18 research outputs found

    An Efficient Encryption System on 2D Sine Logistic Map based Diffusion

    Get PDF
    An optimal cryptographic model is proposed, enabling the feature of 2D sine logistic map-based diffusion algorithm. The 2D sine logistic map process is merged with the algorithm as it has the ability to provide random number generator as well as to overcome blank. The previous existing models based on image encryption use to work on raw images but without alteration for the process of confusion and diffusion. The main disadvantage as the nearby pixel values for an image always remains similar. This issue is resolved by a Pseudo random generator process which is based on key stream that alters pixel value. Furthermore 2D sine logistic map based diffusion process has shown an improvement in the key sensitivity and the complex relationships that use to get developed between cipher and test image.2D sine logistic map with diffusion method used to keep pixels intact with each other to such an extent as even a single bit modification in the intensity value of an original image pixel will lead to a huge change in most of the pixels of the cipher and thus makes the model very sensitive to make any changes in the pixel value or secret key for an image.  As seen and analyzed with a variety of test results that strategic model used for encryption can easily encrypt the plain image into a cipher of a random binary sequence

    Fault Attacks In Symmetric Key Cryptosystems

    Get PDF
    Fault attacks are among the well-studied topics in the area of cryptography. These attacks constitute a powerful tool to recover the secret key used in the encryption process. Fault attacks work by forcing a device to work under non-ideal environmental conditions (such as high temperature) or external disturbances (such as glitch in the power supply) while performing a cryptographic operation. The recent trend shows that the amount of research in this direction; which ranges from attacking a particular primitive, proposing a fault countermeasure, to attacking countermeasures; has grown up substantially and going to stay as an active research interest for a foreseeable future. Hence, it becomes apparent to have a comprehensive yet compact study of the (major) works. This work, which covers a wide spectrum in the present day research on fault attacks that fall under the purview of the symmetric key cryptography, aims at fulfilling the absence of an up-to-date survey. We present mostly all aspects of the topic in a way which is not only understandable for a non-expert reader, but also helpful for an expert as a reference

    Crowdfunding Non-fungible Tokens on the Blockchain

    Get PDF
    Non-fungible tokens (NFTs) have been used as a way of rewarding content creators. Artists publish their works on the blockchain as NFTs, which they can then sell. The buyer of an NFT then holds ownership of a unique digital asset, which can be resold in much the same way that real-world art collectors might trade paintings. However, while a deal of effort has been spent on selling works of art on the blockchain, very little attention has been paid to using the blockchain as a means of fundraising to help finance the artist’s work in the first place. Additionally, while blockchains like Ethereum are ideal for smaller works of art, additional support is needed when the artwork is larger than is feasible to store on the blockchain. In this paper, we propose a fundraising mechanism that will help artists to gain financial support for their initiatives, and where the backers can receive a share of the profits in exchange for their support. We discuss our prototype implementation using the SpartanGold framework. We then discuss how this system could be expanded to support large NFTs with the 0Chain blockchain, and describe how we could provide support for ongoing storage of these NFTs

    Fake Malware Generation Using HMM and GAN

    Get PDF
    In the past decade, the number of malware attacks have grown considerably and, more importantly, evolved. Many researchers have successfully integrated state-of-the-art machine learning techniques to combat this ever present and rising threat to information security. However, the lack of enough data to appropriately train these machine learning models is one big challenge that is still present. Generative modelling has proven to be very efficient at generating image-like synthesized data that can match the actual data distribution. In this paper, we aim to generate malware samples as opcode sequences and attempt to differentiate them from the real ones with the goal to build fake malware data that can be used to effectively train the machine learning models. We use and compare different Generative Adversarial Networks (GAN) algorithms and Hidden Markov Models (HMM) to generate such fake samples obtaining promising results

    Applications in Electronics Pervading Industry, Environment and Society

    Get PDF
    This book features the manuscripts accepted for the Special Issue “Applications in Electronics Pervading Industry, Environment and Society—Sensing Systems and Pervasive Intelligence” of the MDPI journal Sensors. Most of the papers come from a selection of the best papers of the 2019 edition of the “Applications in Electronics Pervading Industry, Environment and Society” (APPLEPIES) Conference, which was held in November 2019. All these papers have been significantly enhanced with novel experimental results. The papers give an overview of the trends in research and development activities concerning the pervasive application of electronics in industry, the environment, and society. The focus of these papers is on cyber physical systems (CPS), with research proposals for new sensor acquisition and ADC (analog to digital converter) methods, high-speed communication systems, cybersecurity, big data management, and data processing including emerging machine learning techniques. Physical implementation aspects are discussed as well as the trade-off found between functional performance and hardware/system costs

    Concurrency and static analysis

    Get PDF
    The thesis describes three important contributions developed during my doctoral course, all involving the use and the verification of concurrent Java code: Binary decision diagrams, or BDDs, are data structures for the representation of Boolean functions. These functions are of great importance in many fields. It turns out that BDDs are the state-of-the-art representation for Boolean functions, and indeed all real world applications use a BDD library to represent and manipulate Boolean functions. It can be desirable to perform Boolean operations from different threads at the same time. In order to do this, the BDD library in use must allow threads to access BDD data safely, avoiding race conditions. We developed a Java BDD library, that is fast in both single and multi-threaded applications, that we use in the Julia static program analyzer. We defined a sound static analysis that identifies if and where a Java bytecode program lets data flow from tainted user input (including servlet requests) into critical operations that might give rise to injections. Data flow is a prerequisite to injections, but the user of the analysis must later gage the actual risk of the flow. Namely, analysis approximations might lead to false alarms and proper input validation might make actual flows harmless. Our analysis works by translating Java bytecode into Boolean formulas that express all possible explicit flows of tainted data. The choice of Java bytecode simplifies the semantics and its abstraction (many high-level constructs must not be explicitly considered) and lets us analyze programs whose source code is not available, as is typically the case in industrial contexts that use software developed by third parties, such as banks. The standard approach to prevent data races is to follow a locking discipline while accessing shared data: always hold a given lock when accessing a given shared datum. It is all too easy for a programmer to violate the locking discipline. Therefore, tools are desirable for formally expressing the locking discipline and for verifying adherence to it. The book Java Concurrency in Practice (JCIP) proposed the @GuardedBy annotation to express a locking discipline. The original @GuardedBy annotation was designed for simple intra-class synchronization policy declaration. @GuardedBy fields and methods are supposed to be accessed only when holding the appropriate lock, referenced by another field, in the body of the class (or this). In simple cases, a quick visual inspection of the class code performed by the programmer is sufficient to verify the synchronization policy correctness. However, when we think deeper about the meaning of this annotation, and when we try to check and infer it, some ambiguities rise. Given these ambiguities of the specification for @GuardedBy, different tools interpret it in different ways. Moreover, it does not prevent data races, thus not satisfying its design goals. We provide a formal specification that satisfies its design goals and prevents data races. We have also implemented our specification in the Julia analyzer, that uses abstract interpretation to infer valid @GuardedBy annotations for unannotated programs. It is not the goal of this implementation to detect data races or give a guarantee that they do not exist. Julia determines what locking discipline a program uses, without judging whether the discipline is too strict or too lax for some particular purpose

    Pertanika Journal of Science & Technology

    Get PDF

    Sensors and Systems for Indoor Positioning

    Get PDF
    This reprint is a reprint of the articles that appeared in Sensors' (MDPI) Special Issue on “Sensors and Systems for Indoor Positioning". The published original contributions focused on systems and technologies to enable indoor applications

    Appropriate Wisdom, Technology, and Management toward Environmental Sustainability for Development

    Get PDF
    The protection and maintenance of environmental resources for future generations require responsible interaction between humans and the environment in order to avoid wasting natural resources. According to an ancient Native American proverb, “We do not inherit the Earth from our ancestors; we borrow it from our children.” This indigenous wisdom has the potential to play a significant role in defining environmental sustainability. Recent technological advances could sustain humankind and allow for comfortable living. However, not all of these advancements have the potential to protect the environment for future generations. Developing societies and maintaining the sustainability of the ecosystem require appropriate wisdom, technology, and management collaboration. This book is a collection of 19 important articles (15 research articles, 3 review papers, and 1 editorial) that were published in the Special Issue of the journal Sustainability entitled “Appropriate Wisdom, Technology, and Management toward Environmental Sustainability for Development” during 2021-2022.addresses the policymakers and decision-makers who are willing to develop societies that practice environmental sustainability, by collecting the most recent contributions on the appropriate wisdom, technology, and management regarding the different aspects of a community that can retain environmental sustainability

    Achieving Social and Economic Development Through Ecological and Organic Agricultural Alternatives

    Get PDF
    The third edition of the continental conference (3AOC) is holding in Nigeria October 5 – 9, 2015 with the theme “Achieving Social and Economic Development Through Ecological and Organic Agricultural Alternatives”. This conference is coming up in the continent when the call for need to improve rural livelihoods of Africans is becoming louder by the day. A veritable tool through which the livelihood of an average African can be improved is Organic Agriculture because it has an inherent potential to reduce production costs regularly incurred by small-medium scale farmers (principal actors in African agriculture), reduce debts, increase income, mitigate the vagaries of climate change, cope with market fluctuations, sustain soil fertility, minimize health hazards etc. It is envisaged that the 3AOC will provide an excellent platform to exchange ideas on the role ecological and organic agricultural alternatives can play in achieving social and economic development in the continent. The 3AOC scientific track is hereby documented as Book of Proceedings
    corecore