8 research outputs found

    Optimised Key Generation for RSA Encryption

    Get PDF
    In today’s world, cryptography has become a necessity for all organizations. Data security is an essential component of an organization in order to keep the information safe from various competitors. It also aids to ensure data confidentiality, integrity and secure communication channel.   RSA being a cryptosystem is used to secure data both in organizations and in the cloud. Hence, the need for enhanced security of data stored or in transit. Data that is stored in the cloud or in transit has frequently been attacked by hackers who use them for fraudulent purposes and as such most individuals or organizations become victims of these activities.  In this research, various encryption algorithms have been studied. Literature survey has been carried out by incorporating key papers related to data encryption. RSA is critically analysed and key generation has also been optimized. Simulation results have been accomplished using MATLAB r2014b; results prove that the proposed algorithm is optimized compared to RSA in terms of hacking although, RSA seems to have a better processing time than the proposed algorithm. Finally, summary, conclusion, recommendation and future work has also been stated at the end of this research. Keywords: RSA cryptosystem, prime numbers, RSA Problem, Public Key Cryptosystems, Private Key Cryptography, Crypto Analysis, Finite Fields, Quantum Computers

    Harnessing Information and Communication Technology (ICT) for the management of ungoverned spaces in Nigeria: Policy and strategic way out

    Get PDF
    Since 2008, the Federal government has witnessed series of security challenges predominantly Boko Haram insurgencies, banditry, kidnapping, separatist agitations and piracy operating from thick forests, largely ungoverned. Efforts by the government to eradicate these criminals have been taking serious economic hardship on the government and the people. This paper interrogates the need for the use of technology-driven approach (drones) to the management of ungoverned spaces in order to make government more responsible to the people in those territories as well as handle the miscreants therein now. This study therefore investigates how Information and Communication Technologies (ICT) can be used as a driving force to curtail criminal activities in these spaces and examine the existence of policies to drive utilisation of these technologies. The study carried out a field study on the subject matter and observed that interagency corporation, funding, data gathering and a holistic policy document addressing utilisation of comprehensive approach to the management of ungoverned spaces are ways forward in Nigeria. Keywords: Ungoverned spaces, Security, ICT, Policy and strategy, Drone

    COVID-19 pandemic and evolving library and information services: Lessons for Nigeria

    Get PDF
    Purpose: This paper examined the impact of the novel COVID-19 pandemic on libraries in the world with emphasis on lessons for Nigeria. Design/Methodology/Approach: Using secondary data and literature sourced from journals and the Internet, the paper gave a brief chronology of the emergence of the disease; the extent of the danger it can cause; its symptoms and safety measures. The paper reinforced the importance of the roles libraries are playing in order to mitigate the effect of the pandemic. They include promoting the use of Information and Communication Technology (ICT) and resources, promoting media and information literacy, using information management to support health care and other social services, raising awareness of the disease and safety measures, and fighting  against misinformation on the disease. Findings: The findings of this study revealed that from the ecological view point there are endemic constraints libraries in Nigeria are facing, which have prevented them from innovating programmes and services like in advanced climes to effectively contribute to mitigating the effect of COVID-19 pandemic in the country. The constraints include poor reading culture, passive nature of librarians, negative disposition of the society towards library and information issues, poor funding for library education and library development, poor technologically driven library and information services amongst others. Originality/Value: The paper concluded by making recommendations and implementation strategies including the following: libraries in Nigeria must create more values for users, must become technologically innovative, government and stakeholders in the profession must act swiftly to ensure adequate policy framework for the effective functioning of libraries so that they are always in a good stead to cope with changing trends. Practical Implication: In any pandemic the roles of the library include promoting awareness by creating and disseminating information relating to preventive measures, supporting research by providing information regarding latest developments and meeting the information needs of the user community. More so, the proper documentation of all facts gathered before, during and after the pandemic. Keywords: COVID-19; Pandemic; Libraries; Librarians; Digital technologies, Innovations

    Digital Twin Based Anomaly Detection foran Improved Cyber Security in a Water Distribution System

    No full text
    International audienceImproved real time data collection and processing have resulted in the interconnection ofCyber-physical Systems (CPSs) and of their components including sensors, actuators, networkdevices with other intelligent devices in the cyber space. This development comes withchallenges especially in terms of security. Considering the increase of threats that may lead todata theft and equipment damage when attacked by hackers or intruders, there is an urgentneed to proffer enhanced measures that will improve the security of CPS. Herein, anomalydetection is of great interest when it comes to safeguarding Cyber-Physical Systems from suchtargeted and sophisticated attacks that abound in CPS. They aim to detect behaviours ofcomponents of the CPS that do not conform with the normal operations of CPS or alter itsprocesses. Machine Learning approach have provided the necessary means to learn and theability to identify intrusions in a CPS. A new type of information technology called Digital Twin(DT) makes it possible to turn the real world into a virtual digital environment. Machinelearning is applied on the data generated from the Digital Twin to predict the behaviours ofcomponents of the CPS during attack and normal operations. Digital Twin, which is a directreplica of the physical twin has been used in industries to study system behaviour and predictsystem performance. This paper intends to adopt the DHALSIM digital twin testbed forgenerating datasets that will subsequently be subjected to machine learning. A c-town use casewas also adopted to mimic a real-world water distribution system. The physical, network andcontrol processes of an operational CPS was also captured. This research will focus on thebehaviour of the physical processes. A machine learning algorithm such as Random Forestalgorithm will be applied to the generated dataset with the intention of ascertaining theperformance and behaviour of the algorithm on the generated dataset. State of the artliteratures were reviewed to identify the behaviour of physical and network processes in a CPSdigital twin environment. Attacks will be simulated on the DHALSIM digital twin tested to alsoestablish the behaviour of the system in times of possible attacks. Finally, it is expected thatapplication of Random Forest machine learning algorithm will predict the behaviour (physicalprocesses) of a water distribution system thus improving intrusion detections in CPS

    The role of e-Government in overcoming the consequences of the COVID-19 pandemic in Nigeria

    No full text
    Purpose: The article aims at identifying the challenges of e-government amid the COVID-19 pandemic in Nigeria and proffered recommendations to arrest the identified challenges.  This paper also examined e-Governance in selected countries such as the United States of America, the United Kingdom, and Canada and how it has fared including Nigeria revealing its implications for Nigeria as a developing nation. Research Methodology: The article adopts a review study approach in analyzing the subject. Results: Some of the challenges identified by the study include but are not limited to inadequate technical know-how and ICT skills to drive and sustain e-government. Recommendations from the study include, the Ministry of Communications Technology and Digital Economy to build a backbone that will connect all States of the country and the upskilling of the workforce through the Ministry of Labour and Employment amongst others. Limitations: Insufficient quantitative data based on the subject under discourse Contributions: Identified possible areas that the Nigerian government could look into to improve e-government in order to promote inclusivity, awareness, and most importantly reduce the cost of governance
    corecore