405 research outputs found

    Sécurité des données de capteurs ambiants dans les habitats à l’aide d’autoencodeurs

    Get PDF
    Dans ce mémoire, nous visons à implémenter un prototype d’algorithme de cryptographie basé sur les réseaux de neurones. Dans le cadre des travaux sur la reconnaissance d’activités au sein d’habitats intelligents opérés par le LIARA (Laboratoire d’Intelligence Ambiante pour la Reconnaissance d’Activités), une attention est portée de plus en plus sur la protection de la vie privée des individus. En effet pendant longtemps, on a eu affaire à des données de capteurs simples comme les tapis de pressions, les détecteurs électromagnétiques, les détecteurs de mouvement. Comme ces données ne permettent pas d’avoir accès à des informations génériques basiques sur ce qui se déroulait au sein des murs des résidences suivies, l’aspect sécurité occupait une petite place dans les travaux. Dans le cadre d’un projet de déploiement à grande échelle de maisons intelligentes financé par MEDTEQ (le Consortium pancanadien de recherche industrielle et d’innovation en technologies médicales du Québec) et Age-Well (un réseau canadien visant à élaborer des technologies et des services pour le vieillissement en santé) notre équipe explore l’utilisation des réseaux de neurones pour sécuriser les données transmises entre les maisons intelligentes et les serveurs de traitement de données. Afin de bien comprendre nos besoins, il est important de poursuivre cette question cruciale en parallèle avec une étude du potentiel des réseaux de neurones pour remplacer la cryptographie traditionnelle dans l’encodage de données plus complexes. En effet, ces derniers temps, nous avons étudié des capteurs plus informatifs tels que les caméras thermiques, les caméras de profondeurs, les capteurs RFID et les radars à ultra large bande. Ces capteurs ont plus d’informations sur les activités qui se déroulent dans une résidence, mais ils impliquent une plus grande charge de traitement. En conséquence, il semble donc intéressant d’étudier la possibilité d’utiliser une architecture de réseau de neurones artificiels pour encoder localement les données et les décoder à distance afin d’augmenter la sécurité, de réduire les calculs supplémentaires et de diminuer la taille des données à transmettre. En somme, cette étude portera sur l’étude comparative de ces encodages au sein d’habitats intelligents et consistera à mettre en place un système d’encodage de données fonctionnel basé sur des autoencodeurs

    CS 608: Cryptography and Security

    Get PDF

    Cryptography: Recent Advances and Research Perspectives

    Get PDF
    Cryptography is considered as a branch of both mathematics and computer science, and it is related closely to information security. This chapter explores the earliest known cryptographic methods, including the scytale, Caesar cipher, substitution ciphers, and transposition ciphers. Also, explains the evolution of these methods over time. The development of symmetric and asymmetric key cryptography, hash functions, and digital signatures is also discussed. The chapter highlights major historical events and technological advancements that have driven the need for stronger and more efficient encryption methods. In addition, the chapter explores the potential for integrating artificial intelligence tools with cryptographic algorithms and the future of encryption technology

    Cryptographic Interweaving of Messages

    Get PDF
    During the past several decades, the information and communication technology sector has advanced significantly, enabling extensive information interchange over the internet, including message sharing and electronic transactions. These days, the main issue is how to transmit information securely. From ancient times, there has been interest in the field of cryptography research. A masterwork of cryptography is Muni Kumudendu's original work, Siribhoovalaya. His study served as the basis for the method suggested in this publication. Several messages can be sent using different keys utilising a single matrix. Encryption uses a variety of matrix traversal techniques, making it challenging for cryptanalysis to map the plaintext and ciphertext

    Basics Of Cryptography

    No full text
    Ovaj rad opisuje neke od poznatijih kriptosustava. Mnoge povijesne ličnosti poput kraljice Marije Stuart koristili su šifre, što je opisano u uvodnom dijelu. Također, opisana je i definicija kriptosustava te osnovni pojmovi koji su korišteni u cijelom radu. U glavnom dijelu opisane su monoalfabetske Cezarova i afina šifra te polialfabetska Vigenèreova šifra. Također, opisana je i blokovna Playfairova te poligramska Hillova šifra. Pojam savršene sigurnosti uveden je kroz jednokratnu bilježnicu. Stupčana transpozicija i šifriranje rešetkom opisani su u posljednjem poglavljuIn this paper, we describe some of the better known cryptosystems. Many historical figures such as Queen Mary Stuart used ciphers, which is described in the introduction. Also, the definition of a cryptosystem and the basic terms used throughout the paper are described. In the main part, the monoalphabetic Caesar and Affine ciphers and the polyalphabetic Vigenère cipher are described. Also, the block Playfair cipher and the polygram Hill cipher are described. The concept of perfect security was introduced through a One-Time Pad. Columnar transposition and rail fence cipher are described in the last chapter

    Integrasi Seni Kuno dan Tantangan Enkripsi Modern melalui Kajian Ulang Teknik Kriptanalisis Al-Kindi

    Get PDF
    This study aims to review the cryptanalysis techniques introduced by Al-Kindi, an ancient cryptographic figure, by relating them to the modern encryption challenges faced today. The method used involves an analysis of the literature on Al-Kindi's works which are relevant in cryptanalysis, such as “Risalah al-Mu'atabarah". In addition, the ancient cryptanalysis techniques introduced by Al-Kindi are also analyzed in the context of complex modern encryption challenges. The results of this study indicate that the cryptographic principles proposed by Al-Kindi, such as the substitution method, the transposition method, and the need for a strong secret key, still have relevance in overcoming modern encryption challenges. The method of substitution and transposition introduced by Al-Kindi can be adapted in letter frequency analysis and structural analysis to decode complex codes. The principle of needing a strong secret key also remains important in protecting data and communications in the modern digital era. The cryptographic principles introduced by Al-Kindi can be applied in overcoming the complexity of the current encryption system. This research provides new insights into how to apply ancient cryptographic principles to crack complex codes and improve information security in the ever-evolving digital age

    2010 GREAT Day Program

    Get PDF
    SUNY Geneseo’s Fourth Annual GREAT Day. This file has a supplement of three additional pages, linked in this record.https://knightscholar.geneseo.edu/program-2007/1004/thumbnail.jp

    NEW HIDING TECHNIQUE IN DIGITAL SIGNATURE BASED ON ZIGZAG TRANSFORM AND CHAOTIC MAPS

    Get PDF
    Abstract This paper presents a novel approach to digital signature by integrating the ElGamal or Schnorr digital signature algorithms, chaotic systems, and scanning techniques. Briefly, ZZBCRP is a zigzag transformation that is used firstly to construct a permuted transaction, which technique starts from any random position and intersects in both directions, which is more complex than zigzag transform techniques. Then using ElGamal or Schnorr signature schemes based on chaotic maps. This modification aims to make private key and random number dependent on discrete chaotic maps. Even if the private key chosen is small, it is easy by using the huge amount of points in chaotic maps 2-D or 3-D to extract strong and unique key. This change complicates the relationship between the private key, public key and the transaction signature. A two-dimensional trigonometric discrete chaotic map is used that integrated Logistic-sine-cosine maps, and a three-dimensional hyperchaotic map (3-D SCC) which are based on a sine map. Our performance analysis shows that compared to schemes; this scheme not only improves the level of efficiency but also assures safety. The performance analysis shows that our scheme is not only more efficient compared to other related systems, but also safer

    Information Security Using DNA Sequences

    Get PDF
       يعد أمن المعلومات من المواضيع المهمة، ويرجع ذلك أساسًا إلى النمو الهائل في استخدام الإنترنت على مدى السنوات القليلة الماضية. نتيجة لهذا النمو، كانت هناك حالات وصول غير مصرح به، والتي تم تقليلها بفضل "استخدام مجموعة من بروتوكولات الاتصال الآمن، مثل التشفير وإخفاء البيانات". باستخدام القدرات الجزيئية الحيوية للحمض النووي، ازداد استخدام الحمض النووي كناقل للتشفير وإخفاء البيانات في السنوات الأخيرة. أثار إدراك أن الحمض النووي قد يعمل كوسيط نقل أثار هذه الحركة. في هذه الدراسة، نفحص أولاً ونلخص بإيجاز تطور نظام ترميز الحمض النووي الحالي. بعد ذلك، يتم تصنيف الطرق العديدة التي تم بها استخدام الحمض النووي لتحسين تقنيات التشفير. تمت مناقشة مزايا وعيوب هذه الخوارزميات وأحدث التطورات في تقنيات التشفير القائم على الحمض النووي. أخيرًا، نقدم أفكارنا حول المستقبل المحتمل لخوارزميات التشفير القائمة على الحمض النووي.Information security is a significant cause for concern, mainly because of the explosive growth in internet usage over the last few years. Due to this growth, there have been occurrences of unauthorized access, which have been reduced thanks to “using a range of secure communication protocols, such as encryption and data concealment”. Using DNA's bio-molecular capabilities, the usage of DNA as a carrier for encryption and data concealing has increased in recent years. The realization that DNA may function as a transport medium sparked this movement. In this study, we first examine and briefly outline the evolution of the present DNA coding system. After that, the several ways DNA has been used to enhance encryption techniques are categorized. The benefits and drawbacks of these algorithms and the most recent advancements in DNA-based encryption techniques are discussed. Finally, we provide our thoughts on the potential future of DNA-based encryption algorithms. &nbsp
    corecore