4 research outputs found

    Cloud Data Security using Elliptical Curve Cryptography

    Get PDF
    Internet today is seeing a touchy development because of expanded use. In any case, it is helpless against eavesdropping which represents a risk to privacy and security of the client. The security of data traffic winds up plainly vital since the communications over open network happen frequently. It is along these lines basic that the data traffic over the system is encrypted. Since the wireless and wired IP networks are defenseless against eavesdropping, cryptographic plans are produced to secure the information transmitted in a network. To give the quality of service, the cloud computing security is the essential part of the cloud service providers. Nonetheless, cloud computing postures numerous new security challenges which have not been all around researched. This research work concentrating on issues identifying with the cloud data storage strategies and security in virtual condition. We propose a technique for giving data storage and security in cloud utilizing Elliptical Curve Cryptography ECC. Encourage, depicts the security services incorporates generation of key, encryption and decryption in virtual condition

    Hybrid Image Steganography Method with Random Embedding of Encrypted Message

    Get PDF
    The main challenge for embedding encrypted message in an input image is to get better the security of the confidential information through hybrid-based image steganography method. Moreover, earlier LSB based solutions existed in which either secret information embedded without encryption or embedded un-randomly in an image and existing MSB based information concealing solutions minimizes information capacity and image quality too. Most of existing steganographic systems either based on  LSB or  MSB but only some hybrid solutions are available in which either the confidential message is not encoded before embedding it into the image and the embedding system is also not random based.  The existing well known hybrid based image steganography techniques are not only deficient in performance but also deficient in embedding of encoded data in an image. To overcome these issues, a Hybrid-LSB-MSB based image steganography and multi-operation data encryption method is proposed in this article. Proposed method is not only randomly embeds the confidential information in a cover image but also provided the facility to encode the confidential information before substituting. The Hybrid-LSB-MSB based proposed image steganography method is compared with earlier Hybrid based image steganography method by using Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR) values including payload capacity. Higher PSNR and Lower MSE values signify effective steganography quality. The experimental results show that proposed method retains higher PSNR and lesser MSE values as contrasted to the existing methods thereby effective in steganographic properties.   &nbsp

    Algorytmy metaheurystyczne w kryptoanalizie szyfrów strumieniowych

    Get PDF
    Metaheuristic algorithms are general algorithms allowing to solve various types of computational problems, usually optimization ones. In the dissertation, new versions of selected metaheuristic algorithms were developed: Tabu Search and Ant Colony Optimization algorithms. They have been adapted to solve the problem of cryptanalysis of stream ciphers, which are an important element of data protection processed and stored in information systems. Attempts to hide information from unauthorized persons have a long history. As early as the 5th century BC there was a simple Atbash substitution cipher among the Hebrew scholars. Although a lot has changed since then, and the art of encrypting information has undergone a significant transformation, the issue of confidentiality of communication is still important. Encryption is used wherever protection of transmitted or stored data, especially in information systems, is of key importance. Encryption is used when talking on the phone or logging in via the Internet to a bank account. It is also of great importance in the military. Encryption is an issue with a long history, still important and topical. The proposed Tabu Search and Ant Colony Optimization algorithms adapted to cryptanalysis were tested using three stream ciphers: RC4, VMPC and RC4+. This enabled the development of an attack independent of the design of the cipher itself, assuming that the internal state of the cipher can be represented as a permutation of numbers from a given range. For all proposed metaheuristic algorithms, four types of fitness functions have been tested, three of which are original ones. The original fitness functions enabled achieving better results for all three analysed metaheuristic algorithms compared to a function known from the literature. Each of the proposed algorithms were tested in terms of the impact of parameters values on the results they achieved. Also the results achieved by all three metaheuristic algorithms were compared to one another. The results obtained during cryptanalysis of smaller and full versions of the analysed ciphers with the use of Tabu Search were compared with the results obtained by other metaheuristic algorithms, showing that Tabu Search leads to better results than other metaheuristics. The results obtained using the Tabu Search algorithm were also compared to attacks known from the literature on selected stream ciphers. The results of the experiments indicate that for the VMPC and RC4+ ciphers, the proposed cryptanalysis algorithm using Tabu Search may be better than the cryptanalysis algorithms known so far. The results achieved by other metaheuristic algorithms considered were not as good as for Tabu Search, although it cannot be ruled out that further enhancement of these algorithms could improve the results

    Contribuciones al establecimiento de una red global de sensores inalámbricos interconectados

    Get PDF
    Se ha considerado a este trabajo como un aporte al establecimiento de una red global de sensores donde los humanos (agentes inteligentes), y computadoras potentes interactúan con redes piloto de sensores inalámbricos, distinguiendo en la red global 3 subdominios: • Una red superior existente, donde los distintos nodos ejecutan las aplicaciones en potentes computadoras que pueden interconectarse vía Internet u otras redes globales. • Los dispositivos sensores que forman una red piloto y se comunican entre sí por medio inalámbrico. • Un portal de servidores, formado por nodos que controlan las redes piloto, y permiten la interacción entre los nodos de la red superior y los dispositivos de la WSN. Los temas a desarrollar en esta tesis son: •Modelado y simulación: La simulación es utilizada para evaluar sistemas desarrollados y a implementar en redes reales. La utilidad de los datos obtenidos depende puramente del realismo y la precisión de los modelos a implementar. Fundamentalmente se avanzan con simulaciones que simplifican la instalación de las WSNs. •Entorno de desarrollo de aplicaciones: Necesario para la corrida de las simulaciones como también desarrollo de las aplicaciones a ser instaladas en los nodos físicos existentes. •Alternativa de soporte de las WSN: la preexistencia de situaciones donde la prestación de servicios de transmisión de datos es sumamente ineficiente y provisto por una empresa de manera monopólica. Ciertas veces el servicio es inexistente en la locación del proyecto. Por ello se avanzó en la búsqueda de un soporte a la red de WSN no basada en la Red Digital Soporte de la prestadora en la región de desarrollo del trabajo.Facultad de Informátic
    corecore