90 research outputs found
Theory and Practice of Cryptography and Network Security Protocols and Technologies
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities
A Review Study On Some Cyber Security Related Topics
It is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to the complexity of information systems, both in terms of political usage and technology. Its primary goal is to ensure the system's dependability, integrity, and data privacyIt is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to the complexity of information systems, both in terms of political usage and technology. Its primary goal is to ensure the system's dependability, integrity, and data privac
Evaluation of mobile network security in Ghana
Applied project submitted to the Department of Computer Science, Ashesi University College, in partial fulfillment of Bachelor of Science degree in Computer Science, April 2015Mobile technology is one of the most successful technologies on the African
continent. Personal and professional communication as well as critical
services like banking and remittances are widely made through mobile
networks and platforms in Ghana. However, little is known about the
security of the underlying infrastructure and devices consumers use to
interact with the mobile network.
The focus of this project is to determine if the core systems of the mobile
network operators, the technology infrastructure, and the 2G/3G dongles
have exploitable security vulnerabilities, demonstrate some of those
exploits, and make recommendations on how to mitigate or eliminate the
risk of exploitation.Ashesi University Colleg
A secure architecture enabling end-user privacy in the context of commercial wide-area location-enhanced web services
Mobile location-based services have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of such services may therefore depend on how privacy sensitive information will be handled in order to restore usersâ confidence in what could become the âkiller appâ of 3G networks.
The work reported in this thesis is part of a larger project to provide a secure architecture to enable the delivery of location-based services over the Internet. The security of transactions and in particular the privacy of the information transmitted has been the focus of our research. In order to protect mobile usersâ identities, we have designed and implemented a proxy-based middleware called the Orient Platform together with its Orient Protocol, capable of translating their real identity into pseudonyms.
In order to protect usersâ privacy in terms of location information, we have designed and implemented a Location Blurring algorithm that intentionally downgrades the quality of location information to be used by location-based services. The algorithm takes into account a blurring factor set by the mobile user at her convenience and blurs her location by preventing real-time tracking by unauthorized entities. While it penalizes continuous location tracking, it returns accurate and reliable information in response to sporadic location queries.
Finally, in order to protect the transactions and provide end-to-end security between all the entities involved, we have designed and implemented a Public Key Infrastructure based on a Security Mediator (SEM) architecture. The cryptographic algorithms used are identitybased, which makes digital certificate retrieval, path validation and revocation redundant in our environment. In particular we have designed and implemented a cryptographic scheme based on Hessâ work [108], which represents, to our knowledge, the first identity-based signature scheme in the SEM setting. A special private key generation process has also been developed in order to enable entities to use a single private key in conjunction with multiple pseudonyms, which significantly simplifies key management.
We believe our approach satisfies the security requirements of mobile users and can help restore their confidence in location-based services
TIME AND SPACE COMPLEXITY ANALYSIS OF RSA AND ELGAMAL CRYPTOGRAPHIC ALGORITHMS ON MIXED DATA
The complexity study of algorithms, especially computationally intensive ones is of great
significance in the field of complexity. Cryptographic algorithms are considered to be
computationally intensive because they utilize a substantial number of computational
resources, such as CPU memory and processing time. Cryptographic algorithms provide a
solution to the security of data transmission whereby ensuring integrity, confidentiality and
authentication of any form of data. However, there are still challenges of which
cryptographic algorithms are suitable in terms of computation speed and memory usage.
Whereas, a good number of research efforts have been put into experimenting on the
complexities of the cryptographic algorithm on text, image and audio data, little has been
done on video data. In this study, the time and space complexity of RSA and ElGamal
cryptographic algorithms on mixed data was carried out. RSA and ElGamal cryptographic
algorithms was implemented using C-sharp (C#) programming language to encrypt and
decrypt text, image, audio and video dataset. In achieving the objectives of the study, both
the implemented algorithms (RSA and ElGamal) are depicted using pseudocodes and
flowcharts, while some of the datasets used were sourced from various online repositories.
The time complexities of each dataset was obtained using the CPU internal clock while the
space usage for each operations on each of the dataset was obtained using the computer
internal memory. Tables and graphs was used to carry out the comparative analysis of both
algorithms. The time and space complexity of RSA and ElGamal algorithms were
experimented on text, image, audio and video dataset. The experimental results revealed
that RSA outperformed ElGamal in terms of computational time during encryption of all
categories of data. ElGamal outperformed RSA in terms of computational time during decryption of all categories of data. ElGamal algorithm outperformed RSA in terms of
memory usage during encryption of all categories of data while both algorithms used
relatively the same amount of space during decryption of all categories of data used. Based
on the comparative analysis of the time and space complexity on both RSA and ElGamal
algorithms, it was discovered that RSA is a better algorithm when it comes to time
complexity, that is, RSA can be said to be a time-efficient algorithm. ElGamal algorithm
performed better than RSA in the memory usage aspect, therefore the ElGamal algorithm
is said to be a memory-efficient algorithm. Therefore, this study hereby recommend that
other measurement metrics may be used to compare both algorithms in future works
Naval Reserve support to information Operations Warfighting
Since the mid-1990s, the Fleet Information Warfare Center (FIWC) has led the Navy's Information Operations (IO) support to the Fleet. Within the FIWC manning structure, there are in total 36 officer and 84 enlisted Naval Reserve billets that are manned to approximately 75 percent and located in Norfolk and San Diego Naval Reserve Centers. These Naval Reserve Force personnel could provide support to FIWC far and above what they are now contributing specifically in the areas of Computer Network Operations, Psychological Operations, Military Deception and Civil Affairs. Historically personnel conducting IO were primarily reservists and civilians in uniform with regular military officers being by far the minority. The Naval Reserve Force has the personnel to provide skilled IO operators but the lack of an effective manning document and training plans is hindering their opportunity to enhance FIWC's capabilities in lull spectrum IO. This research investigates the skill requirements of personnel in IO to verify that the Naval Reserve Force has the talent base for IO support and the feasibility of their expanded use in IO.http://archive.org/details/navalreservesupp109451098
- âŠ