4 research outputs found
Cloud Data Security using Elliptical Curve Cryptography
Internet today is seeing a touchy development because of expanded use. In any case, it is helpless against eavesdropping which represents a risk to privacy and security of the client. The security of data traffic winds up plainly vital since the communications over open network happen frequently. It is along these lines basic that the data traffic over the system is encrypted. Since the wireless and wired IP networks are defenseless against eavesdropping, cryptographic plans are produced to secure the information transmitted in a network. To give the quality of service, the cloud computing security is the essential part of the cloud service providers. Nonetheless, cloud computing postures numerous new security challenges which have not been all around researched. This research work concentrating on issues identifying with the cloud data storage strategies and security in virtual condition. We propose a technique for giving data storage and security in cloud utilizing Elliptical Curve Cryptography ECC. Encourage, depicts the security services incorporates generation of key, encryption and decryption in virtual condition
Hybrid Image Steganography Method with Random Embedding of Encrypted Message
The main challenge for embedding encrypted message in an input image is to get better the security of the confidential information through hybrid-based image steganography method. Moreover, earlier LSB based solutions existed in which either secret information embedded without encryption or embedded un-randomly in an image and existing MSB based information concealing solutions minimizes information capacity and image quality too. Most of existing steganographic systems either based on LSB or MSB but only some hybrid solutions are available in which either the confidential message is not encoded before embedding it into the image and the embedding system is also not random based. The existing well known hybrid based image steganography techniques are not only deficient in performance but also deficient in embedding of encoded data in an image. To overcome these issues, a Hybrid-LSB-MSB based image steganography and multi-operation data encryption method is proposed in this article. Proposed method is not only randomly embeds the confidential information in a cover image but also provided the facility to encode the confidential information before substituting. The Hybrid-LSB-MSB based proposed image steganography method is compared with earlier Hybrid based image steganography method by using Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR) values including payload capacity. Higher PSNR and Lower MSE values signify effective steganography quality. The experimental results show that proposed method retains higher PSNR and lesser MSE values as contrasted to the existing methods thereby effective in steganographic properties.  
Algorytmy metaheurystyczne w kryptoanalizie szyfrów strumieniowych
Metaheuristic algorithms are general algorithms allowing to solve various types of computational
problems, usually optimization ones. In the dissertation, new versions of selected
metaheuristic algorithms were developed: Tabu Search and Ant Colony Optimization algorithms.
They have been adapted to solve the problem of cryptanalysis of stream ciphers, which
are an important element of data protection processed and stored in information systems.
Attempts to hide information from unauthorized persons have a long history. As early as
the 5th century BC there was a simple Atbash substitution cipher among the Hebrew scholars.
Although a lot has changed since then, and the art of encrypting information has undergone
a significant transformation, the issue of confidentiality of communication is still important.
Encryption is used wherever protection of transmitted or stored data, especially in information
systems, is of key importance. Encryption is used when talking on the phone or logging in via
the Internet to a bank account. It is also of great importance in the military. Encryption is an
issue with a long history, still important and topical.
The proposed Tabu Search and Ant Colony Optimization algorithms adapted to cryptanalysis
were tested using three stream ciphers: RC4, VMPC and RC4+. This enabled the development
of an attack independent of the design of the cipher itself, assuming that the internal state
of the cipher can be represented as a permutation of numbers from a given range.
For all proposed metaheuristic algorithms, four types of fitness functions have been tested,
three of which are original ones. The original fitness functions enabled achieving better results
for all three analysed metaheuristic algorithms compared to a function known from the
literature.
Each of the proposed algorithms were tested in terms of the impact of parameters values on
the results they achieved. Also the results achieved by all three metaheuristic algorithms were
compared to one another. The results obtained during cryptanalysis of smaller and full versions
of the analysed ciphers with the use of Tabu Search were compared with the results obtained
by other metaheuristic algorithms, showing that Tabu Search leads to better results than other
metaheuristics. The results obtained using the Tabu Search algorithm were also compared to
attacks known from the literature on selected stream ciphers. The results of the experiments
indicate that for the VMPC and RC4+ ciphers, the proposed cryptanalysis algorithm using Tabu
Search may be better than the cryptanalysis algorithms known so far. The results achieved by
other metaheuristic algorithms considered were not as good as for Tabu Search, although it
cannot be ruled out that further enhancement of these algorithms could improve the results
Contribuciones al establecimiento de una red global de sensores inalámbricos interconectados
Se ha considerado a este trabajo como un aporte al establecimiento de una red global de sensores donde los humanos (agentes inteligentes), y computadoras potentes interactúan con redes piloto de sensores inalámbricos, distinguiendo en la red global 3 subdominios:
• Una red superior existente, donde los distintos nodos ejecutan las aplicaciones en potentes computadoras que pueden interconectarse vÃa Internet u otras redes globales.
• Los dispositivos sensores que forman una red piloto y se comunican entre sà por medio inalámbrico.
• Un portal de servidores, formado por nodos que controlan las redes piloto, y permiten la interacción entre los nodos de la red superior y los dispositivos de la WSN.
Los temas a desarrollar en esta tesis son:
•Modelado y simulación: La simulación es utilizada para evaluar sistemas desarrollados y a implementar en redes reales. La utilidad de los datos obtenidos depende puramente del realismo y la precisión de los modelos a implementar.
Fundamentalmente se avanzan con simulaciones que simplifican la instalación de las WSNs.
•Entorno de desarrollo de aplicaciones: Necesario para la corrida de las simulaciones como también desarrollo de las aplicaciones a ser instaladas en los nodos fÃsicos existentes.
•Alternativa de soporte de las WSN: la preexistencia de situaciones donde la prestación de servicios de transmisión de datos es sumamente ineficiente y provisto por una empresa de manera monopólica. Ciertas veces el servicio es inexistente en la locación del proyecto. Por ello se avanzó en la búsqueda de
un soporte a la red de WSN no basada en la Red Digital Soporte de la prestadora en la región de desarrollo del trabajo.Facultad de Informátic