Cloud computing is the apt technology for the decade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. While Cloud services offer... more
Cloud computing is the apt technology for the decade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. While Cloud services offer flexibility, scalability and economies of scale, there have been commensurate concerns about security. On the similar terms, we have chosen to make use of a combination of authentication technique and key exchange algorithm blended with an encryption algorithm. In this project, we have proposed to make use of 3DES algorithm which is a well-known symmetric cryptosystem and is widely used for secure data transmission, along with that we will blend it with Random Key Generator and Graphical Password to add an extra security measure. This proposed architecture of three way mechanism and the use of symmetric method of encryption make it tough for hackers to crack the security system, thereby protecting data stored in cloud. This Cipher Block Chaining system is to...
Nowadays, due to the position of technology, the need for cyber security has increased considerably. The most personal information of people is easily accessible on the internet. Information such as banking information, personal... more
Nowadays, due to the position of technology, the need for cyber security has increased considerably. The most personal information of people is easily accessible on the internet. Information such as banking information, personal information, state secrets, military secrets need to be protected. Many encryption algorithms have been developed to protect people's personal information and state secrets. In this article, comparison of RSA, AES, DES, algorithms is done.. These comparisons were made considering the speed of the algorithms.
Abstract- Cloud computing is the apt technology for the decade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. While Cloud services offer... more
Abstract- Cloud computing is the apt technology for the decade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. While Cloud services offer flexibility, scalability and economies of scale, there have been commensurate concerns about security. On the similar terms, we have chosen to make use of a combination of authentication technique and key exchange algorithm blended with an encryption algorithm. In this project, we have proposed to make use of 3DES algorithm which is a well-known symmetric cryptosystem and is widely used for secure data transmission, along with that we will blend it with Random Key Generator and Graphical Password to add an extra security measure. This proposed architecture of three way mechanism and the use of symmetric method of encryption make it tough for hackers to crack the security system, thereby protecting data stored in cloud. This Cipher Block Chaining sy...
GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe protocols for second generation (2G) digital cellular... more
GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe protocols for second generation (2G) digital cellular networks used by mobile phones. It became the de facto global standard for mobile communications with over 80% market share.It IJSER is a digital mobile telephony system that is widely used in Europe and other parts of the world. GSM is a cellular network, which means that cell phones connect to it by searching for cells in the immediate vicinity. There are five different cell sizes in a GSM network—macro, micro, pico, femto, and umbrella cells. The coverage area of each cell varies according to the implementation environment. GSM was designed with a moderate level of service security. The system was designed to authenticate the subscriber using a preshared key and challenge-response. Communications between the subscriber and the base station can be ...
-Due to fast growing of telecommunication technology and limitation for information transmission there is a need to use an efficient cryptography algorithm which takes less space after encryption for the ciphertext. Some performance... more
-Due to fast growing of telecommunication technology and limitation for information transmission there is a need to use an efficient cryptography algorithm which takes less space after encryption for the ciphertext. Some performance matrics (such as time, speed and throughput) make the algorithm better. In this paper, we analyze and find an efficient encryption algorithm which takes less space among these encryption algorithms such as DES, TDES, AES, Blowfish and Twofish. Keywords— Space complexity, Encryption, Decryption, Symmetric Key, Private Key, DES, TDES, AES, Blwofish, Twofish.
1Department of Environmental Engineering and Sustainable Development, Technical University of Bari, Engineering Faculty of Taranto, Viale del Turismo 8, I-74100, Taranto, Italy 2Department of Civil and Environmental Engineering, Technical... more
1Department of Environmental Engineering and Sustainable Development, Technical University of Bari, Engineering Faculty of Taranto, Viale del Turismo 8, I-74100, Taranto, Italy 2Department of Civil and Environmental Engineering, Technical University of Bari, Via Orabona 4, ...
Abstract:- Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The... more
Abstract:- Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. This paper provides a fair comparison between three most common symmetric key cryptography algorithms: DES, AES, and Blowfish. The comparison is made on the basis of these parameters: speed, block size, and key size. Simulation program is implemented using Java programming.
Security is playing a vital role in the field of communication system and Internet. Data encryption standard (DES) and the Rivest-Shamir-Adleman (RSA) algorithms are the two popular encryption algorithms that vouch confidentiality and... more
Security is playing a vital role in the field of communication system and Internet. Data encryption standard (DES) and the Rivest-Shamir-Adleman (RSA) algorithms are the two popular encryption algorithms that vouch confidentiality and authenticity over an insecure communication network and Internet. There has been paltry cryptanalytic progress against these two algorithms since their advent. This paper presents the comparison between the DES private key based Algorithm and RSA public key based algorithm. The main feature that specifies and differentiate one algorithm from another are the ability to the speed of encryption and decryption of the input plain text. It also includes several computational issues as well as the analysis of DES algorithm and RSA algorithm like the encryption throughput and decryption throughput. The recipe of finding the encryption throughput and decryption throughput is discovered.
Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centers, where the management of the data and... more
Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique feature, however, raises many new security challenges which have not been well understood. In cloud computing, both
... représentée par des assemblages lithiques à bifaces et débitage Levallois, taillés dans des matières premières (comme le silex ou le ... La circulation de différents produits sur de longues distances est une caractéristique de la... more
... représentée par des assemblages lithiques à bifaces et débitage Levallois, taillés dans des matières premières (comme le silex ou le ... La circulation de différents produits sur de longues distances est une caractéristique de la néolithisation dans toutes les cultures (Perlés 200 1 ...
Terdapat beberapa cara untuk menangani masalah keamanan data rahasia yang dikirimkan melalui internet, diantaranya adalah menggunakan teknik kriptografi dan steganografi. Steganografi merupakan ilmu dan seni penyembunyian informasi/pesan... more
Terdapat beberapa cara untuk menangani masalah keamanan data rahasia yang dikirimkan melalui internet, diantaranya adalah menggunakan teknik kriptografi dan steganografi. Steganografi merupakan ilmu dan seni penyembunyian informasi/pesan pada suatu media sedemikian rupa sehingga keberadaannya tidak terdeteksi oleh pihak lain yang tidak berhak atas informasi tersebut. Sebaliknya, kriptografi menyamarkan arti dari suatu pesan, tapi tidak menyembunyikan bahwa ada suatu pesan karena file terlihat mencurigakan. Teknik Steganografi yang penulis gunakan adalah End Of File (EOF). Teknik EOF menggunakan cara menambahakan data atau file pada akhir file image. Untuk teknik ini, data atau file yang akan disembunyikan besar ukurannya dapat melebihi dari ukuran file image. Data yang disembunyikan tersebut akan disisipkan pada akhir file sehingga tidak akan mempengaruhi gambar. Aplikasi steganografi ini juga dilengkapi dengan fungsi kriptografi Data Encryption Standard (DES) pada saat penyisipan d...
The exponential increase in digital data exchange in Mobile Ad hoc network paves a way for authentic research in the horizon of securing data using cryptographic methods. This paper proposes a comparative analysis of existing DES and... more
The exponential increase in digital data exchange in Mobile Ad hoc network paves a way for authentic research in the horizon of securing data using cryptographic methods. This paper proposes a comparative analysis of existing DES and proposed Biometric Advanced Encryption Standard (BAES) cryptographic algorithm. BAES implementation includes design of robust biometric key generation algorithm that can mitigate malicious attacks by extending security definitions of existing Advanced Encryption Standard.
Trust of Clients cannot be completely trusted or beneficial through the cloud. Many information gets corrupted due to the unwanted users by the employees in the hierarchy of an Organization. Separate Organization handles the data... more
Trust of Clients cannot be completely trusted or beneficial through the cloud. Many information gets corrupted due to the unwanted users by the employees in the hierarchy of an Organization. Separate Organization handles the data securely, but in many cases, data is being given away for money because of the single level Management. We move forward to an advanced safe Technology to overcome this issue, where data are downloaded by an Organization or a set of admins in a hierarchy through face detection mode. If any of the admin rejects in accepting the request the file cannot be downloaded and thereby the data is made secure. Advanced Encryption Algorithm is the medium to make this technology secure and beneficial. Many such technologies can offer such a new form of security based work for efficient and brand form of storage process in the software as well as any other field in cloud computing.
... La Hague, Mouton : 382-390. ... Geneviève Calame-Griaule, Claude-Hélène Perrot et Laure Carbonnel, « In memoriam Claude Tardits (18 avril 1921-1er mai 2007) », Journal des africanistes [En ligne], 77-1 | 2007, mis en ligne le 04... more
... La Hague, Mouton : 382-390. ... Geneviève Calame-Griaule, Claude-Hélène Perrot et Laure Carbonnel, « In memoriam Claude Tardits (18 avril 1921-1er mai 2007) », Journal des africanistes [En ligne], 77-1 | 2007, mis en ligne le 04 décembre 2007, consulté le 08 octobre 2011. ...
The watermarking of digital image, audio, video and multimedia products in general have been proposed for resolving copyright ownership and verifying boldness of content. This paper studies the contribution of watermarking for developing... more
The watermarking of digital image, audio, video and multimedia products in general have been proposed for resolving copyright ownership and verifying boldness of content. This paper studies the contribution of watermarking for developing the protection scheme. Wolfgang and Delp Algorithm (Technique) is used in case of watermark Embedding. The algorithm proposed the scheme of watermarking by encrypting the watermark images using symmetric encryption like DES. According to the method, the watermark symbol to be encrypted first using DES and then embedding it into RGB vectors of original image using SVD transformation sampling. The experiment justifies that the algorithm of embedding watermark has better robustness to JPEG compression attack. Piper diagram is ploted by the aquaChem 2011.1 software.
Digital data is increasing exponentially with the use of computational electronic devices, resulted in marking data with different types of formats. When it comes to the handling of the data by other end user, it becomes tedious as... more
Digital data is increasing exponentially with the use of computational electronic devices, resulted in marking data with different types of formats. When it comes to the handling of the data by other end user, it becomes tedious as multiple formats of data will be received and possibly tampered data. To absolve this, protocol was introduced, providing set of rules. This paper provides a new protocol for RDF and XML data that need to be transferred over the network. In addition to this, there are two more features added to the protocol like customization which provides end user to set customized rules for incoming data that need to be processed and other is security. Security can be customized based on the requirement of the end user by invoking different types of security algorithms and keys with ease use.