Search Results/Filters    

Filters

Year

Banks



Expert Group







Full-Text


Author(s): 

SHERAFAT A.R. | MAHZAB M.

Journal: 

Issue Info: 
  • Year: 

    2000
  • Volume: 

    34
  • Issue: 

    1 (67)
  • Pages: 

    25-40
Measures: 
  • Citations: 

    0
  • Views: 

    1706
  • Downloads: 

    0
Keywords: 
Abstract: 

This paper presents the hardware design of the DES Encryption and Decryption systems and try to verify their performances. The hardware uses a clock rate of 20 MHz to encrypt an 80 Mbps input stream. This is twice as fast compared to existing hardware. The system was designed and its performance was Verified using VHDL standard tools. The advantages of using VHDL are that it simplifies the design and verification procedures, and enables one to implement the system into a single integrated circuit.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1706

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    14
  • Issue: 

    3
  • Pages: 

    135-149
Measures: 
  • Citations: 

    0
  • Views: 

    65
  • Downloads: 

    23
Abstract: 

Reliable access control is a major challenge of cloud storage services. This paper presents a cloud-based file-sharing architecture with ciphertext-policy attribute-based Encryption (CP-ABE) access control mechanism. In CP-ABE, the data owner can specify the ciphertext access structure, and if the user key satisfies this access structure, the user can decrypt the ciphertext. The trusted authority embeds the private key of each attribute in a so-called attribute access polynomial and stores its coefficients publicly on the cloud. By means of the access polynomial, each authorized user will be able to retrieve the private key of the attribute by using her/his owned pre-shard key. In contrast, the data owner encrypts the file with a randomly selected key, namely the cipher key. The data owner encrypts the cipher key by CP-ABE scheme with the desired policies. Further, the data owner can create a different polynomial called query access polynomial for multi-keyword searching. Finally, the data owner places the encrypted file along the encrypted cipher key and query access polynomial in the cloud. The proposed scheme supports fast attribute revocation using updating the corresponding access polynomial and re-encrypting the affected cipher keys by the cloud server. Moreover, most of the calculations at the Decryption and searching phases are outsourced to the cloud server, thereby allowing the lightweight nodes with limited resources to act as data users. Our analysis shows that the proposed scheme is both secure and efficient.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 65

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 23 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SHAFEI SHAHIN

Issue Info: 
  • Year: 

    2014
  • Volume: 

    3
  • Issue: 

    9
  • Pages: 

    27-33
Measures: 
  • Citations: 

    0
  • Views: 

    298
  • Downloads: 

    128
Abstract: 

This paper mainly focused on implementation of AES Encryption and Decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterative design approach in order to minimize the hardware consumption. This method can make it a very low-complex architecture, especially in saving the hardware resource in implementing the AES InverseSub Bytes module and Inverse Mix columns module. As the S -box is implemented by look-up-table in this design, the chip area and power can still be optimized. The new Mix Column transformation improves the performance of the inverse cipher and also reduces the complexity of the system that supports the inverse cipher. As a result this transformation has relatively low relevant diffusion power. This allows for scaling of the architecture towards vulnerable portable and cost-sensitive communications devices in consumer and military applications.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 298

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 128 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    12
  • Issue: 

    1
  • Pages: 

    31-41
Measures: 
  • Citations: 

    0
  • Views: 

    12
  • Downloads: 

    1
Abstract: 

One of the most important technologies that has affected our lives today is cyberspace. On the other hand, one of the most important problems of social networks is the disclosure of users' information, i.e. the violation of their privacy. Therefore, protecting the privacy of users is very important, so the use of Encryption methods is an important tool in ensuring the privacy and security of shared data users. The proposed framework of this paper is based on AES and RSA algorithms. This framework is designed to be decentralized and takes advantage of the AES and RSA algorithms to provide a framework that prevents unauthorized entities from accessing users' data and messages. Any safe method must be designed in such a way that there is no escape route for attackers and unauthorized entities. Therefore, our focus is on two important parts of secure methods, namely key management and privacy, which the results of this article show, the security assessment proved that our proposed framework is designed to be completely safe and correct, and increased security and efficiency.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 12

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    6
  • Issue: 

    4
  • Pages: 

    220-227
Measures: 
  • Citations: 

    0
  • Views: 

    211
  • Downloads: 

    122
Abstract: 

With the development of the internet and social networks, the multimedia data, particularly digital images, has been of increasing interest to scientists. Due to their advantages including high speed, high security, and complexity, chaotic functions have been broadly employed in image Encryption. The present paper proposed a modified logistic map function which resulted in higher scattering in the obtained results. Confusion and diffusion functions, as the two main actions in cryptography, are not necessarily performed in order, i. e. each of these two functions can be applied on the image in either order, provided that the sum of total functions does not exceed 10. So, to calculate the sum of functions, confusion has the factor of 1 and diffusion has the factor of 2. To simulate this method, a binary stack was used. Application of binary stack and pseudo-random numbers obtained from the modified chaotic function increased the complexity of the proposed Encryption algorithm. The security key length, entropy value, NPCR and UACI values, and correlation coefficient represented in the analytical results revealed the capability and validity of the proposed method. Analyzing the obtained results and comparing the algorithm to other investigated methods clearly verified high efficiency of the proposed method.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 211

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 122 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    8
  • Issue: 

    3
  • Pages: 

    1-18
Measures: 
  • Citations: 

    0
  • Views: 

    24
  • Downloads: 

    3
Abstract: 

Abstract This paper proposes a new plaintext-related mechanism based on plaintext Encryption.  For simplicity, PCODE was proposed as the image Encryption code. The original picture was encoded to get the proposed Encryption and plaintext Encryption with a chaotic sequence to control the PCODE rules. Another chaotic sequence was encoded into a PCODE sequence for the PCODE XOR operation. The remaining two chaotic sequences were then processed with the proposed scheme to get two key streams for the permutation phase. The cipher image was obtained after the conventional permutation and PCODE XOR operations. The use of the proposed plaintext Encryption leads to the correlation between the keystreams used in the displacement phase and both the secret key and the plaintext image. This correlation increases the sensitivity and security of the Encryption system with respect to the plaintext. The experimental findings from simulation show that the proposed Encryption system shows significant efficiency and security.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 24

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 3 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    12
  • Issue: 

    Special Issue
  • Pages: 

    1283-1291
Measures: 
  • Citations: 

    0
  • Views: 

    37
  • Downloads: 

    7
Abstract: 

In this research paper, we will present how to hide confidential information in a color image randomly using a mathematical equation; by apply this equation to the number of image bytes after converting the image into a digital image, the number of randomly selected bytes depends on the length of the secret message. After specifying the bytes, we include the secret message in those selected bytes utilizing least significant bit (LSB) of steganography, and return the new bytes in the same place in the original image by using the same mathematical equation, after the hiding process using steganography, and then we encrypt the image and send it to the recipient. Several statistical measures applied to the original image, compared with the image after embedding, and after the image encrypted. The results obtained are very good. The statistical measures were used the histogram, mean square error (MSE) and the peak signal to noise ratio (PSNR).The system is designed to perform these processes, which consists of two stages, hiding stage and extract stage. The first stage contains from four steps, the first step of this stage reading the image and converting it to a digital image and make an index on each byte of the image bytes and the application of the mathematical equation to select the bytes by randomly, second step is the process of hiding the secret message in selected bytes and return those bytes to the original locations, third step is the calculation of the statistical measures to determine the rate of confusion after the inclusion of the confidential message, fourth step to encrypt the image of the message carrier and measure the rate of confusion after the Encryption and compare with the original image. The extraction process consists of three steps, the first step is to use the private key to decrypt, and the second step is to apply the same mathematical equation to extract the embedded bytes of the confidential message, third step use the same method of hiding the information and extracting the confidential message.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 37

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 7 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1391
  • Volume: 

    1
Measures: 
  • Views: 

    1140
  • Downloads: 

    0
Abstract: 

امنیت و اعتماد دو رکن اساسی در هر تجارتی به شمار می روند. با ایجاد و گسترش تجارت الکترونیکی و با توجه به شرایط خاص و امتیازات ویژه این نوع از تجارت، توجه به این دو رکن اهمیتی دو چندان می یابد. امضای الکترونیکی و گواهی الکترونیکی ضامن امنیت مبادلات الکترونیکی به شمار می روند. با ورود مفاهیم و روش های جدید در برقراری روابط حقوقی و مناسبات تجاری، مباحث مختلفی در زمینه اعتبار یا عدم اعتبار قانونی و اعمال قواعد حقوقی سنتی موجود در مورد هریک به ویژه در زمینه تجارت الکترونیک و امضای الکترونیک، مطرح شده اند. در این مقاله سعی بر این است تا با بیان مفاهیم مربوطه و مقررات موجود در زمینه امضای الکترونیکی در سطح حقوق بین الملل و حقوق داخلی، اعتبار و ارزش اثباتی اسناد الکترونیک که دارای امضای الکترونیکی هستند را مورد بررسی قرار دهیم.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1140

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    5
Measures: 
  • Views: 

    130
  • Downloads: 

    154
Abstract: 

Color image can provide more information than gray image, so it is used more widely in the field of the communication. Protecting this image from unauthorized users, has become critical issue nowadays. In recent years, the chaos-based image Encryption algorithms have attracted a lot of attention because of their dynamic behaviors. This paper introduces a new color image Encryption algorithm based on three-dimensional chaotic economic map. It encrypts three channels of the image Simultaneously, in which, every channel has its own initial key. Also every initial key affects on other two channels. Therefore, in the Decryption process, even an invalid initial key makes the decrypted image obscure from original image. An implementation of the proposed Encryption and Decryption algorithms is performed and the obtained results show that the algorithm can successfully encrypt and decrypt the color image with the same keys. The security of proposed algorithm has been verified by experimental evaluations and security analysis and shown by implementing on different types of color images.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 130

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 154
Author(s): 

Karamali Gh.R. | Kavand e.

Issue Info: 
  • Year: 

    2017
  • Volume: 

    5
  • Issue: 

    3 (19)
  • Pages: 

    69-77
Measures: 
  • Citations: 

    0
  • Views: 

    1273
  • Downloads: 

    0
Abstract: 

Sending and receiving information confidentially has always been very important. The cryptography Plays a major role in exchanging information securely. For this purpose, several Encryption algorithms are designed and implemented. Among the designed algorithms, the old RSA and Diffie-Hellman algorithms have been superseded by the elliptic curve Encryption algorithm, due to its unique features. The proposed method has higher speed for image Encryption and Decryption in comparison with the current method. For this purpose, the grouping of pixels by remainder Chinese theorem has been employed. The proposed method is applicable on other data such as text, sound and video.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1273

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button