық университетінің авторлық ұжымымен ынтымақтастық туралы Мемарандумға сәйкес дайындалған

    Прикладная криптология: методы шифрования

    Get PDF
    Учебное пособие содержит общие сведения: основы криптологии, криптографии и криптографического анализа; традиционно исторические шифры подстановки и перестановки; блочные и составные шифры и атаки на них; потоковые шифры и генераторы псевдослучайных чисел; стандарты криптографического шифрования и преобразования; блочные симметричные криптографические алгоритмы; принципы построения симметричных и асимметричных криптографических систем шифрования, которые используются для обеспечения конфиденциальности данных в информационно-телекоммуникационных системах, а также примеры с решениями, контрольные задания с ответами. Пособие подготовлено авторским коллективом Казахского национального исследовательского технического университета имени К.И. Сатпаева и Национального авиационного университета Украины (совместно с учеными Житомирского военного института имени С. П. Королева) в соответствии с Меморандумом о сотрудничестве, и предназначено для бакалавров, магистрантов, аспирантов и докторантов высших учебных заведений, обучающихся в области знаний Информационная безопасность»

    Nykyaikaisten salattujen tiedonsiirtoprotokollien vertailu

    Get PDF
    Räjähdysmäisesti kasvava Internet-käyttäjien määrä on luonut uusia tarpeita nopeille ja salatuille yhteyksille. Tätä ongelmaa lähti ratkomaan Internet Engineering Task Force, joka neljän vuoden ajan kehitti uutta versiota Transport Layer Security eli TLS-protokollalle. Työ oli avointa ja siihen osallistui moni nimekäs yritys, mutta myös kryptoharrastajat. Tämän työn tarkoituksena oli tutkia uusinta TLS-protokollan versiota erityisesti nopeutensa puolesta sekä samalla tutustua sen toimintoihin syvemmin. Paljon puhutusta yhteyden luomisen nopeutumisesta haluttiin saada tieteellisiä tuloksia ja vertailla niitä aiempiin versioihin. Protokollan teoriaa ja kehitystyötä tutkittiin paljon, joka antoi lähtökohdat protokollan suorituskykyodotuksille. Salatun yhteyden muodostamiseen kuuluvan kättelyn odotettiin olevan noin 50% nopeampaa aiempiin versioihin verrattuna, ja salaukseen käytettävien algoritmien, funktioiden ja metodien listan odotettiin olevan lyhyempi kuin aiemmin. Protokollien vertailu suoritettiin laboratorio-oloissa, jossa ulkopuoliset haitat saatiin poistettua ja muuttujia kyettiin määrittelemään tarpeiden mukaan. Työn tulokset olivat odotuksien mukaiset. TLS-protokollan versio 1.3 onnistui pudottamaan salatun yhteyden luomiseen vaaditun kättelyn pituuden puoleen. Tuettujen algoritmien, metodien ja funktioiden lista on saatu tiivistettyä luotettaviin vaihtoehtoihin. Osa aiemmin käytetyistä vaihtoehdoista oli kyseenalaistettu kryptoyhteisön toimesta. Tutkimus osoitti protokollan uuden version olevan valmis laajempaan yleiseen käyttöön
    corecore