3 research outputs found

    Integrated Security Protocol for Electronic Election System

    Get PDF
    Electronic election systems are a sensitive application and security is a major concern. This process should be ensured to maintain the integrity and confidentiality of the casted votes and voters authentication before they casts their votes. Besides security, other issues need to be considered such as; simplicity, reliability, convenience, flexibility, mobility and cost. In this paper, an integrated security protocol and a prototype of a web-based electronic election system is proposed by integrating two techniques; the first technique is a new zero knowledge mutual authentication protocol based on Diffie-Hellman (D-H ZKP) key exchange algorithm, to enforce a mutual authentication between the election authority server and the voters and exchange secret key securely. The second technique is homomorphic encryption scheme to encrypt all the votes and perform the calculation of the votes without revealing any information about it to ensure the secrecy of the votes and maintain the confidentiality. The proposed protocol provides secure voting over the Internet and maintains the requirements of the election process. Keywords: E-election, D-H ZKP, Homomorphic Encryption

    VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator

    Get PDF
    Abstract— Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarantee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time random key used to encrypt each voice data in the RTP packet. Chaotic maps have been used successfully for encryption bulky data such as voice, image, and video, chaotic cryptography has good properties such as long periodicity, pseudo-randomness, and sensitivity to initial conditions and change in system parameters. A VoIP system was successfully implemented based on the on ITU-T G.729 for voice codec, as a multimedia encoding of Real-time Transport Protocol payload data, then, apply a proposed methods to generate three-mixed logistic chaotic maps [1] and then analysis the encryption/ decryption quality measures for speech signal based this method. The experimental work demonstrates that the proposed scheme can provide confidentiality to voice data with voice over IP performance quality, minimum lost in transmitted packet, minimum average delay, and minimum jitter. Keywords: VoIP; Speech encryption; logistic chaotic map; G.729; QoS; RT

    DECISION SUPPORT SYSTEM FOR NETWORK ROUTING OPTIMIZATION PROBLEM

    No full text
    Routing involves two basic activities: determining optimal routing paths and transporting information groups through a network from a source to a destination. Networks routing is considered as a short path problem and optimized within different constraints like time, distance, cost and traffic. In this research a decision support system (DSS) is designed to facilitate optimal routing and network management. Dijkstra algorithm using distances and centrality as constraints has been used as optimization model. System database has been collected from routers and nodes to build a graph of the network which shows the locations and links of routers and nodes within the network. A friendly interface has been developed to help network administrators in network management
    corecore