Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2014
  • Volume: 

    5
  • Issue: 

    3
  • Pages: 

    203-210
Measures: 
  • Citations: 

    0
  • Views: 

    873
  • Downloads: 

    0
Abstract: 

In many years Breaking of cryptography Algorithms have been taken into consideration as a challenge. Data Encryption Standard (DES) is used as a standard to keep the information confidential and allows the research studies to investigate it. S-DES is the simplified version of Data Encryption Standard Algorithm which is used by the researchers for investigation. The present study uses SPSO algorithm to break SDES algorithm. To break SDES algorithm the SPSO was optimized. There were some attacks on some blocks of the cipher text and the obtained results revealed that this algorithm had a better performance in detecting main key bits in shortest time so that، in detection factor main key bits، ten main key bits have been discovered and in the time of detection factor main key bits، time over a minute to less than twenty seconds dropped in comparison with Previous work.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 873

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MIRGHADRI A. | BAGHERI H.

Issue Info: 
  • Year: 

    2020
  • Volume: 

    7
  • Issue: 

    4
  • Pages: 

    51-57
Measures: 
  • Citations: 

    0
  • Views: 

    953
  • Downloads: 

    0
Abstract: 

The International Data Encryption Algorithm (IDEA)is a symmetric block Cipher with 64 block size and a 128-bit secret key. This algorithm maps a 64-bits plaintext into 64-bits ciphertext in 8. 5 Encryption rounds. This algorithm has so far been resistant against most known attacks. In this paper, the resistance of IDEA algorithm against correlation power side channel attack is evaluated. By implementing this algorithm on PIC micro controller platform, several samples of power consumption were measured during processing. The results of analyzing the measured samples indicate the resistance of the algorithm to the correlation power side channel analysis.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 953

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2017
  • Volume: 

    3
Measures: 
  • Views: 

    359
  • Downloads: 

    238
Abstract: 

CURRENTLY, STANDARD Encryption ALGORITHMS, SUCH AS AES, ARE USED FOR Encryption OF Data IN CLOUD. AS AES ALGORITHM IS A LOW-SPEED FOR SERIAL, IN ADDITION TO SOLVING ITS LOW-SPEED, A PARALLEL ALGORITHMS IS INTRODUCED. REGARDING THE EXTENT OF CLOUD NETWORK, THE MOST IMPORTANT FEATURE OF THE PROPOSED ALGORITHM IS ITS HIGH SPEED AND RESISTIVITY AGAINST THE ATTACKS. THE ALGORITHM IS DESIGNED AND IMPLEMENTED IN JAVA SCRIPT IN CLOUDSIM ENVIRONMENT. THE RESULTS OBTAINED FROM IMPLEMENTATION OF THIS ALGORITHM IN CLOUD SIMULATING ENVIRONMENT, ARE COMPARED AND EVALUATED RELATIVE TO THE OTHER ALGORITHMS. SIMILAR INPUT WAS FED TO THE PROPOSED AND OTHER ALGORITHMS. THE PROPOSED ALGORITHM PROCESSED THE Data IN 82 MS WHICH IS FASTER THAN THE OTHER ALGORITHM.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 359

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 238
Issue Info: 
  • Year: 

    2023
  • Volume: 

    12
  • Issue: 

    1
  • Pages: 

    30-48
Measures: 
  • Citations: 

    0
  • Views: 

    56
  • Downloads: 

    3
Abstract: 

With the emergence of new phenomena in the telecommunications and information technology fields, such as cloud computing and smart networks, we are witnessing new challenges in these areas. One of the most significant challenges is the privacy of outsourced Data. Due to the limited processing power of new intelligent devices such as tablets and mobile phones, outsourcing computations to these platforms has gained more attention from users. In addition to Data privacy, the security of algorithms used in online software is also of great importance. Therefore, software providers may be concerned about the disclosure of their algorithms after outsourcing them to cloud environments. Existing homomorphic Encryption systems can provide privacy for Data that needs to be processed online. However, the concurrent privacy of algorithms in these systems has not been addressed. To address this, we introduce a simultaneous homomorphic Encryption of Data and function called SHDF. This system can homomorphically encrypt all algorithms used in the software and the Data to be processed on them, enabling necessary computations to be performed on an insecure server. Furthermore, we show that the proposed system is provably secure. Our implementation results indicate that it is usable in cloud environments with the desired efficiency.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 56

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 3 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    16
  • Issue: 

    61-62
  • Pages: 

    282-294
Measures: 
  • Citations: 

    0
  • Views: 

    16
  • Downloads: 

    0
Abstract: 

In order to use the Internet of Things as a secure infrastructure, there are various challenges and problems, of which security is one of the most important. Establishing security in such networks has many complications due to the limitation of various resources, including processing resources and low energy, and there is a need to establish a kind of compromise between security and available resources. These conditions have caused security to become an important challenge in these networks, and various methods have been presented to improve and optimize this challenge. Accordingly, in this article, a lightweight Encryption solution based on symmetric and asymmetric Encryption is presented to ensure Data security on the Internet of Things. In the proposed method, first, the main Data is encrypted by the symmetric Bluefish algorithm, and then its key is secured with the help of the elliptic curve Encryption algorithm, so that as a result, Data security can be ensured in a short time and with high security in infrastructures based on the Internet of Things provided. In the end, the proposed solution has been evaluated through the Eclipse simulator and by testing on the Data volume of 20 to 1000 kilobytes. The simulation results show that the proposed method performs more optimally compared to other Encryption algorithms in terms of evaluation criteria such as execution time and Encryption and decryption throughput. These results indicate that the proposed solution, while establishing security, has had the least negative impact on the processing resources of IoT nodes.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 16

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    8
  • Issue: 

    2
  • Pages: 

    57-71
Measures: 
  • Citations: 

    0
  • Views: 

    82
  • Downloads: 

    2
Abstract: 

An image is a visual representation of something that has been created or copied and stored in electronic form. Securing images is becoming an important concern in today’s information security due to the extensive use of images that are either transmitted over a network or stored on disks. Since public media are unreliable and vulnerable to attacks, Image Encryption is the most effective way to fulfil confidentiality and protect the privacy of images over an unreliable public media.In this paper a new image Encryption algorithm based on Advanced Encryption Standard and DNA sequence is proposed. We present how to encode and decode Data in a DNA sequence based on Codon replacement and how to perform the different steps of AES based DNA. The algorithm is implemented in MATLAB 2012b and various performance metrics are used to evaluate its efficacy. The theoretical and experimental analysis show that the proposed algorithm is efficient in speed and precision. Furthermore, the security analysis proves that proposed algorithm has a good resistance against the noise and known attacks; So that Unbreakability of proposed algorithm is 37.48% better than the compared algorithms.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 82

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Issue Info: 
  • Year: 

    2020
  • Volume: 

    20
  • Issue: 

    suppl 14
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    33
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 33

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

KE C.K. | LIN Z.H.

Journal: 

Scientia Iranica

Issue Info: 
  • Year: 

    2015
  • Volume: 

    22
  • Issue: 

    4 (TRANSACTIONS B: MECHANICAL ENGINEERING)
  • Pages: 

    1586-1593
Measures: 
  • Citations: 

    0
  • Views: 

    256
  • Downloads: 

    304
Abstract: 

Advances in information and communication technology have made mobile devices very easy for people to share and exchange information. However, such exchanges of Data may require privacy, or users may not want that Data to be publically accessible. Data exchange security has therefore also become very important in the development of such devices, and, in fact, in mobile wireless network environments, in which the secure exchange of Data between mobile devices has become an important issue. This study proposes a novel approach for the secure exchange of Data between discrete mobile devices. Cryptographic techniques, including advanced Encryption standard, triple Data Encryption standard, and Data Encryption standard, are enforced in a Data exchange process, and a popular androidbased mobile device is used to test the designed mechanism for secure Data exchange. The experiment results show the Encryption/decryption time of each cryptographic technique working on android-based mobile devices. A comparison of the experiment results also shows which cryptographic technique is appropriate for Data exchange between discrete android-based mobile devices. The contribution of this work is to explore the security issue of the above-mentioned Data, and to recommend an appropriate cryptographic technique for Data exchange between discrete mobile devices.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 256

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 304 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MOHAMMADZADEH ASL N.

Issue Info: 
  • Year: 

    2002
  • Volume: 

    2
  • Issue: 

    5
  • Pages: 

    73-100
Measures: 
  • Citations: 

    2
  • Views: 

    3496
  • Downloads: 

    0
Keywords: 
Abstract: 

The neoclassical growth model is tested by use of panel Data procedure in this research. In the econometric test, simoultanously time series and cross detection will be compared on the basis of panel Data method through which their observed points increase and consequently the estimation efficiency will be increased. The examination of neoclassical growth theory has been done with reference to external & internal factors of 52 selected countries from 1960 to 2000. The independent variable of model has been selected on the basis of the result of previous research which explains the result in three separate models: developed countries, developing countries, and whole countries. These factors are such as: Gross National Products with lag of period, work force age, growth rate, education level, the change of capital accumulation and economic trade volum. The consequences of this research is that: neoclassical growth model can explain the major part of economic growth of the countries with use of internal variables. Also with the use of panel procedure of fixed effect, we can see the fundamental differences and structure of the growth process for different countries; and show how the economic, and social conditions affect on the growth.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3496

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    2
Measures: 
  • Views: 

    134
  • Downloads: 

    115
Abstract: 

IN THIS PAPER, WE REVIEW THE IDENTITY-BASED Encryption SCHEME (IBE) WHICH IS AN EMERGING AREA OF PUBLIC KEY CRYPTOGRAPHY. IN IBE SCHEME Encryption KEY CAN BE ANY STRING (SUCH EMAIL ADDRESS, PHONE NUMBER). FIRST OF ALL, WE GIVE THE BASIC CONSEPTS OF IBE SCHEMES AND SUBSECUENTLY EXPLAIN AN IBE SCHEME BASED ON BILINEAR MAPS BETWEEN GROUPS. FINALLY, WE DISCUSS ADVANTAGES AND DISADVANTAGES OF IBE SCHEMES.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 134

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 115
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button