85 research outputs found

    A CCA2 secure Code based encryption scheme in the Standard Model

    Get PDF
    This paper proposes an encryption scheme secureagainst chosen cipher text attack, built on the Niederreiterencryption scheme. The security of the scheme is based on thehardness of the Syndrome Decoding problem and the Goppa CodeDistinguishability problem. The scheme uses the techniques providedby Peikert and Waters using the lossy trapdoor functions.Compared to the existing IND-CCA2 secure variants in standardmodel due to Dowsley et.al. and Freeman et. al. (using the repetition paradigm initiated by Rosen and Segev), this schemeis more efficient as it avoids repetitions

    Design and Implementation of a Secure Communication Protocol

    Get PDF
    The main object of this paper is to present a mutual authentication protocol that guarantees security, integrity and authenticity of messages, transferred over a network system. In this paper a symmetric key cryptosystem, that satisfies all the above requirements, is developed using theorems of J.R. Chen, I.M. Vinogradov and Fermat and the decimal expansion of an irrational number

    A REVIEW ON SECURITY ENHANCEMENT THROUGH ANONYMOUS ROUTING IN MANET

    Get PDF
    Mobile Ad Hoc Network(MANET) is an infrastructure less network. Any node may enter or leave network at anytime. MANET also has less resources and limited security. MANET is vulnerable to attacks because of its lack of centralized infrastructure. Security in MANET can be achieved by Anonymous routing which hide source, destinationand route information to provide. This paper provides a review on efficient anonymous routing protocols used in MANET and also compares the security in terms of identity, location and route anonymity. An anonymous routing protocol that conceals the essential details and satisfies the basic protocol properties has to be proposed

    Controlled Cloud Based SaaS Service Scheme to Denial the Hotspot Locating Attacks in Wireless Sensor Networks

    Get PDF
    The wireless sensor networks opponent can make use of the traffic informations to locate the monitored objects in Software as a service(Saas) , e.g., to identify the opponent soldiers. In this paper, we first define a hotspot phenomenon through SaaS and it causes an obvious inconsistency in the network traffic pattern due to the large volume of packets originating from a small area in Partial controlled cloud based scheme . Second, we develop a realistic opponent model, assuming that the opponent can monitor the network traffic in multiple areas, rather than the entire network or only one area. Using this model, Hotspot - Locating where the opponent uses traffic analysis techniques to locate hotspots. Finally, we propose a controlled cloud - based SaaS scheme for efficiently protecting against Hotspot - Locating attack by creating a controlled cloud with an irregular shape of fake traffic, inconsistency in the traffic pattern and camouflage the source node in the nodes for ming the controlled clou d . To reduce the energy cost, controlled cloud s are active only during data transmission and the intersection of controlled cloud s creates a larger merged controlled cloud , to reduce the number of fake packets and also boost preservation. Simulation and a nalytical results demonstrate that our scheme can provide stronger protection than routing - based schemes and requires much less energy than global - adversary schemes

    A KEY EXCHANGE PROTOCOL USING CONJUGACY PROBLEM IN THE DIVISION SEMIRINGS

    Get PDF
    In this article, we present a new key exchange protocol which works in the division semiring. We prove that the protocol meets the security of key establishment based on the conjugacy search problem and security attribute also discussed

    Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map with deoxyribonucleic acid sequence and its performance evaluation

    Get PDF
    The media content shared on the internet has increased tremendously nowadays. The streaming service has major role in contributing to internet traffic all over the world. As the major content shared are in the form of images and rapid increase in computing power a better and complex encryption standard is needed to protect this data from being leaked to unauthorized person. Our proposed system makes use of chaotic maps, deoxyribonucleic acid (DNA) coding and ribonucleic acid (RNA) coding technique to encrypt the image. As videos are nothing but collection of images played at the rate of minimum 30 frames/images per second, this methodology can also be used to encrypt videos. The complexity and dynamic nature of chaotic systems makes decryption of content by unauthorized personal difficult. The hybrid usage of chaotic systems along with DNA and RNA sequencing improves the encryption efficiency of the algorithm and also makes it possible to decrypt the images at the same time without consuming too much of computation power

    Reconfigurable Architecture for Elliptic Curve Cryptography Using FPGA

    Get PDF
    The high performance of an elliptic curve (EC) crypto system depends efficiently on the arithmetic in the underlying finite field. We have to propose and compare three levels of Galois Field , , and . The proposed architecture is based on Lopez-Dahab elliptic curve point multiplication algorithm, which uses Gaussian normal basis for field arithmetic. The proposed is based on an efficient Montgomery add and double algorithm, also the Karatsuba-Ofman multiplier and Itoh-Tsujii algorithm are used as the inverse component. The hardware design is based on optimized finite state machine (FSM), with a single cycle 193 bits multiplier, field adder, and field squarer. The another proposed architecture is based on applications for which compactness is more important than speed. The FPGA’s dedicated multipliers and carry-chain logic are used to obtain the small data path. The different optimization at the hardware level improves the acceleration of the ECC scalar multiplication, increases frequency and the speed of operation such as key generation, encryption, and decryption. Finally, we have to implement our design using Xilinx XC4VLX200 FPGA device
    • …
    corecore