Search Results/Filters    

Filters

Year

Banks



Expert Group










Full-Text


Issue Info: 
  • Year: 

    2024
  • Volume: 

    16
  • Issue: 

    61-62
  • Pages: 

    282-294
Measures: 
  • Citations: 

    0
  • Views: 

    16
  • Downloads: 

    0
Abstract: 

In order to use the Internet of Things as a secure infrastructure, there are various challenges and problems, of which security is one of the most important. Establishing security in such networks has many complications due to the limitation of various resources, including processing resources and low energy, and there is a need to establish a kind of compromise between security and available resources. These conditions have caused security to become an important challenge in these networks, and various methods have been presented to improve and optimize this challenge. Accordingly, in this article, a Lightweight Encryption solution based on symmetric and asymmetric Encryption is presented to ensure data security on the Internet of Things. In the proposed method, first, the main data is encrypted by the symmetric Bluefish algorithm, and then its key is secured with the help of the elliptic curve Encryption algorithm, so that as a result, data security can be ensured in a short time and with high security in infrastructures based on the Internet of Things provided. In the end, the proposed solution has been evaluated through the Eclipse simulator and by testing on the data volume of 20 to 1000 kilobytes. The simulation results show that the proposed method performs more optimally compared to other Encryption Algorithms in terms of evaluation criteria such as execution time and Encryption and decryption throughput. These results indicate that the proposed solution, while establishing security, has had the least negative impact on the processing resources of IoT nodes.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 16

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    12
  • Issue: 

    1
  • Pages: 

    87-94
Measures: 
  • Citations: 

    0
  • Views: 

    205
  • Downloads: 

    154
Abstract: 

Side-channel attacks are considered to be the most important problems of modern digital security systems. Today, Differential Power Attack (DPA) is one of the most powerful tools for attacking hardware Encryption Algorithms in order to discover the correct key of the system. In this work, a new scheme based on randomizing power consumption of a fixed-operation logic gate is proposed. The goal of this method is enhancing the immunity of AES algorithm against DPA. Having a novel topology to randomize the power consumption of each Exclusive-NOR gate, the proposed circuit causes random changes in the overall power consumption of the steps of the algorithm; thus, the correlation between the instantaneous power consumption and the correct key is decreased and the immunity of the AES implementations which the key is injected into their process through Exclusive-NOR gates is extremely increased. The proposed method can be used as a general hardening method in the majority of cryptographic Algorithms. The results of theoretical analysis and simulations in 90-nm technology demonstrate the capability of the proposed circuits to strengthen AES against DPA. The CMOS area and power consumption overhead is less than 1%.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 205

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 154 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    12
  • Issue: 

    1
  • Pages: 

    31-41
Measures: 
  • Citations: 

    0
  • Views: 

    12
  • Downloads: 

    1
Abstract: 

One of the most important technologies that has affected our lives today is cyberspace. On the other hand, one of the most important problems of social networks is the disclosure of users' information, i.e. the violation of their privacy. Therefore, protecting the privacy of users is very important, so the use of Encryption methods is an important tool in ensuring the privacy and security of shared data users. The proposed framework of this paper is based on AES and RSA Algorithms. This framework is designed to be decentralized and takes advantage of the AES and RSA Algorithms to provide a framework that prevents unauthorized entities from accessing users' data and messages. Any safe method must be designed in such a way that there is no escape route for attackers and unauthorized entities. Therefore, our focus is on two important parts of secure methods, namely key management and privacy, which the results of this article show, the security assessment proved that our proposed framework is designed to be completely safe and correct, and increased security and efficiency.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 12

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    621
  • Volume: 

    16
  • Issue: 

    4
  • Pages: 

    93-102
Measures: 
  • Citations: 

    0
  • Views: 

    7
  • Downloads: 

    0
Abstract: 

With the expansion of Internet of Things (IoT) services and the use of satellite communications, according to the regional or continental extent of these services, the need for Lightweight Encryption has increased. In satellite communications, security cannot be fully implemented given the long transmission distances, rendering heavy Encryption Algorithms, such as RSA, unreliable. ECC using mathematical solutions and elliptic curve discrete logarithm problems (ECDLP) can be considered a Lightweight algorithm in telecommunications. Here, we propose a new strategy for secure IOT data communication between a satellite link and a terrestrial link that uses the principles of ECC elliptic curve cryptography and the NIST P-256 standard for key agreement and Encryption for transmitting messages over the satellite communication platform.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 7

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2011
  • Volume: 

    1
  • Issue: 

    2
  • Pages: 

    105-115
Measures: 
  • Citations: 

    0
  • Views: 

    1488
  • Downloads: 

    0
Abstract: 

In e-Cash, signer must sign a value without seeing it's content directly. Traditional RSA based approaches encounter a fundamental problem named Chosen Text Attack. The main aim of this research is to propose an approach to overcome such attack. Although using random values in signature apparently raise computational complexity, it guaranties security. In this paper, computational complexity of the proposed approach has been studied and its superiority compared to the regular blind signature approach of Fan et al. has been approved. Resistance against forgery, which is the main objective of the new signature approach has also been studied and approved.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1488

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 6
Issue Info: 
  • Year: 

    2022
  • Volume: 

    11
  • Issue: 

    1
  • Pages: 

    37-47
Measures: 
  • Citations: 

    0
  • Views: 

    110
  • Downloads: 

    0
Abstract: 

The use of Lightweight and light weight block ciphers in the Internet of Things is inevitable. Recently, Midori64 has received a lot of attention among other Lightweight ciphers due to its very low power consumption. Midori64 security has been threatened by various attacks, including side channel attacks. One of the types of side channel attacks is correlation power analysis, in which an attacker can discover the Encryption key by using the power leak of the cryptographic chip while the algorithm is running, data being processed and operations being executed. Masking against power analysis attacks is known as one of the most effective methods of cryptographic Algorithms. The purpose of the mask is to disrupt the relationship between power consumption and ongoing operations. In this paper, an implemented version of the Midori64 code on an Atmega32 AVR micro-controller is attacked by correlation power analysis, and an Encryption key with 300 blocks of plain text is discovered. After masking the Midori64 with the Boolean masking method, the attack was performed again, and the experimental results showed that the Boolean masking method could prevent key discovery.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 110

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    8
  • Issue: 

    2
  • Pages: 

    57-71
Measures: 
  • Citations: 

    0
  • Views: 

    82
  • Downloads: 

    2
Abstract: 

An image is a visual representation of something that has been created or copied and stored in electronic form. Securing images is becoming an important concern in today’s information security due to the extensive use of images that are either transmitted over a network or stored on disks. Since public media are unreliable and vulnerable to attacks, Image Encryption is the most effective way to fulfil confidentiality and protect the privacy of images over an unreliable public media.In this paper a new image Encryption algorithm based on Advanced Encryption Standard and DNA sequence is proposed. We present how to encode and decode data in a DNA sequence based on Codon replacement and how to perform the different steps of AES based DNA. The algorithm is implemented in MATLAB 2012b and various performance metrics are used to evaluate its efficacy. The theoretical and experimental analysis show that the proposed algorithm is efficient in speed and precision. Furthermore, the security analysis proves that proposed algorithm has a good resistance against the noise and known attacks; So that Unbreakability of proposed algorithm is 37.48% better than the compared Algorithms.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 82

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

AZIZI M. | Afianian a.

Issue Info: 
  • Year: 

    2018
  • Volume: 

    6
  • Issue: 

    1 (21)
  • Pages: 

    57-68
Measures: 
  • Citations: 

    0
  • Views: 

    575
  • Downloads: 

    0
Abstract: 

In cloud computing and the data storage services they offer, what impedes their adoption by organizations with classified data is the issue of security (confidentiality, integrity, availability). Although, the confidentiality of data could be preserved against external adversary by the server-side Encryption, the cloud owner or cloud’ s super users still are in possession of Encryption keys. Hence they have access to users’ data which compromise their confidentiality. In this paper, we offer the SeIDA (PAD) algorithm which enables us to confidently outsource our security-sensitive data to untrusted cloud environments and benefit their features. Despite conventional methods which store data on one specific cloud service provider, the SeIDA algorithm breaks the user’ s file into N distinct, unrecognizable segments and stores each one on a different cloud. We have accomplished this by adding a Lightweight pre-processing phase to Rabin’ s information dispersal algorithm while at the same time, we have employed a novel distributed-based key management technique for achieving keyless security and hence we obviate many of the related challenges (secure key generation, preserving Encryption keys etc. ). Due to SeIDA’ s efficiency, other than a web application, it can be directly implemented and utilized as a mobile application.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 575

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

ESFAHANI M.R. | SOROUSH H.

Journal: 

AMIRKABIR

Issue Info: 
  • Year: 

    2005
  • Volume: 

    16
  • Issue: 

    61-C
  • Pages: 

    109-119
Measures: 
  • Citations: 

    0
  • Views: 

    973
  • Downloads: 

    0
Abstract: 

In this papers, the punching shear strength of flat plate Lightweight concrete slabs, using natural Lightweight aggregates, is studied. In the experimental part of the study, six specimens of rectangular Lightweight concrete slabs have been manufactured and tested. The strength of concrete and reinforcement varied in different tests. The slab dimensions and the area of reinforcing bars in slabs have been carefully designed so that the slabs failed due to punching shear. In each test, load and displacement were measured using a computer data acquisition system. The behavior of slabs, cracking pattern and the slab stiffness were studied from the test results. The experimental results have been compared with the provisions of different codes. The comparison shows that the BS-8110 Code estimates the punching shear of Lightweight slabs most accurately. The slabs made of natural Lightweight aggregates can be used in structures by providing good concrete mixture designs.    

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 973

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    2
Measures: 
  • Views: 

    134
  • Downloads: 

    115
Abstract: 

IN THIS PAPER, WE REVIEW THE IDENTITY-BASED Encryption SCHEME (IBE) WHICH IS AN EMERGING AREA OF PUBLIC KEY CRYPTOGRAPHY. IN IBE SCHEME Encryption KEY CAN BE ANY STRING (SUCH EMAIL ADDRESS, PHONE NUMBER). FIRST OF ALL, WE GIVE THE BASIC CONSEPTS OF IBE SCHEMES AND SUBSECUENTLY EXPLAIN AN IBE SCHEME BASED ON BILINEAR MAPS BETWEEN GROUPS. FINALLY, WE DISCUSS ADVANTAGES AND DISADVANTAGES OF IBE SCHEMES.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 134

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 115
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button