Protecting passwords is now a big challenge because users want to do all types of work online via user-friendly devices such as mobile, tablets etc. Now, It is difficult to implement the secure heavy weight algorithms such as AES, RSA... more
Protecting passwords is now a big challenge because users want to do all types of work online via user-friendly devices such as mobile, tablets etc. Now, It is difficult to implement the secure heavy weight algorithms such as AES, RSA etc. in hardware constrained devices. It has been observed that users want all types of security services in an online public environment. Authentication is the first and foremost step to enhance security. Various applications are available for real time authentications such as keyless car entry and opening home-doors through security algorithms under remote keyless entry System (RKES). Now, it is the demand of the time to implement the lightweight security algorithms without compromising the security. In order to fulfill this challenge, this paper proposed a strong model for enhancing authentication security. In this work, strong authentication techniques are implemented with the light weight algorithms. This model received good comparison results.
We defined the hash algorithm as a security object during data transmission. The hash features are 4 more types 1. Message digest (MD5) 2. RIPMED (Race Integrated primitivity of Message Digest) 3. SHA (Secured Hash Function) 4. WHIRLPOOL.... more
We defined the hash algorithm as a security object during data transmission. The hash features are 4 more types 1. Message digest (MD5) 2. RIPMED (Race Integrated primitivity of Message Digest) 3. SHA (Secured Hash Function) 4. WHIRLPOOL. From this group of hashes, Message Digest 5 is mostly using in embedded security systems. To obtain high frequency and throughput in regions of Area, frequency and throughput by using unfolding transformation technique factor of 2. To get better outcomes to overcome the dis-advantages of existing method, the proposed design is reduced the data fetching stages from 32 to 16 stages. However, the overall process is speedy than the existing algorithm. And this work will explore the possibilities of increasing the speed of bruteforce attack on FPGA implementation of MD5 algorithm. The proposed design/method in FPGA to parallelize the search for a password that was hashed with the message digest algorithm. So the proof of concept the work is demonstrate the result for various password lengths suitable to run within reasonable amount of time, and compare performance with the sequential implementation of bruteforce attack in an FPGA
Cloud computing has grown very quickly to become a promising business idea in the IT industry due to its characteristics such as cost reduction, flexibility, convenience, and scalability. The wide spread of Cloud Computing was accompanied... more
Cloud computing has grown very quickly to become a promising business idea in the IT industry due to its characteristics such as cost reduction, flexibility, convenience, and scalability. The wide spread of Cloud Computing was accompanied by research fields in many aspects such as performance, storage, retrieval speed, backup and restore, security and privacy and other aspects related to it, which are still searched for today. Security and Privacy of data in Cloud Computing is of utmost importance to all its users, regardless of the nature of the stored data. In this paper, we propose a system that is secure and computationally efficient. The system focuses on three algorithms are AES (Advanced Encryption Algorithm), Blowfish algorithm and MD5 algorithm to build our proposed system. The principle goal guiding the design of any encryption algorithm must be security against unauthorized attacks and our proposed system is more security than any algorithm else. However, for all practical applications, cost of implementation and performance are also major concerns.
MD5 atau Message-Digest algortihm 5 adalah salah satu aplikasi yang digunakan untuk mengetahui bahwa pesan yang dikirim tidak ada perubahan sewaktu berada di jaringan. Algoritma MD-5 secara garis besar adalah mengambil pesan yang... more
MD5 atau Message-Digest algortihm 5 adalah salah satu aplikasi yang digunakan untuk mengetahui bahwa pesan yang dikirim tidak ada perubahan sewaktu berada di jaringan. Algoritma MD-5 secara garis besar adalah mengambil pesan yang mempunyai panjang variable diubah menjadi ‘sidik jari’ atau ‘intisari pesan’ yang mempunyai panjang tetap yaitu 128 bit. ‘Sidik jari’ ini tidak dapat dibalik untuk mendapatkan pesan, dengan kata lain tidak ada orang yang dapat melihat pesan dari ‘sidik jari’ MD-5.
Sekarang ini hampir setiap orang menggunakan internet dan dunia maya. Sehingga tidak menutup kemungkinan banyak pihak untuk melakukan kejahatan internet mulai dari melihat data yang sangat rahasia, merubah data, atau bahkan menghapus data... more
Sekarang ini hampir setiap orang menggunakan internet dan dunia maya. Sehingga tidak menutup kemungkinan banyak pihak untuk melakukan kejahatan internet mulai dari melihat data yang sangat rahasia, merubah data, atau bahkan menghapus data tersebut. Bila kita berbicara mengenai metode pengamanan yang benar-benar ampuh maka kita akan kesulitan menemukan atau bahka tidak ada. Namun kita dapat meminimalisir / memperkecil terjadinya kejahatan internet tersebut.
The BitTorrent protocol should (in the long run) be overseen by the International Telecommunications Union (ITU), in the capacity of providing "a framework for documenting the protocol state machines" (Client to Client, Client to Tracker... more
The BitTorrent protocol should (in the long run) be overseen by the International Telecommunications Union (ITU), in the capacity of providing "a framework for documenting the protocol state machines" (Client to Client, Client to Tracker & Torrent File Syntax).
The ITU should in no way interfere with the evolution of distributed file transfer protocols, but assist where possible to make these networks as compatible and interoperable with IP and Non-IP networks as possible.
This study was conducted to determine the authenticity of a certificate quickly. Certificate forgery problem is one of the important aspects of a study that has been done. In this case, it is related to the importance of the authenticity... more
This study was conducted to determine the authenticity of a certificate quickly. Certificate forgery problem is one of the important aspects of a study that has been done. In this case, it is related to the importance of the authenticity of the certificate as proof of someone that has already passed in the study or education. In general, certificate requires legalization process for stating its authenticity or by contacting the person or institution that published the certificate. This process takes a long time and inefficient. Therefore, this study will use the hash function by using the MD5 algorithm as the value of the integrity of the certificate and utilizing AES algorithm as security in the database. In this study, MD5 can produce a digital fingerprint of the existing certificate information that has value digital integrity to prove the authenticity of a certificate. But the integrity is not enough to secure the data certificate. Therefore, this study will implement the AES algorithm to maintain the security of this integrity value.
We defined the hash algorithm as a security object during data transmission. The hash features are 4 more types 1. Message digest (MD5) 2. RIPMED (Race Integrated primitivity of Message Digest) 3. SHA (Secured Hash Function) 4. WHIRLPOOL.... more
We defined the hash algorithm as a security object during data transmission. The hash features are 4 more types 1. Message digest (MD5) 2. RIPMED (Race Integrated primitivity of Message Digest) 3. SHA (Secured Hash Function) 4. WHIRLPOOL. From this group of hashes, Message Digest 5 is mostly using in embedded security systems. To obtain high frequency and throughput in regions of Area, frequency and throughput by using unfolding transformation technique factor of 2. To get better outcomes to overcome the dis-advantages of existing method, the proposed design is reduced the data fetching stages from 32 to 16 stages. However, the overall process is speedy than the existing algorithm. And this work will explore the possibilities of increasing the speed of bruteforce attack on FPGA implementation of MD5 algorithm. The proposed design/method in FPGA to parallelize the search for a password that was hashed with the message digest algorithm. So the proof of concept the work is demonstrate the result for various password lengths suitable to run within reasonable amount of time, and compare performance with the sequential implementation of bruteforce attack in an FPGA
The paper introduces a cloud-enabled framework for parameterized security in large-scale Smartphone based wireless sensor network. The research work also highlights some of the effective implementation of service broker included in... more
The paper introduces a cloud-enabled framework for parameterized security in large-scale Smartphone based wireless sensor network. The research work also highlights some of the effective implementation of service broker included in aggregation service in sensor network. The cumulative collected throughput information is considered to be forwarded to the cloud users using conventional cloud interfaces. A cloud interface is built with newly introduced concept of Unit Transaction permission coin (UTPC) as a security token for cloud user authorization that is integrated in Android platform (v2.2). The UTPC generation process includes hash function (SHA/MD5) that is most difficult to break by any intruder. The empirical process consists of registration and authentication phase using micro-platform computation in untrusted environment considering the IMEI and IMSI of the considered trusted handheld device. The result accomplished is unique and lightweight that is easily compatible with any real time application that runs on cloud environment.
— Multi cloud is an important concept for these days for the organization people who do on-line method. It provides information to the user through cloud computing technology. User of the Cloud need to store sizable amount of knowledge... more
— Multi cloud is an important concept for these days for the organization people who do on-line method. It provides information to the user through cloud computing technology. User of the Cloud need to store sizable amount of knowledge within the cloud, by providing storage here we have a tendency to use the dynamic storage mechanism with the assistance of MD5 rule. The MD5 rule may be a wide used hash operates manufacturing a 128-bit hash price. MD5 is employed for science hash operates. For dynamic cloud resource allocation here we have a tendency to use accommodative list programming (ALS) and accommodative min-min programming (AMMS). This pair of ways is used for programming the task, that additionally worked within the offline mode and it works as a static resource allocation repeatedly with predefined frequency. And that we use 3DES cryptography methodology in every file and Elliptic Curve Cryptography (ECC) rule for the cryptography of personal key. And additionally we have a tendency to embrace dynamic file slicing victimization framework interface for determination the key management and key distribution problems.
Cloud computing is recently emerged as a service program, where users can remotely depot their data into the cloud so as to take advantage of on-demand high quality services from a shared pool of configurable computing resources. Cloud... more
Cloud computing is recently emerged as a service program, where users can remotely depot their data into the cloud so as to take advantage of on-demand high quality services from a shared pool of configurable computing resources. Cloud computing it has considerable potential as an alternative process for traditional silo computing. One can deploy applications more speedily across shared server storage resource pools than is possible with conventional enterprise solutions it also enables a new level of agility. Beside this, users will not have physical ownership of the outsourced data of possibly large size, hence the data integrity preservation in Cloud Computing is difficult task. Surveys on cloud computing imply that there should be proper privacy and security means for cloud, otherwise this may be disappointing. The term " multi-clouds " , can be vied as a solution for improved data security by using secret sharing algorithm.
We defined the hash algorithm as a security object during data transmission. The hash features are 4 more types 1. Message digest (MD5) 2. RIPMED (Race Integrated primitivity of Message Digest) 3. SHA (Secured Hash Function) 4. WHIRLPOOL.... more
We defined the hash algorithm as a security object during data transmission. The hash features are 4 more types 1. Message digest (MD5) 2. RIPMED (Race Integrated primitivity of Message Digest) 3. SHA (Secured Hash Function) 4. WHIRLPOOL. From this group of hashes, Message Digest 5 is mostly using in embedded security systems. To obtain high frequency and throughput in regions of Area, frequency and throughput by using unfolding transformation technique factor of 2. To get better outcomes to overcome the dis-advantages of existing method, the proposed design is reduced the data fetching stages from 32 to 16 stages. However, the overall process is speedy than the existing algorithm. And this work will explore the possibilities of increasing the speed of bruteforce attack on FPGA implementation of MD5 algorithm. The proposed design/method in FPGA to parallelize the search for a password that was hashed with the message digest algorithm. So the proof of concept the work is demonstrate the result for various password lengths suitable to run within reasonable amount of time, and compare performance with the sequential implementation of bruteforce attack in an FPGA
— Cloud computing is one of the emerging technology which is showing continuous advancement in the field of networking. Cloud computing is defined by National Institute of Standards and Technology (NIST)[1] as a model for enabling... more
— Cloud computing is one of the emerging technology which is showing continuous advancement in the field of networking. Cloud computing is defined by National Institute of Standards and Technology (NIST)[1] as a model for enabling ubiquitous, on demand network access to a shared pool of configuration computing resources (e.g. computer networks, servers, storage, applications and services) ,which can be rapidly provisioned and release with minimal management effort. It is gaining popularity in all the areas. But still by far cloud computing sharing is behind one expected because of the security concerns (unauthorized access, modification or denial of services, etc). In this research paper, the proposed work plan is to eliminate security concerns using cryptographic algorithm and hashing algorithm.
Setiap hari ada penambahan ribuan varian virus baik buatan lokal maupun luar negeri. Virus/worm komputer lokal sendiri tidak bisa dibersihkan oleh beberapa antivirus produk luar negeri secara tuntas karena virus/worm komputer lokal tidak... more
Setiap hari ada penambahan ribuan varian virus baik buatan lokal maupun luar negeri. Virus/worm komputer lokal sendiri tidak bisa dibersihkan oleh beberapa antivirus produk luar negeri secara tuntas karena virus/worm komputer lokal tidak memanfaatkan celah-celah pada jaringan tetapi justru merusak file atau sistem operasi. Aplikasi antivirus dalam makalah ini menggunakan algoritma Message Digest 5 (MD5) untuk signature suatu virus dan metode heuristic untuk mendeteksi kode-kode berindikasi virus/worm komputer dalam executable files. Karena proses pemindaian virus/worm lebih akurat, maka aplikasi antivirus ini dapat dijadikan antivirus alternatif untuk mengoptimalkan pengamanan sistem dan data komputer dari ancaman virus/worm komputer dengan userfriendly.
Abstract Cryptography plays main role in information security, which is used to protect transformation of electronic data. Advanced Encryption Standard (AES) is symmetric block cipher that includes generation of ciphers for encryption... more
Abstract
Cryptography plays main role in information security, which is used to protect transformation of electronic data. Advanced Encryption Standard (AES) is symmetric block cipher that includes generation of ciphers for encryption and inverse ciphers for decryption. In this work, the key generation for AES algorithm based on different methods of algorithms (Linear Feed Back Shift Resister LFSR,
Message Digests MD5, and Modified Message Digests MMD5) is
presented. These methods make AES algorithm more reliable and more robust. Two different methods of generating key for AES algorithm are proposed: one was generating key by using MD5 algorithm and the other proposed new algorithm that called MMD5 to increase the randomization of MD5 algorithm, then used it to generate key for AES algorithm. Adding these algorithms cause a change in the static attribute of AES algorithm which has 128 bits length of input key to make it range from ( 1.8 1 *10+19)
bits.The two proposed algorithms for key generation of AES algorithm have been designed and simulated using MATLAB and Xilinx-ISE 14.6 Web PACK, and then implemented in XC3S700A-4FG484 FPGA. The two algorithms are programmed using VHDL code.The simulation and hardware results showed that the software processing time is greater than hardware processing time by (571*104) % for traditional AES algorithm; and by (670*104) % for MD5 or MMD5 with AES algorithm. The computation of avalanche affect for ciphering after implementation on Xilinx broad showed that MMD5 with AES algorithm have avalanche affect more than MD5 with AES algorithm and traditional AES algorithm. Furthermore, MD5 with AES algorithm have avalanche affect greater than traditional AES algorithm.