1,436 research outputs found
Recommended from our members
ENHANCING CYBERSECURITY FOR UNMANNED SYSTEMS: A COMPREHENSIVE LITERATURE REVIEW
This culminating experience project addresses the pressing cybersecurity challenges encountered by unmanned autonomous vehicles. The research provides a comprehensive literature review on how hybrid encryption techniques can improve the security of its communication systems. The chosen research questions guiding this study are: (Q1) How can we enhance cybersecurity measures to safeguard the communication and transmission of sensitive data from unmanned systems, thereby preventing unauthorized access by malicious actors? (Q2) How can we ensure the confidentiality and integrity of messages exchanged with unmanned systems to a command-and-control center operating on the tactical edge? (Q3) How can hybrid encryption tackle the consumption problem of substantial processing power required for encrypting and transmitting data in unmanned systems?
The findings are: Q1. hybrid security strategy ensures strong communication integrity and safeguards against malicious interception in operations involving unmanned systems; Q2. lightweight cryptographic algorithms and hybrid encryption methods specifically designed for unmanned systems efficiently protect both the confidentiality and integrity of messages while optimizing computational resources; Q3. when using hybrid encryption, unmanned systems can effectively manage power consumption while maintaining robust data security protocols. The conclusions are: Q1. combining symmetric encryption for efficient data handling with asymmetric encryption for secure key exchange significantly enhances data confidentiality, integrity, and overall security. Q2. end-to-end encryption, secure key management, and authenticated encryption mechanisms within a hybrid encryption framework reduce risks associated with interception, tampering, and unauthorized access via unmanned systems. Q3. integrating efficient algorithm selection, optimized key management, resource-aware encryption, and dynamic key generation methods, can address power consumption concerns. Future research directions should include deeper exploration of hybrid encryption practices within unmanned systems to advance understanding in the realm of communication systems for autonomous vehicles
Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography
The research paper titled "Hybrid Data Encryption as well as Decryption Using Hybrid RSA and DNA" develops a hybrid cryptosystem by combining the usefulness of such an asymmetric-key (public-key) cryptosystem with the efficacy of a symmetric-key (private-key) cryptosystem. These two types of cryptosystems use different types of keys. The method addresses concerns regarding the users' right to privacy, authentication, and accuracy by utilizing a data encryption process that is secure in both directions. Both the process of encrypting data and the process of decrypting data, which are both utilized by the system, are two different encryption methods. It has been suggested that a hybrid encryption algorithm, which combines DNA and RSA, be used for file encryption in order to address the issues with efficiency and security. The results of the testing show that the RSA and DNA hybrid encryption algorithm is suitable for use. In this particular research project's hybrid encryption and decoding for cloud processing with IOT devices, the DNA and RSA algorithms were used
ENCRYPTION ALGORITHMS FOR DATABASES
For most cases, people use an ecrypted mode when sending personal information to a server, via an electronic form. Whenever shopping is done online, the browser uses cryptographic methods to send to the server the credit card number and private information. Thanks to the surprising development of the Internet, and not to the structural models (OSI and TCP/IP) this technology is based on, the electronic commerce requires quality, security, reliability and, above all, the possibility of implementing all such concepts. It is interesting that none of the widely used cryptographic systems is mathematically demonstrated to be safe. As a matter of fact, the entire technology of cryptography is based on mathematical problems that are still unanswered to.Looking at the above, the study of the cryptographic and security methods, as well as finding strong crypto-systems is still a pivotal issue.encryption algorithms; database security; crypto-graphically; cipher
Recommended from our members
Method and apparatus for hybrid encryption
Described herein is a combination of mixed-signal hardware and software that is capable or realizing hybrid chaotic oscillators that can be tuned digitally. This includes the type/class of chaotic oscillator, initial conditions, nonlinear elements, thresholds, nonlinear event surfaces, delays, etc. At the same time, tunable methods of how to use the chaotic oscillator information to encrypt and decrypt both analog and digital information is presented. This will make the secure information not vulnerable by digital information compromises or hardware breach.Board of Regents, University of Texas Syste
A Combination of Vigenere Cipher and Advanced Encryption Standard for Image Security
In an era where digital information security is paramount, this research addresses the pressing need for robust encryption methods. We propose a novel approach that combines the Vigenere Cipher and the Advanced Encryption Standard (AES) for secure digital image transmission. Our study recognizes the research gap in secure image transmission methods and aims to bridge it with a powerful encryption solution. We implement this hybrid encryption approach using the Vigenere Cipher in C++ and the AES algorithm in MATLAB. Our experiments validate the effectiveness of our program in concealing and restoring digital images during transmission. This hybrid encryption technique has promising applications in healthcare, military, and confidential business operations, bolstering image security in real-life scenarios. By enhancing image security, our research can contributed to safeguarding sensitive information in the digital ag
- …