Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2014
  • Volume: 

    5
  • Issue: 

    3
  • Pages: 

    203-210
Measures: 
  • Citations: 

    0
  • Views: 

    875
  • Downloads: 

    0
Abstract: 

In many years Breaking of cryptography Algorithms have been taken into consideration as a challenge. Data Encryption Standard (DES) is used as a standard to keep the information confidential and allows the research studies to investigate it. S-DES is the simplified version of Data Encryption Standard Algorithm which is used by the researchers for investigation. The present study uses SPSO algorithm to break SDES algorithm. To break SDES algorithm the SPSO was optimized. There were some attacks on some blocks of the cipher text and the obtained results revealed that this algorithm had a better performance in detecting main key bits in shortest time so that، in detection factor main key bits، ten main key bits have been discovered and in the time of detection factor main key bits، time over a minute to less than twenty seconds dropped in comparison with Previous work.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 875

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MIRGHADRI A. | BAGHERI H.

Issue Info: 
  • Year: 

    2020
  • Volume: 

    7
  • Issue: 

    4
  • Pages: 

    51-57
Measures: 
  • Citations: 

    0
  • Views: 

    955
  • Downloads: 

    0
Abstract: 

The International Data Encryption Algorithm (IDEA)is a symmetric block Cipher with 64 block size and a 128-bit secret key. This algorithm maps a 64-bits plaintext into 64-bits ciphertext in 8. 5 Encryption rounds. This algorithm has so far been resistant against most known attacks. In this paper, the resistance of IDEA algorithm against correlation power side channel attack is evaluated. By implementing this algorithm on PIC micro controller platform, several samples of power consumption were measured during processing. The results of analyzing the measured samples indicate the resistance of the algorithm to the correlation power side channel analysis.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 955

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2017
  • Volume: 

    3
Measures: 
  • Views: 

    359
  • Downloads: 

    238
Abstract: 

CURRENTLY, STANDARD Encryption ALGORITHMS, SUCH AS AES, ARE USED FOR Encryption OF Data IN CLOUD. AS AES ALGORITHM IS A LOW-SPEED FOR SERIAL, IN ADDITION TO SOLVING ITS LOW-SPEED, A PARALLEL ALGORITHMS IS INTRODUCED. REGARDING THE EXTENT OF CLOUD NETWORK, THE MOST IMPORTANT FEATURE OF THE PROPOSED ALGORITHM IS ITS HIGH SPEED AND RESISTIVITY AGAINST THE ATTACKS. THE ALGORITHM IS DESIGNED AND IMPLEMENTED IN JAVA SCRIPT IN CLOUDSIM ENVIRONMENT. THE RESULTS OBTAINED FROM IMPLEMENTATION OF THIS ALGORITHM IN CLOUD SIMULATING ENVIRONMENT, ARE COMPARED AND EVALUATED RELATIVE TO THE OTHER ALGORITHMS. SIMILAR INPUT WAS FED TO THE PROPOSED AND OTHER ALGORITHMS. THE PROPOSED ALGORITHM PROCESSED THE Data IN 82 MS WHICH IS FASTER THAN THE OTHER ALGORITHM.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 359

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 238
Issue Info: 
  • Year: 

    2023
  • Volume: 

    12
  • Issue: 

    1
  • Pages: 

    30-48
Measures: 
  • Citations: 

    0
  • Views: 

    57
  • Downloads: 

    3
Abstract: 

With the emergence of new phenomena in the telecommunications and information technology fields, such as cloud computing and smart networks, we are witnessing new challenges in these areas. One of the most significant challenges is the privacy of outsourced Data. Due to the limited processing power of new intelligent devices such as tablets and mobile phones, outsourcing computations to these platforms has gained more attention from users. In addition to Data privacy, the security of algorithms used in online software is also of great importance. Therefore, software providers may be concerned about the disclosure of their algorithms after outsourcing them to cloud environments. Existing homomorphic Encryption systems can provide privacy for Data that needs to be processed online. However, the concurrent privacy of algorithms in these systems has not been addressed. To address this, we introduce a simultaneous homomorphic Encryption of Data and function called SHDF. This system can homomorphically encrypt all algorithms used in the software and the Data to be processed on them, enabling necessary computations to be performed on an insecure server. Furthermore, we show that the proposed system is provably secure. Our implementation results indicate that it is usable in cloud environments with the desired efficiency.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 57

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 3 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    16
  • Issue: 

    61-62
  • Pages: 

    282-294
Measures: 
  • Citations: 

    0
  • Views: 

    16
  • Downloads: 

    0
Abstract: 

In order to use the Internet of Things as a secure infrastructure, there are various challenges and problems, of which security is one of the most important. Establishing security in such networks has many complications due to the limitation of various resources, including processing resources and low energy, and there is a need to establish a kind of compromise between security and available resources. These conditions have caused security to become an important challenge in these networks, and various methods have been presented to improve and optimize this challenge. Accordingly, in this article, a lightweight Encryption solution based on symmetric and asymmetric Encryption is presented to ensure Data security on the Internet of Things. In the proposed method, first, the main Data is encrypted by the symmetric Bluefish algorithm, and then its key is secured with the help of the elliptic curve Encryption algorithm, so that as a result, Data security can be ensured in a short time and with high security in infrastructures based on the Internet of Things provided. In the end, the proposed solution has been evaluated through the Eclipse simulator and by testing on the Data volume of 20 to 1000 kilobytes. The simulation results show that the proposed method performs more optimally compared to other Encryption algorithms in terms of evaluation criteria such as execution time and Encryption and decryption throughput. These results indicate that the proposed solution, while establishing security, has had the least negative impact on the processing resources of IoT nodes.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 16

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1395
  • Volume: 

    3
Measures: 
  • Views: 

    3158
  • Downloads: 

    0
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3158

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

Pourhaji S. | Pourmand A.

Issue Info: 
  • Year: 

    2024
  • Volume: 

    53
  • Issue: 

    4
  • Pages: 

    291-297
Measures: 
  • Citations: 

    0
  • Views: 

    44
  • Downloads: 

    5
Abstract: 

In this paper, recommended spiral passive micromixer was designed and simulated. spiral design has the potential to create and strengthen the centrifugal force and the secondary flow. A series of simulations were carried out to evaluate the effects of channel width, channel depth, the gap between loops, and flowrate on the micromixer performance. These features impact the contact area of the two fluids and ultimately lead to an increment in the quality of the mixture. In this study, for the flow rate of 25 μl/min and molecular diffusion coefficient of 1×10-10 m2/s, mixing efficiency of more than 90% is achieved after 30 (approximately one-third of the total channel length). Finally, the optimized design fabricated using proposed 3D printing method.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 44

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 5 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2008
  • Volume: 

    32
  • Issue: 

    B3
  • Pages: 

    265-277
Measures: 
  • Citations: 

    0
  • Views: 

    845
  • Downloads: 

    162
Abstract: 

Application of the network equivalent concept for external system representation for power system transient analysis is well known. However, the challenge to utilize an equivalent network, approximated by a rational function, is to guarantee the passivity of the corresponding model. In this regard, special techniques are required to enforce the passivity of the equivalent model through a post processing approach that minimizes its impact on the original model characteristics. In this paper, the passivity is enforced by expressing the problem in terms of a convex Optimization problem that guarantees the global optimal solution. The convex Optimization problem is efficiently solved by recently developed numerical interior–point methods. This passivity enforcement is also global which indicates that the passivity enforcement in one region does not lead to passivity violation in other regions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 845

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 162 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    8
  • Issue: 

    2
  • Pages: 

    57-71
Measures: 
  • Citations: 

    0
  • Views: 

    83
  • Downloads: 

    2
Abstract: 

An image is a visual representation of something that has been created or copied and stored in electronic form. Securing images is becoming an important concern in today’s information security due to the extensive use of images that are either transmitted over a network or stored on disks. Since public media are unreliable and vulnerable to attacks, Image Encryption is the most effective way to fulfil confidentiality and protect the privacy of images over an unreliable public media.In this paper a new image Encryption algorithm based on Advanced Encryption Standard and DNA sequence is proposed. We present how to encode and decode Data in a DNA sequence based on Codon replacement and how to perform the different steps of AES based DNA. The algorithm is implemented in MATLAB 2012b and various performance metrics are used to evaluate its efficacy. The theoretical and experimental analysis show that the proposed algorithm is efficient in speed and precision. Furthermore, the security analysis proves that proposed algorithm has a good resistance against the noise and known attacks; So that Unbreakability of proposed algorithm is 37.48% better than the compared algorithms.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 83

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Issue Info: 
  • Year: 

    2020
  • Volume: 

    20
  • Issue: 

    suppl 14
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    33
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 33

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button