فیلترها/جستجو در نتایج    

فیلترها

سال

بانک‌ها



گروه تخصصی







متن کامل


اطلاعات دوره: 
  • سال: 

    1379
  • دوره: 

    34
  • شماره: 

    1 (پیاپی 67)
  • صفحات: 

    25-39
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    1706
  • دانلود: 

    352
چکیده: 

در این مقاله سخت افزار سیستم رمزنگار DES طراحی و عملکرد آن بررسی می شود. این سخت افزار که با پالس ساعت MHz 20 کار می کند، قادر است که داده های ورودی را با نرخی برابر Mbps 80 رمز کند که نسبت به سخت افزارهای موجود، دو برابر سریعتر است. سخت افزار طراحی شده بصورت مدار مجتمع ساخته می شود. کلیه مراحل طراحی و بررسی عملکرد سخت افزار با استفاده از زبان استاندارد VHDL انجام شده است. مزیت استفاده از VHDL این است که به سادگی می توان سخت افزار طراحی شده را در یک تراشه ساخت. این کار با استفاده از ابزار مبتنی بر VHDL انجام می شود.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 1706

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 352 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

Palanki Sajjad | Shafieinejad Alireza

اطلاعات دوره: 
  • سال: 

    2022
  • دوره: 

    14
  • شماره: 

    3
  • صفحات: 

    135-149
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    65
  • دانلود: 

    0
چکیده: 

Reliable access control is a major challenge of cloud storage services. This paper presents a cloud-based file-sharing architecture with ciphertext-policy attribute-based Encryption (CP-ABE) access control mechanism. In CP-ABE, the data owner can specify the ciphertext access structure, and if the user key satisfies this access structure, the user can decrypt the ciphertext. The trusted authority embeds the private key of each attribute in a so-called attribute access polynomial and stores its coefficients publicly on the cloud. By means of the access polynomial, each authorized user will be able to retrieve the private key of the attribute by using her/his owned pre-shard key. In contrast, the data owner encrypts the file with a randomly selected key, namely the cipher key. The data owner encrypts the cipher key by CP-ABE scheme with the desired policies. Further, the data owner can create a different polynomial called query access polynomial for multi-keyword searching. Finally, the data owner places the encrypted file along the encrypted cipher key and query access polynomial in the cloud. The proposed scheme supports fast attribute revocation using updating the corresponding access polynomial and re-encrypting the affected cipher keys by the cloud server. Moreover, most of the calculations at the Decryption and searching phases are outsourced to the cloud server, thereby allowing the lightweight nodes with limited resources to act as data users. Our analysis shows that the proposed scheme is both secure and efficient.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 65

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

SHAFEI SHAHIN

اطلاعات دوره: 
  • سال: 

    2014
  • دوره: 

    3
  • شماره: 

    9
  • صفحات: 

    27-33
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    298
  • دانلود: 

    0
چکیده: 

This paper mainly focused on implementation of AES Encryption and Decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterative design approach in order to minimize the hardware consumption. This method can make it a very low-complex architecture, especially in saving the hardware resource in implementing the AES InverseSub Bytes module and Inverse Mix columns module. As the S -box is implemented by look-up-table in this design, the chip area and power can still be optimized. The new Mix Column transformation improves the performance of the inverse cipher and also reduces the complexity of the system that supports the inverse cipher. As a result this transformation has relatively low relevant diffusion power. This allows for scaling of the architecture towards vulnerable portable and cost-sensitive communications devices in consumer and military applications.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 298

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
اطلاعات دوره: 
  • سال: 

    2023
  • دوره: 

    12
  • شماره: 

    1
  • صفحات: 

    31-41
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    12
  • دانلود: 

    0
چکیده: 

One of the most important technologies that has affected our lives today is cyberspace. On the other hand, one of the most important problems of social networks is the disclosure of users' information, i.e. the violation of their privacy. Therefore, protecting the privacy of users is very important, so the use of Encryption methods is an important tool in ensuring the privacy and security of shared data users. The proposed framework of this paper is based on AES and RSA algorithms. This framework is designed to be decentralized and takes advantage of the AES and RSA algorithms to provide a framework that prevents unauthorized entities from accessing users' data and messages. Any safe method must be designed in such a way that there is no escape route for attackers and unauthorized entities. Therefore, our focus is on two important parts of secure methods, namely key management and privacy, which the results of this article show, the security assessment proved that our proposed framework is designed to be completely safe and correct, and increased security and efficiency.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 12

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

Ghasemzadeh Ardalan | B.Speily Omid R.

اطلاعات دوره: 
  • سال: 

    2018
  • دوره: 

    6
  • شماره: 

    4
  • صفحات: 

    220-227
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    211
  • دانلود: 

    0
چکیده: 

With the development of the internet and social networks, the multimedia data, particularly digital images, has been of increasing interest to scientists. Due to their advantages including high speed, high security, and complexity, chaotic functions have been broadly employed in image Encryption. The present paper proposed a modified logistic map function which resulted in higher scattering in the obtained results. Confusion and diffusion functions, as the two main actions in cryptography, are not necessarily performed in order, i. e. each of these two functions can be applied on the image in either order, provided that the sum of total functions does not exceed 10. So, to calculate the sum of functions, confusion has the factor of 1 and diffusion has the factor of 2. To simulate this method, a binary stack was used. Application of binary stack and pseudo-random numbers obtained from the modified chaotic function increased the complexity of the proposed Encryption algorithm. The security key length, entropy value, NPCR and UACI values, and correlation coefficient represented in the analytical results revealed the capability and validity of the proposed method. Analyzing the obtained results and comparing the algorithm to other investigated methods clearly verified high efficiency of the proposed method.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 211

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2023
  • دوره: 

    8
  • شماره: 

    3
  • صفحات: 

    1-18
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    24
  • دانلود: 

    0
چکیده: 

Abstract This paper proposes a new plaintext-related mechanism based on plaintext Encryption.  For simplicity, PCODE was proposed as the image Encryption code. The original picture was encoded to get the proposed Encryption and plaintext Encryption with a chaotic sequence to control the PCODE rules. Another chaotic sequence was encoded into a PCODE sequence for the PCODE XOR operation. The remaining two chaotic sequences were then processed with the proposed scheme to get two key streams for the permutation phase. The cipher image was obtained after the conventional permutation and PCODE XOR operations. The use of the proposed plaintext Encryption leads to the correlation between the keystreams used in the displacement phase and both the secret key and the plaintext image. This correlation increases the sensitivity and security of the Encryption system with respect to the plaintext. The experimental findings from simulation show that the proposed Encryption system shows significant efficiency and security.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 24

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
اطلاعات دوره: 
  • سال: 

    2021
  • دوره: 

    12
  • شماره: 

    Special Issue
  • صفحات: 

    1283-1291
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    37
  • دانلود: 

    0
چکیده: 

In this research paper, we will present how to hide confidential information in a color image randomly using a mathematical equation; by apply this equation to the number of image bytes after converting the image into a digital image, the number of randomly selected bytes depends on the length of the secret message. After specifying the bytes, we include the secret message in those selected bytes utilizing least significant bit (LSB) of steganography, and return the new bytes in the same place in the original image by using the same mathematical equation, after the hiding process using steganography, and then we encrypt the image and send it to the recipient. Several statistical measures applied to the original image, compared with the image after embedding, and after the image encrypted. The results obtained are very good. The statistical measures were used the histogram, mean square error (MSE) and the peak signal to noise ratio (PSNR).The system is designed to perform these processes, which consists of two stages, hiding stage and extract stage. The first stage contains from four steps, the first step of this stage reading the image and converting it to a digital image and make an index on each byte of the image bytes and the application of the mathematical equation to select the bytes by randomly, second step is the process of hiding the secret message in selected bytes and return those bytes to the original locations, third step is the calculation of the statistical measures to determine the rate of confusion after the inclusion of the confidential message, fourth step to encrypt the image of the message carrier and measure the rate of confusion after the Encryption and compare with the original image. The extraction process consists of three steps, the first step is to use the private key to decrypt, and the second step is to apply the same mathematical equation to extract the embedded bytes of the confidential message, third step use the same method of hiding the information and extracting the confidential message.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 37

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    1391
  • دوره: 

    1
تعامل: 
  • بازدید: 

    1140
  • دانلود: 

    388
چکیده: 

امنیت و اعتماد دو رکن اساسی در هر تجارتی به شمار می روند. با ایجاد و گسترش تجارت الکترونیکی و با توجه به شرایط خاص و امتیازات ویژه این نوع از تجارت، توجه به این دو رکن اهمیتی دو چندان می یابد. امضای الکترونیکی و گواهی الکترونیکی ضامن امنیت مبادلات الکترونیکی به شمار می روند. با ورود مفاهیم و روش های جدید در برقراری روابط حقوقی و مناسبات تجاری، مباحث مختلفی در زمینه اعتبار یا عدم اعتبار قانونی و اعمال قواعد حقوقی سنتی موجود در مورد هریک به ویژه در زمینه تجارت الکترونیک و امضای الکترونیک، مطرح شده اند. در این مقاله سعی بر این است تا با بیان مفاهیم مربوطه و مقررات موجود در زمینه امضای الکترونیکی در سطح حقوق بین الملل و حقوق داخلی، اعتبار و ارزش اثباتی اسناد الکترونیک که دارای امضای الکترونیکی هستند را مورد بررسی قرار دهیم.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 1140

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 388
اطلاعات دوره: 
  • سال: 

    2020
  • دوره: 

    5
تعامل: 
  • بازدید: 

    130
  • دانلود: 

    0
چکیده: 

Color image can provide more information than gray image, so it is used more widely in the field of the communication. Protecting this image from unauthorized users, has become critical issue nowadays. In recent years, the chaos-based image Encryption algorithms have attracted a lot of attention because of their dynamic behaviors. This paper introduces a new color image Encryption algorithm based on three-dimensional chaotic economic map. It encrypts three channels of the image Simultaneously, in which, every channel has its own initial key. Also every initial key affects on other two channels. Therefore, in the Decryption process, even an invalid initial key makes the decrypted image obscure from original image. An implementation of the proposed Encryption and Decryption algorithms is performed and the obtained results show that the algorithm can successfully encrypt and decrypt the color image with the same keys. The security of proposed algorithm has been verified by experimental evaluations and security analysis and shown by implementing on different types of color images.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 130

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
اطلاعات دوره: 
  • سال: 

    1396
  • دوره: 

    5
  • شماره: 

    3 (پیاپی 19)
  • صفحات: 

    69-77
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    1273
  • دانلود: 

    286
چکیده: 

ارسال و دریافت اطلاعات، به صورت محرمانه همواره از اهمیت بالایی برخوردار است. علم رمزنگاری نقش عمده ای در تبادل اطلاعات به صورت امن ایفا می کند. به همین منظور، الگوریتم های رمزنگاری متعددی طراحی و پیاده سازی شده است. از میان الگوریتم های طراحی شده، الگوریتم رمزنگاری خم بیضوی، به دلیل ویژگی های منحصر به فردش، جایگزین مناسبی برای الگوریتم های قدیمی تر از قبیل RSA و دیفی هلمن می باشد. در این مقاله، روش کارآمدی برای رمزنگاری تصویر با استفاده از خم های بیضوی ارایه خواهد شد. این طرح پیشنهادی در مقایسه با روش های فعلی دارای سرعت بالاتری در رمزنگاری و رمزگشایی تصویر است. برای این منظور، از روش گروه-بندی پیکسل های تصویر با استفاده از قضیه باقی مانده چینی، استفاده شد. روش پیشنهادی قابل اعمال بر روی سایر داده ها از قبیل متن، صدا و ویدیو می باشد.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 1273

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 286 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button