CINXE.COM

Trends in Cryptographic protocols in 2020

<!doctype html> <html> <head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <!--Import Google Icon Font--> <link href="https://fonts.googleapis.com/icon?family=Material+Icons" rel="stylesheet"> <link rel="stylesheet" href="https://use.fontawesome.com/releases/v5.0.13/css/all.css" integrity="sha384-DNOHZ68U8hZfKXOrtjWvjxusGo9WQnrNx2sqG0tfsghAvtVlRW3tvkXWZh58N9jp" crossorigin="anonymous"> <link href="https://fonts.googleapis.com/css?family=Roboto" rel="stylesheet"> <!--Import materialize.css--> <link type="text/css" rel="stylesheet" href="/css/materialize.min.css" media="screen,projection" /> <link type="text/css" rel="stylesheet" href="/css/main.css" /> <!--Let browser know website is optimized for mobile--> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <meta name="title" content="Trends in Cryptographic protocols in 2020"> <meta name="description" content="Cryptographic protocols"/> <meta name="keywords" content="Network Security,protocols,Cryptography "/> <title>Trends in Cryptographic protocols in 2020</title> <link rel="icon" type="image/ico" href="/img/cseij.png"> <style> .hov1:hover { background-color: rgba(253, 247, 247, 0); } </style> </head> <body> <!-- Responsive NavBar --> <div class="navbar-fixed"> <nav class="cyan lighten-2 z-depth-5"> <div class="container"> <div class="nav-wrapper"> <ul> <li id="b-logo"> <a class="brand-logo hov1" href="http://airccse.org" target="blank"><img id="brand-logo" class="hide-on-med-and-down" src="/img/logo.jpg"></a> </li> </ul> <a class="brand-logo" href="/index.html" style="margin-left:7%">CSEIJ</a> <a data-activates="side-nav" class="button-collapse show-on-small left"> <i class="material-icons">menu</i> </a> <ul class="right hide-on-med-and-down"> <li> <a href="/index.html">Home</a> </li> <li> <a href="/editorial.html">Editorial</a> </li> <li class="active"> <a href="/current.html">Current Issue</a> </li> <li> <a href="/submission.html">Submission</a> </li> <li> <a href="/indexing.html">Indexing</a> </li> <li> <a href="/special.html">Special Issue</a> </li> <li> <a href="/contact.html">Contacts</a> </li> </ul> </div> </div> </nav> </div> <!-- SIDE NAVBAR --> <ul class="side-nav" id="side-nav"> <li> <div class="user-view arc"> <a href="cseij_cited.html"> <i id="cl" class="material-icons cyan-text text-lighten-2 right">close</i> </a> <a href="/index.html"><h4 class="grey-text">CSEIJ</h4> </a> </div> </li> <li> <a href="/index.html">Home</a> </li> <li> <a href="/editorial.html">Editorial</a> </li> <li class="active"> <a href="/current.html">Current Issue</a> </li> <li> <a href="/submission.html">Submission</a> </li> <li> <a href="/indexing.html">Indexing</a> </li> <li> <a href="/special.html">Special Issue</a> </li> <li> <a href="/contact.html">Contacts</a> </li> </ul> <div class="fixed-action-btn" id="scrollTop"> <a class="btn btn-small btn-floating waves-effect waves-light blue lighten-1 pulse" onclick="topFunction()"> <i class="material-icons">keyboard_arrow_up</i> </a> </div> <!-- Main Section - Left --> <!-- Main Section - Left --> <section class="section-main"> <div class="container"> <div class="row"> <div class="col s12 m8"> <div class="card z-depth-2"> <div class="card-content"> <h5 class="cyan-text center text-darken-1"> Trends in Cryptographic protocols in 2020 </h5> </div> </div> <!-- paper 1 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;"> A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique </p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;"> Manju Kumari<sup>1</sup>, Vipin Pawar<sup>2</sup> and Pawan Kumar<sup>3</sup> , <sup>1</sup> YMCA University of Science and Technology,India , <sup>2</sup>Deenbandhu Chotu Ram University of Science and Technology,India , <sup>3</sup> Maitreyi College, University of Delhi, India </p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">In today鈥檚 day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques. </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">Cryptography; Steganography; Huffman Coding; Data Compression</p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="http://aircconline.com/ijnsa/V11N4/11419ijnsa04.pdf " target="blank">http://aircconline.com/ijnsa/V11N4/11419ijnsa04.pdf </a></p> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 2 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">Performance Evaluation of Parallel International Data Encryption Algorithm on IMAN1 Super Computer </p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">Ahmad Bany Doumi and Mohammad Qatawneh , University of Jordan, Jordan </p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;"> Distributed security is an evolving sub-domain of information and network security. Security applications play a serious role when data exchanging, different volumes of data should be transferred from one site to another safely and at high speed. In this paper, the parallel International Data Encryption Algorithm (IDEA) which is one of the security applications is implemented and evaluated in terms of running time, speedup, and efficiency. The parallel IDEA has been implemented using message passing interface (MPI) library, and the results have been conducted using IMAN1 Supercomputer, where a set of simulation runs carried out on different data sizes to define the best number of processor which can be used to manipulate these data sizes and to build a visualization about the processor number that can be used while the size of data increased. The experimental results show a good performance by reducing the running time, and increasing speed up of encryption and decryption processes for parallel IDEA when the number of processors ranges from 2 to 8 with achieved efficiency 97% to 83% respectively. </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">International Data Encryption Algorithm (IDEA); Plain text; Encrypted data; MPI. </p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href=" http://aircconline.com/ijnsa/V11N1/11119ijnsa04.pdf" target="blank"> http://aircconline.com/ijnsa/V11N1/11119ijnsa04.pdf </a></p> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 3 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">EUNICERT: Ethereum Based Digital Certificate Verification System </p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">Trong Thua Huynh<sup>1</sup>, Dang-Khoa Pham<sup>2</sup> , <sup>1</sup>Hochiminh city, Vietnam , <sup>2</sup>FPT Telecom, Vietnam </p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">A Digital certificate, blockchain, ethereum, verification, counterfeit. </p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="http://aircconline.com/ijnsa/V11N5/11519ijnsa02.pdf " target="blank">http://aircconline.com/ijnsa/V11N5/11519ijnsa02.pdf </a></p> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 4--> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map</p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">Ashraf Afifi, Taif University, Saudi Arabia </p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">This paper suggests chaotic confusion-diffusion image encryption based on the Henon map. The proposed chaotic confusion-diffusion image encryption utilizes image confusion and pixel diffusion in two levels. In the first level, the plainimage is scrambled by a modified Henon map for n rounds. In the second level, the scrambled image is diffused using Henon chaotic map. Comparison between the logistic map and modified Henon map is established to investigate the effectiveness of the suggested chaotic confusion-diffusion image encryption scheme. Experimental results showed that the suggested chaotic confusion-diffusion image encryption scheme can successfully encrypt/decrypt images using the same secret keys. Simulation results confirmed that the ciphered images have good entropy information and low correlation between coefficients. Besides the distribution of the gray values in the ciphered image has random-like behavior.</p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">Chaos, Encryptions, Henon map, Shuffle, Confusion, Diffusion. </p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="http://aircconline.com/ijnsa/V11N4/11419ijnsa02.pdf" target="blank">http://aircconline.com/ijnsa/V11N4/11419ijnsa02.pdf</a></p> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 5 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;"> KVEFS: Encrypted File System based on Distributed Key-Value Stores and FUSE </p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;"> Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung, and Ta Minh Thanh Le Quy Don Technical University,Hanoi, Vietnam </p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;"> File System is an important component of a secure operating system. The need to build data protection systems is extremely important in open source operating systems, high mobility hardware systems, and miniaturization of storage devices that make systems available. It is clear that the value of the data is much larger than the value of the storage device. Computers access protection mechanism does not work if the thief retrieves the hard drive from the computer and reads data from it on another computer. Encrypted File System (EFS) is a secure level of operating system kernel. EFS uses cryptography to encrypt or decrypt files and folders when they are being saved or retrieved from a hard disk. EFS is often integrated transparently in operating system There are many encrypted filesystems commonly used in Linux operating systems. However, they have some limitations, which are the inability to hide the structure of the file system. This is a shortcoming targeted by the attacker, who will try to decrypt a file to find the key and then decrypt the entire file system. In this paper, we propose a new architecture of EFS called KVEFS which is based on cryptographic algorithms, FUSE library and key-value store. Our method makes EFS portable and flexible; Kernel size will not increase in Operating System. </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">File System in User Space (FUSE), Key-Value store, Encrypt File System, KVEFS, Data Protection.</p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href=" http://aircconline.com/ijnsa/V11N2/11219ijnsa04.pdf " target="blank">http://aircconline.com/ijnsa/V11N2/11219ijnsa04.pdf </a></p> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 6 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">A Multi-Layer Arabic Text Steganographic Method Based on Letter Shaping </p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;"> A.F. Al Azzawi, Philadelphia University, Jordan </p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">Text documents are widely used, however, the text steganography is more difficult than other media because of a little redundant information. This paper presents a text steganography methodology appropriate for Arabic Unicode texts that do not use a normal sequential inserting process to overcome the security issues of the current approaches that are sensitive to steg-analysis. The Arabic Unicode text is kept within main unshaped letters, and the proposed method is used text file as cover text to hide a bit in each letter by reshaping the letters according to its position (beginning, middle, end of the word, or standalone), this hiding process is accomplished through multi-embedding layer where each layer contains all words with the same Tag detected using the POS tagger, and the embedding layers are selected randomly using the stego key to improve the security issues. The experimental result shows that the purposed method satisfied the hiding capacity requirements, improve security, and imperceptibility is better than currently developed approaches.</p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">Arabic text, multi-layers, Unicode, hiding information, text steganography </p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href=": http://aircconline.com/ijnsa/V11N1/11119ijnsa03.pdf " target="blank">: http://aircconline.com/ijnsa/V11N1/11119ijnsa03.pdf </a></p> </div> <br> <div> </div> <br> </ul> </div> </div> <br> <br> <br> <br> </div> <!--End Main Section - Left --> <!-- Right Side Bar --> <div id="side-bar" class="col s12 m4"> <div id="section-main"> <div class="card side cyan lighten-2"> <div class="card-content center"> <a href="/index.html" class="ax white-text">Scope & Topics</a> <br><br> <div class="divider"></div> <br> <a href="http://airccse.org/ethics.html" target="blank" class="ax white-text">Ethics</a> <br><br> <div class="divider"></div> <br> <a href="/archives.html" class="ax white-text">Archives</a> <br><br> <div class="divider"></div> <br> <a href="/cseij_cited.html" class="ax white-text">Most Cited Articles</a> <br><br> <div class="divider"></div> <br> <a href="/leaflet.pdf" target="blank" class="ax white-text">Download Leaflet</a> <br> <br><div class="divider"></div> <br> <a href="http://airccse.org/faq.html" target="blank" class="ax white-text">FAQ</a> <br> </div> </div> </div> </div> <!-- end Right Side Bar --> </div> </div> </section> <div class="fixed-action-btn"> <a id="menu" class="btn btn-floating cyan lighten-2 waves-effect waves-light pulse" onmouseover="$('.tap-target').tapTarget('open')"> <i class="material-icons white-text">menu</i> </a> </div> <div class="tap-target-wrapper right-align"> <div class="tap-target cyan" data-activates="menu"> <div class="tap-target-content white-text"> <h5>Reach Us</h5> <br> <i class="material-icons right">email</i>secretary@cseij.org <br> <br> <br> <i class="material-icons right">email</i>cseijsecretary@yahoo.com <br> <br> </div> </div> <div class="tap-target-wave "> <a class="btn-floating cyan tap-target-origin waves-effect waves-light" onmousewheel="$('.tap-target').tapTarget('close')"> <i class="material-icons cyan">close</i> </a> </div> </div> <!-- Dummy Div--> <div id="txtcnt"></div> <!-- Section: Footer --> <footer class="page-footer cyan lighten-3"> <div class="container"> <div class="row"> <div class="footer-m col m3 s12 offset-m2"> <ul> <li> <a class="white-text" href="/contact.html">Contact</a> </li> <li> <a href="mailto:secretary@cseij.org"><b>secretary@cseij.org</b></a> </li> </ul> </div> <div class="social col m4 offset-m3 s12"> <ul> <li> <a class="blue-text text-darken-4" href="https://www.facebook.com/profile.php?id=100009807545171" target="blank"> <i class="fab fa-facebook"> </i> </a> </li> <li> <a class="cyan-text " href="https://twitter.com/cseijjournal" target="blank"> <i class="fab fa-twitter"></i> </a> </li> <li> <a class="red-text text-darken-4" href="https://www.youtube.com/watch?v=7VsiljEK1Rk&list=PLyRzxgBWNe1GJCVYdNdH7pBGiqtF5T7d7" target="blank"> <i class="fab fa-youtube"></i> </a> </li> </ul> </div> </div> </div> <div class="footer-copyright grey darken-2"> <div class="container center-align"> <large class="white-text"> All Rights Reserved &reg; CSEIJ </large> </div> </div> </footer> <!--Import jQuery before materialize.js--> <script type="text/javascript" src="https://code.jquery.com/jquery-3.2.1.min.js"></script> <script type="text/javascript" src="/js/materialize.min.js"></script> <script src="/js/scrolltop.js"></script> <script src="/js/main.jquery.js"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10