166 research outputs found

    Preserving the confidentiality of digital images using a chaotic encryption scheme

    Get PDF
    Confidentiality of digital images is an important requirement for many multimedia applications and services. To maintain confidentiality, encryption of digital images is essential. Digital images are usually very large and encrypting such bulky data induces many performance overheads, which can be too expensive for real-time applications in resource constrained environments. In this paper, we propose a chaotic image encryption scheme which satisfies the need for both light-weightedness and security. To justify the security and efficiency, the new cipher was evaluated using a series of statistical tests. These tests included a visual testing and a histogram analysis, a randomness analysis, a correlation analysis, an entropy analysis and an image encryption quality analysis. Based on all analyses and experimental results, it is concluded that the proposed scheme is effective, efficient and trustworthy and therefore can be adopted for image encryption

    A dynamic data encryption method based on addressing the data importance on the internet of things

    Get PDF
    The rapid growth of internet of things (IoT) in multiple areas brings research challenges closely linked to the nature of IoT technology. Therefore, there has been a need to secure the collected data from IoT sensors in an efficient and dynamic way taking into consideration the nature of collected data due to its importance. So, in this paper, a dynamic algorithm has been developed to distinguish the importance of data collected and apply the suitable security approach for each type of data collected. This was done by using hybrid system that combines block cipher and stream cipher systems. After data classification using machine learning classifiers the less important data are encrypted using stream cipher (SC) that use rivest cipher 4 algorithm, and more important data encrypted using block cipher (BC) that use advanced encryption standard algorithm. By applying a performance evaluation using simulation, the proposed method guarantees that it encrypts the data with less central processing unit (CPU) time with improvement in the security over the data by using the proposed hybrid system

    Implementing and Evaluating Nonsingular Matrices Generators for the Hill Cipher

    Get PDF
    A Cifra de Hill (Hill Cipher) é um exemplo clássico de um sistema criptográfico com propriedades muito interessantes, nomeadamente a implementação dos conceitos de confusão e difusão apresentados por Shannon como propriedades essenciais para as cifras; no entanto, a sua forma básica é vulnerável a Known Plaintext Attacks (KPAs). [...]Hill Cipher is a classical example of a cryptosystem with interesting properties, namely that it implements the diffusion and confusion concepts coined by Shannon as essential properties for ciphers; nonetheless, its basic form is vulnerable to KPAs. [...

    Data Reduction by Huffman Coding and Encryption by Insertion of Shuffled Cyclic Redundancy Code

    Get PDF
    Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information under difficult circumstances. It uses mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. The encryption here mainly of two types. They are private and public key cryptography

    Técnicas de segurança para a internet das coisas

    Get PDF
    Mestrado em Engenharia de Computadores e TelemáticaIoT assume que dispositivos limitados, tanto em capacidades computacionais como em energia disponível, façam parte da sua infraestrutura. Dispositivos esses que apresentam menos capacidades e mecanismos de defesa do que as máquinas de uso geral. É imperativo aplicar segurança nesses dispositivos e nas suas comunicações de maneira a prepará-los para as ameaças da Internet e alcançar uma verdadeira e segura Internet das Coisas, em concordância com as visões atuais para o futuro. Esta dissertação pretende ser um pequeno passo nesse sentido, apresentando alternativas para proteger as comunicações de dispositivos restritos numa perspetiva de performance assim como avaliar o desempenho e a ocupação de recursos por parte de primitivas criptográficas quando são aplicadas em dispositivos reais. Dado que a segurança em diversas ocasiões tem de se sujeitar aos recursos deixados após a implementação de funcionalidades, foi colocada uma implementação de exposição de funcionalidades, recorrendo ao uso de CoAP, num dispositivo fabricado com intenção de ser usado em IoT e avaliada de acordo com a sua ocupação de recursos.IoT comprehends devices constrained in both computational capabilities and available energy to be a part of its infrastructure. Devices which also present less defense capabilities and mechanisms than general purpose machines. It’s imperative to secure such devices and their communications in order to prepare them for the Internet menaces and achieve a true and secure Internet of Things compliant with today’s future visions. This dissertation intends to be a small step towards such future by presenting alternatives to protect constrained device’s communications in a performance related perspective as well as benchmarks and evaluation of resources used by cryptographic primitives when implemented on real devices. Due to security being on multiple occasions subjected to the resources available only after functionalities implementation, a minimalist implementation of functionalities exposure through the use of CoAP was also deployed in an IoT intended device and assessed according to resource overhead

    Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG

    Get PDF
    SNOW-3G is a stream cipher used by the 3GPP standards as the core part of the confidentiality and integrity algorithms for UMTS and LTE networks. This paper proposes an enhancement of the regular SNOW-3G ciphering algorithm based on HC-PRNG. The proposed cipher scheme is based on hyperchaotic generator which is used as an additional layer to the SNOW-3G architecture to improve the randomness of its output keystream. The objective of this work is to achieve a high security strength of the regular SNOW-3G algorithm while maintaining its standardized properties. The originality of this new scheme is that it provides a good trade-off between good randomness properties, performance, and hardware resources. Numerical simulations, hardware digital implementation, and experimental results using Xilinx FPGA Virtex technology have demonstrated the feasibility and the efficiency of our secure solution while promising technique can be applied to secure the new generation mobile standards. Thorough analysis of statistical randomness is carried out demonstrating the improved statistical randomness properties of the new scheme compared to the standard SNOW-3G, while preserving its resistance against cryptanalytic attacks

    A proposed lightweight image encryption using ChaCha with hyperchaotic maps

    Get PDF
    Image encryption plays a pivotal rule in enhancing telecommunications media. Since Privacy is necessary in our daily life in many areas, the personal image will be encrypted when it sent it over the Internet to the recipient to maintain privacy issue. In this paper, the image is encrypted using ChaCha symmetric stream cipher with Hyperchaotic Map. Due to the sensitivity characteristics of initial conditions, pseudo randomness chaotic maps and control parameters in chaotic, Hyperchaotic maps is use, higher security is obtained via using initial seed number, variance of parameters, and unpredictable direction of chaotic. The suggested lightweight image encryption has confirmed robustness contra brute force attacks by providing a massive key space. Furthermore, the suggested lightweight image encryption is eligible to defense from statistical cracking, insecurity of image based on criteria's histogram correlation and entropy

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box

    Get PDF
    The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. BA key varies from 32 to 448 bits to ensure a high level of security. However, the substitution box (S-Box) in BA occupies a high percentage of memory and has problems in security, specifically in randomness of output with text and image files that have large strings of identical bytes. Thus, the objective of this research is to enhance the BA to overcome these problems. The research involved three phases, algorithm design, implementation, and evaluation. In the design phase, a dynamic 3D S-Box, a dynamic permutation box (P-Box), and a Feistal Function (F-Function) were improved. The improvement involved integrating Cylindrical Coordinate System (CCS) and dynamic P-Box. The enhanced BA is known as Ramlan Ashwak Faudziah (RAF) algorithm. The implementation phase involved performing key expansion, data encryption, and data decryption. The evaluation phase involved measuring the algorithm in terms of memory and security. In terms of memory, the results showed that the RAF occupied 256 bytes, which is less than the BA (4096 bytes). In terms of randomness of text and image files that have large strings of identical bytes, the average rate of randomness for 188 statistical tests obtained values of more than 96%. This means that the RAF has high randomness indicating that it is more secured. Thus, the results showed that the RAF algorithm that integrates the CCS and dynamic P-Box serves as an effective approach that can consume less memory and strengthen security

    ФОРМУВАННЯ ДАТАСЕТУ КРИПТОАЛГОРИТМІВ ДЛЯ ЗАБЕЗПЕЧЕННЯ КОНФІДЕНЦІЙНОСТІ ДАНИХ, ЯКІ ПЕРЕДАЮТЬСЯ З РОЗВІДУВАЛЬНО-ПОШУКОВОГО БПЛА

    Get PDF
    The rapid development of unmanned aerial vehicles (UAV) has significantly changed the conduct of military operations and warfare strategies, offering numerous advantages in terms of intelligence, surveillance and combat capabilities. The use of UAV in the military sphere provides more complete situational awareness, operational efficiency and reduces risks to personnel. In addition, in the field of intelligence and surveillance, UAV have revolutionized the context of intelligence gathering. Equipped with the latest image processing systems, sensors and high-resolution cameras, they can conduct real-time aerial photography, monitor enemy activity and gather critical intelligence without putting the military at risk. UAV make it possible to conduct long-term operations in conditions of secrecy, providing commanders with valuable information for making strategic decisions. However, the issue of ensuring the confidentiality of critical data collected using UAV remains unresolved. With this in mind, in this paper universal dataset of cryptographic algorithms was created, it uses a neural network to select the optimal encryption algorithm. To form such a dataset, it was necessary to evaluate the speed of the crypto algorithms, their cryptographic security and other parameters. The developed dataset in synthesis with a neural network can be used to select the optimal crypto algorithm depending on the operating conditions. In further research, the authors plan to determine the criteria for using the generated dataset by neural networks and develop a knowledge base for neural network training.Швидкий розвиток безпілотних літальних апаратів (БПЛА) суттєво змінив проведення військових операцій та стратегії ведення війни, пропонуючи численні переваги з точки зору розвідки, спостереження та бойових можливостей. Використання БПЛА у військовій сфері забезпечує більш повну обізнаність про ситуацію, оперативну ефективність і знижує ризики для персоналу. Окрім цього, у сфері розвідки та спостереження БПЛА зробили революцію у контексті збирання розвідувальних даних. Обладнані новітніми системами обробки зображень, давачами та камерами високої роздільної здатності, вони можуть здійснювати аерофотозйомку в реальному часі, стежити за діяльністю противника та збирати важливі розвідувальні дані, не наражаючи військових на небезпеку. БПЛА дають можливість проводити довготривалі операції в умовах секретності, надаючи командирам цінну інформацію для прийняття стратегічних рішень. Проте, залишається не вирішеним питання забезпечення конфіденційності критичних даних, зібраних за допомогою БПЛА. З огляду на це, у роботі було сформовано універсальний датасет криптографічних алгоритмів, що використовує нейронну мережу для вибору оптимального алгоритму шифрування. Для формування такого датасету необхідно було оцінити швидкість роботи алгоритмів, їх криптостійкість та інші параметри. Розроблений датасет у синтезі з нейронною мережею може використовуватись для вибору оптимального криптоалгоритму залежно від умов функціонування. У подальших дослідженнях авторами планується визначити критерії застосування сформованого датасету нейронними мережами та розробити базу знань для навчання нейронної мережі
    corecore