90 research outputs found

    Theory and Practice of Cryptography and Network Security Protocols and Technologies

    Get PDF
    In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities

    A Review Study On Some Cyber Security Related Topics

    Get PDF
    It is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to the complexity of information systems, both in terms of political usage and technology. Its primary goal is to ensure the system's dependability, integrity, and data privacyIt is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to the complexity of information systems, both in terms of political usage and technology. Its primary goal is to ensure the system's dependability, integrity, and data privac

    Evaluation of mobile network security in Ghana

    Get PDF
    Applied project submitted to the Department of Computer Science, Ashesi University College, in partial fulfillment of Bachelor of Science degree in Computer Science, April 2015Mobile technology is one of the most successful technologies on the African continent. Personal and professional communication as well as critical services like banking and remittances are widely made through mobile networks and platforms in Ghana. However, little is known about the security of the underlying infrastructure and devices consumers use to interact with the mobile network. The focus of this project is to determine if the core systems of the mobile network operators, the technology infrastructure, and the 2G/3G dongles have exploitable security vulnerabilities, demonstrate some of those exploits, and make recommendations on how to mitigate or eliminate the risk of exploitation.Ashesi University Colleg

    A secure architecture enabling end-user privacy in the context of commercial wide-area location-enhanced web services

    Get PDF
    Mobile location-based services have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of such services may therefore depend on how privacy sensitive information will be handled in order to restore users’ confidence in what could become the “killer app” of 3G networks. The work reported in this thesis is part of a larger project to provide a secure architecture to enable the delivery of location-based services over the Internet. The security of transactions and in particular the privacy of the information transmitted has been the focus of our research. In order to protect mobile users’ identities, we have designed and implemented a proxy-based middleware called the Orient Platform together with its Orient Protocol, capable of translating their real identity into pseudonyms. In order to protect users’ privacy in terms of location information, we have designed and implemented a Location Blurring algorithm that intentionally downgrades the quality of location information to be used by location-based services. The algorithm takes into account a blurring factor set by the mobile user at her convenience and blurs her location by preventing real-time tracking by unauthorized entities. While it penalizes continuous location tracking, it returns accurate and reliable information in response to sporadic location queries. Finally, in order to protect the transactions and provide end-to-end security between all the entities involved, we have designed and implemented a Public Key Infrastructure based on a Security Mediator (SEM) architecture. The cryptographic algorithms used are identitybased, which makes digital certificate retrieval, path validation and revocation redundant in our environment. In particular we have designed and implemented a cryptographic scheme based on Hess’ work [108], which represents, to our knowledge, the first identity-based signature scheme in the SEM setting. A special private key generation process has also been developed in order to enable entities to use a single private key in conjunction with multiple pseudonyms, which significantly simplifies key management. We believe our approach satisfies the security requirements of mobile users and can help restore their confidence in location-based services

    TIME AND SPACE COMPLEXITY ANALYSIS OF RSA AND ELGAMAL CRYPTOGRAPHIC ALGORITHMS ON MIXED DATA

    Get PDF
    The complexity study of algorithms, especially computationally intensive ones is of great significance in the field of complexity. Cryptographic algorithms are considered to be computationally intensive because they utilize a substantial number of computational resources, such as CPU memory and processing time. Cryptographic algorithms provide a solution to the security of data transmission whereby ensuring integrity, confidentiality and authentication of any form of data. However, there are still challenges of which cryptographic algorithms are suitable in terms of computation speed and memory usage. Whereas, a good number of research efforts have been put into experimenting on the complexities of the cryptographic algorithm on text, image and audio data, little has been done on video data. In this study, the time and space complexity of RSA and ElGamal cryptographic algorithms on mixed data was carried out. RSA and ElGamal cryptographic algorithms was implemented using C-sharp (C#) programming language to encrypt and decrypt text, image, audio and video dataset. In achieving the objectives of the study, both the implemented algorithms (RSA and ElGamal) are depicted using pseudocodes and flowcharts, while some of the datasets used were sourced from various online repositories. The time complexities of each dataset was obtained using the CPU internal clock while the space usage for each operations on each of the dataset was obtained using the computer internal memory. Tables and graphs was used to carry out the comparative analysis of both algorithms. The time and space complexity of RSA and ElGamal algorithms were experimented on text, image, audio and video dataset. The experimental results revealed that RSA outperformed ElGamal in terms of computational time during encryption of all categories of data. ElGamal outperformed RSA in terms of computational time during decryption of all categories of data. ElGamal algorithm outperformed RSA in terms of memory usage during encryption of all categories of data while both algorithms used relatively the same amount of space during decryption of all categories of data used. Based on the comparative analysis of the time and space complexity on both RSA and ElGamal algorithms, it was discovered that RSA is a better algorithm when it comes to time complexity, that is, RSA can be said to be a time-efficient algorithm. ElGamal algorithm performed better than RSA in the memory usage aspect, therefore the ElGamal algorithm is said to be a memory-efficient algorithm. Therefore, this study hereby recommend that other measurement metrics may be used to compare both algorithms in future works

    Naval Reserve support to information Operations Warfighting

    Get PDF
    Since the mid-1990s, the Fleet Information Warfare Center (FIWC) has led the Navy's Information Operations (IO) support to the Fleet. Within the FIWC manning structure, there are in total 36 officer and 84 enlisted Naval Reserve billets that are manned to approximately 75 percent and located in Norfolk and San Diego Naval Reserve Centers. These Naval Reserve Force personnel could provide support to FIWC far and above what they are now contributing specifically in the areas of Computer Network Operations, Psychological Operations, Military Deception and Civil Affairs. Historically personnel conducting IO were primarily reservists and civilians in uniform with regular military officers being by far the minority. The Naval Reserve Force has the personnel to provide skilled IO operators but the lack of an effective manning document and training plans is hindering their opportunity to enhance FIWC's capabilities in lull spectrum IO. This research investigates the skill requirements of personnel in IO to verify that the Naval Reserve Force has the talent base for IO support and the feasibility of their expanded use in IO.http://archive.org/details/navalreservesupp109451098
    • 

    corecore