90 research outputs found

    Enhancing quantum entropy in vacuum-based quantum random number generator

    Full text link
    Information-theoretically provable unique true random numbers, which cannot be correlated or controlled by an attacker, can be generated based on quantum measurement of vacuum state and universal-hashing randomness extraction. Quantum entropy in the measurements decides the quality and security of the random number generator. At the same time, it directly determine the extraction ratio of true randomness from the raw data, in other words, it affects quantum random numbers generating rate obviously. In this work, considering the effects of classical noise, the best way to enhance quantum entropy in the vacuum-based quantum random number generator is explored in the optimum dynamical analog-digital converter (ADC) range scenario. The influence of classical noise excursion, which may be intrinsic to a system or deliberately induced by an eavesdropper, on the quantum entropy is derived. We propose enhancing local oscillator intensity rather than electrical gain for noise-independent amplification of quadrature fluctuation of vacuum state. Abundant quantum entropy is extractable from the raw data even when classical noise excursion is large. Experimentally, an extraction ratio of true randomness of 85.3% is achieved by finite enhancement of the local oscillator power when classical noise excursions of the raw data is obvious.Comment: 12 pages,8 figure

    Performance Evaluation of NTRU Algorithm on Cloud Network on an Android Platform

    Get PDF
    Cloud computing is Internet based computing where virtual shared servers provide software, infrastructure, platform, devices and other resources and hosting to computers on a pay - as - you - use basis. Users can access these services available on the "internet cloud" without having any previous knowledge on managing the resources involved. To provide the security to the clo ud network and data, different encryption methods are used. Encryption is the process of encoding messages in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. The numbers of algorithms are used for encryption and decryption for cloud network. In this paper NTRU algorithm is implemented on cloud network using an android platform. This paper shows results of parameters like Encryption Time, Decryption Time and throughput when NTRU, a public key encryption algorithm is implemented on cloud network for an android platform

    Implementation of Image Encoding Based on RGB and ARGB

    Get PDF
    The study focuses on pixels while doing the process of implementation of image encoding. However, pixels can have enough power to protect the image and save the copyright of it. Images are nothing but set of pixels, each pixel can be considered as a box holding the colors' codes in a known sequence. Modifying those codes is kind of encoding. This study emphasizes the coding technique, the RIJNDAEL encryption and watermarking images

    Perancangan Dan Pembuatan Pengamanan Video Chat Dengan Menggunakan Metode Enkripsi RC4

    Full text link
    Technological development at this time has been growing rapidly with the internet. Along with the development the more the usefulness of the Internet. Not only used for browsing, now the Internet is also used for communication. Such as email, chat, and etc. The increasing development of communication technology, then people start to think about the secure of the communication technology. As in a video chat, only the person entitled to know the information in the video chat. But the encryption process on existing processes such as blackbox said due to lack of transparency.Of these problems lead to the idea to make a video chat application that uses cryptographic security techniques. Data of video chat will be encrypted using RC4 method. Research shows when the data that has been encrypted can be displayed when password is correct. It shows when data that has been encrypted safer than the data that is not encrypted

    Ensuring telecommunication network security through cryptology: a case of 4G and 5G LTE cellular network providers

    Get PDF
    This paper aims to present the details regarding telecommunication network security through cryptology protocols. The data was based on scientific data collection and the quantitative method was adopted. The questionnaire was developed and the primary respondents were approached who were working in 4 telecommunication networking companies namely Huawei, Ericsson, SK Telecom and Telefonica. The sample size of the research was 60 participants and the statistical analysis was used to analyze research. The finding shows that cryptology protocol such as SSH, SSL, Kerberos PGP and SET are implemented within the companies in order to secure network

    WEARABLE MIXED REALITY SOLUTIONS FOR INDUSTRIAL PLANTS AND PRODUCTION LINES

    Get PDF
    In the present research project, the authors developed wearable and portable solutions capable to improve safety in production lines by taking advantages of availability of exhaustive and reliable data in modern industrial plants. Indeed, the synergy between Industry 4.0 and cutting edge devices, such as smartphones and headsets for Mixed Reality demonstrated to be potentially used to assist personnel on the shop floor, especially during critical and most dangerous operations. In this paper it is presented an ongoing project devoted to develop such support systems and to evaluate their efficiency in multiple industrial environments

    Generation of random latin squares step by step and graphically

    Get PDF
    In order to generate random Latin squares of order 256, the Jacobson and Matthews’ algorithm has been implemented in Java. Clear and efficient data structures (for squares and incidence cubes) have been modeled and the ±1-moves of their method have been implemented. This ensures that, in a polynomial number of steps (O(n3)), the algorithm finishes with a Latin square as a result that is approximately uniformly distributed. As an additional contribution to the subject, a step-by-step graphical generation using OpenGL (Open Graphic Library) is provided, which could be used to explain the algorithm, understand it or simply draw the resulting Latin squares as incidence cubes. The main goal of the present work is to document the implementation of the algorithm and make it public on the Internet, since no standard implementation is freely available.III Workshop de Seguridad Informática (WSI)Red de Universidades con Carreras de Informática (RedUNCI

    Use of Personal Rhythm to Authenticate Encrypted Messages

    Get PDF
    When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI)
    • …
    corecore