期刊文献+
共找到1,118篇文章
< 1 2 56 >
每页显示 20 50 100
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
1
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 Data encryption Data decryption Communication security Data storage encryption Key management
在线阅读 下载PDF
A Recursive Method to Encryption-Decryption-Based Distributed Set-Membership Filtering for Time-Varying Saturated Systems Over Sensor Networks
2
作者 Jun Hu Jiaxing Li +2 位作者 Chaoqing Jia Xiaojian Yi Hongjian Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第5期1047-1049,共3页
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt... Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided. 展开更多
关键词 time varying saturated systems signal transmission processspecificallya encryption decryption mechanism sensor networks recursive method distributed set membership filtering
在线阅读 下载PDF
Femtosecond laser subtractive/additive-integrated biomimetic manufacturing for visible/infrared encryption and stimuli-responsive infrared decryption
3
作者 Ruijie Liu Dongshi Zhang Zhuguo Li 《International Journal of Extreme Manufacturing》 2025年第4期387-404,共18页
Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,... Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension. 展开更多
关键词 femtosecond laser biomimetic manufacturing black particle aggregates subtractive/additive-integrated manufacturing intrinsic visible-infrared encryption stimuli responsive decrypted IR display
在线阅读 下载PDF
Encryption and Decryption of Color Images through Random Disruption of Rows and Columns
4
作者 ZENG Jianhua ZHAN Yanlin YANG Jianrong 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期245-255,共11页
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o... In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value. 展开更多
关键词 color image encryptION decryptION single channel RGB component image disrupting
在线阅读 下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
5
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image encryption and decryption Two-Stage Logistic Mapping M Sequence
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
6
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
基于PUF的TPM架构设计与应用研究
7
作者 施江勇 高志远 +4 位作者 刘天祎 刘威 郭振斌 张咏鼎 李少青 《计算机工程与科学》 北大核心 2026年第1期51-60,共10页
现有的可信平台模块TPM主要依赖单一RSA公私钥对作为安全的可信根基础,该RSA密钥对固定不变地存储于TPM芯片中。因此,此种设计架构可能使得系统面临着物理分析与侧信道分析等物理层面攻击的威胁,进而导致系统的安全性难以得到有效保障... 现有的可信平台模块TPM主要依赖单一RSA公私钥对作为安全的可信根基础,该RSA密钥对固定不变地存储于TPM芯片中。因此,此种设计架构可能使得系统面临着物理分析与侧信道分析等物理层面攻击的威胁,进而导致系统的安全性难以得到有效保障。为此,提出采用物理不可克隆函数PUF作为可信根,利用PUF具有的物理不可篡改性、随机性和不可预测性等安全特性,设计并实现了基于PUF的TPM架构。此外,还针对现有研究中密钥生成算法存在的安全漏洞以及认证机制的不完善等问题进行了有效的改进,并将改进后的设计应用于可信启动验证及固件的安全更新中,从而有效提升了可信计算环境面临安全威胁的防御能力。通过BAN逻辑和协议自动化验证工具AVISPA对所提协议的安全性进行了深入分析,并在Zynq^(TM)7000系列开发板上实现了可信启动的相关实验,结果表明了所提出的方法可增强密钥生成算法的安全性,并有效降低了对引导程序和固件更新数据进行篡改等攻击的威胁。性能评估结果显示,所提协议整个认证过程平均时长仅0.06 s,展现出了其在性能上的优越性。 展开更多
关键词 加解密 PUF 可信启动 固件更新 认证协议
在线阅读 下载PDF
支持属性更新和撤销的文件安全共享方案
8
作者 李莉 朱江文 +2 位作者 杨春艳 史国振 董秀则 《计算机应用与软件》 北大核心 2026年第2期55-63,99,共10页
属性基加密(Attribute-based Encryption,ABE)方案多用于文件安全共享应用场景下的文件访问控制。如何实现用户属性动态变化下数据文件的高效安全共享是研究的热点问题之一。针对此问题,提出一种支持属性更新和撤销的属性基加密文件安... 属性基加密(Attribute-based Encryption,ABE)方案多用于文件安全共享应用场景下的文件访问控制。如何实现用户属性动态变化下数据文件的高效安全共享是研究的热点问题之一。针对此问题,提出一种支持属性更新和撤销的属性基加密文件安全共享方案。该方案围绕文件安全共享问题,设计可实时撤销和动态更新用户属性的ABE方案。在密钥生成中心和用户之间使用安全的密钥分发协议,密钥生成中心无法计算完整的解密密钥,解决密钥托管问题。通过将加解密过程中的部分运算外包给代理服务器,用户只需一次指数运算就能获得明文。通过与已有方案的比较可知,该方案的加解密开销、私钥存储开销更低,且无须更新密文,具有更高的撤销效率。 展开更多
关键词 属性基加密 属性更新和撤销 密钥托管 解密外包
在线阅读 下载PDF
网络安全中的数据加密与解密技术研究
9
作者 林明亮 《移动信息》 2026年第1期122-124,共3页
随着数字化时代的到来,数据加密与解密技术在网络安全领域得到了极大发展。文中针对网络安全领域的数据加密与解密技术进行了研究,深入分析了其中的关键技术,探讨了加密算法分类及其核心机制,阐述了数据完整性验证技术、密钥全生命周期... 随着数字化时代的到来,数据加密与解密技术在网络安全领域得到了极大发展。文中针对网络安全领域的数据加密与解密技术进行了研究,深入分析了其中的关键技术,探讨了加密算法分类及其核心机制,阐述了数据完整性验证技术、密钥全生命周期管理机制以及传输层加密与协议优化相关内容。研究表明,当前网络安全的数据加密与解密技术已构建多层次技术体系,为网络通信的数据安全提供了可靠保障。 展开更多
关键词 网络安全 数据加密 解密技术 解密算法原理
在线阅读 下载PDF
基于UltraScale架构的数据加密方法研究
10
作者 唐李杨 《电子技术应用》 2026年第1期38-42,共5页
针对航空通信机载设备核心功能以及知识产权的保护,结合UltraScale芯片的架构特点,研究并提出了一种基于UltraScale架构的数据加密方法。该方法将UltraScale芯片的PS和PL的DNA序列号以及用户自定义信息进行联合加密,并设计了一种明文信... 针对航空通信机载设备核心功能以及知识产权的保护,结合UltraScale芯片的架构特点,研究并提出了一种基于UltraScale架构的数据加密方法。该方法将UltraScale芯片的PS和PL的DNA序列号以及用户自定义信息进行联合加密,并设计了一种明文信息校验格式,采用离线加密和在线解密的方式完成设备加解密功能。实验结果表明,提出的设计方法有效可行,设备加解密功能正常,提高了设备的安全性,有效保护了用户知识产权。目前,该技术已在航空通信多型设备中得到应用,具有较强的实用性。 展开更多
关键词 UltraScale架构 数据加密 DNA获取 密钥存储 加解密算法
在线阅读 下载PDF
无线有线双通道通信加密装置的研制
11
作者 陈邦炯 林驰驰 +3 位作者 林逸驹 许东阳 张晓宇 黄梓涛 《无线互联科技》 2026年第3期5-10,共6页
为解决传统单通道通信加密可靠性不足、加密性能与实时性矛盾及异构网络协同缺失等问题,满足电力配网自动化等场景的应用需求,文章研制了无线有线双通道通信加密装置。通过突破双隧道IPSec冗余架构、硬件加速加密引擎、双链路双协议并... 为解决传统单通道通信加密可靠性不足、加密性能与实时性矛盾及异构网络协同缺失等问题,满足电力配网自动化等场景的应用需求,文章研制了无线有线双通道通信加密装置。通过突破双隧道IPSec冗余架构、硬件加速加密引擎、双链路双协议并发协同等核心技术,硬件端集成高性能组件并强化抗干扰设计,软件端优化系统与IPSec协议栈,最终实现设计目标。测试结果表明,该装置的加密速度、吞吐量远超同类产品,延迟控制在毫秒级,双通道切换时间<100 ms,通信可靠性超99.99%。在电力、安防、工业等领域的应用中,该装置有效解决了行业通信痛点,显著降低了成本损失。 展开更多
关键词 无线有线双通道 通信加密装置 双隧道IPSec冗余架构 硬件加速加密引擎 异构网络协同 通信可靠性 电力配网自动化
在线阅读 下载PDF
Optical coherence engineering encryption for secure and robust information transmission
12
作者 XINSHUN ZHAO YING XU +6 位作者 SHUQIN LIN YITONG SHAO JIDONG WU XINLEI ZHU XIAOFENG PENG YANGJIAN CAI JIAYI YU 《Photonics Research》 2025年第11期I0032-I0038,共7页
The rapid globalization of the digital ecosystem has elevated information security to a critical concern in modern society. Optical encryption offers an effective approach for enhancing information protection;however,... The rapid globalization of the digital ecosystem has elevated information security to a critical concern in modern society. Optical encryption offers an effective approach for enhancing information protection;however, existing optical encryption strategies are unable to reliably recover encrypted information following free-space transmission. To address this challenge, we propose a novel protocol named the optical coherence engineering encryption protocol(OCE-Encryption Protocol). By jointly manipulating the optical coherence structure and introducing astigmatic phase modulation, the protocol generates a spectral intensity ciphertext capable of secure free-space transmission. At the receiver, the original information can be accurately reconstructed by measuring the optical coherence structure of the received ciphertext and applying the correct decryption key. Furthermore, the proposed protocol demonstrates strong resilience to transmission channel disturbances. We hope that optical coherence engineering can expand the functional boundaries of existing optical encryption protocols and provide a pathway toward next-generation secure optical communication systems. 展开更多
关键词 optical coherence engineering encryption protocol oce encryption digital ecosystem information security enhancing information protectionhoweverexisting optical encryption jointly manipulating opti optical coherence engineering encrypted information
原文传递
Digital image encryption with chaotic map lattices 被引量:8
13
作者 孙福艳 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期132-138,共7页
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o... This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency. 展开更多
关键词 image encryption image decryption chaotic map lattice CRYPTOGRAPHY spatiotemporal chaotic system
原文传递
Substring-searchable attribute-based encryption and its application for IoT devices 被引量:3
14
作者 Xi Sun Hao Wang +4 位作者 Xiu Fu Hong Qin Mei Jiang Likun Xue Xiaochao Wei 《Digital Communications and Networks》 SCIE CSCD 2021年第2期277-283,共7页
With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data lea... With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data leakage.A common method to prevent data leakage is to encrypt the data before uploading it,but the traditional encryption method is often not conducive to data sharing and querying.In this paper,a new kind of Attribute-Based Encryption(ABE)scheme,which is called the Sub-String Searchable ABE(SSS-ABE)scheme,is proposed for the sharing and querying of the encrypted data.In the SSS-ABE scheme,the data owner encrypts the data under an access structure,and only the data user who satisfies the access structure can query and decrypt it.The data user can make a substring query on the whole ciphertext without setting keywords in advance.In addition,the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices. 展开更多
关键词 Attribute-based encryption Searchable encryption Outsourcing decryption IoT divices
在线阅读 下载PDF
Decryption of pure-position permutation algorithms 被引量:3
15
作者 赵晓宇 陈刚 +2 位作者 张亶 王肖虹 董光昌 《Journal of Zhejiang University Science》 EI CSCD 2004年第7期803-809,共7页
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ... Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown. 展开更多
关键词 decryptION Image encryption FUZZY Position permutation
在线阅读 下载PDF
A Novel Image Encryption Technique Based on Inter Block Difference 被引量:1
16
作者 THAMANAM Srinivasa Rao Potti Nagaraja +1 位作者 B.Balaji Naik K.Manjunathachari 《Journal of Shanghai Jiaotong university(Science)》 EI 2021年第4期488-493,共6页
Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic device... Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic devices. Among all the forms of data, image is an important aspect that still needs methodologies to be stored securely. This work focuses on a novel technique to secure images using inter block difference and advanced encryption standard (AES). The AES algorithm is chosen for encryption since there is no prevalent attack that is successful in analyzing it. Instead of encrypting the entire image, only a part of the image is encrypted. The proposed work is found to reduce the encryption overhead in a significant way and at the same time preserves the safety of the image. It is also observed that the decryption is done in an efficient and time preserving manner. 展开更多
关键词 encryptION decryptION inter block difference advanced encryption standard(AES)
原文传递
Optical encryption with cascaded fractional wavelet transforms 被引量:1
17
作者 BAO Liang-hua CHEN Lin-fei ZHAO Dao-mu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第8期1431-1435,共5页
On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractiona... On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractional orders, standard focal lengths and scaling factors are its keys. Multistage fractional Fourier transforms can add the keys easily and strengthen information se-curity. This method can also realize partial encryption just as wavelet transform and fractional wavelet transform. Optical reali-zation of encryption and decryption is proposed. Computer simulations confirmed its possibility. 展开更多
关键词 Wavelet transform (WT) Cascaded fractional wavelet transform (CFWT) encryptION decryptION
在线阅读 下载PDF
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance
18
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2022年第11期3827-3845,共19页
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of images.Since the work is done offshore,these agreements or images must be shared through the Internet or stored over the cloud.The breach of privacy,on the other hand,is a potential threat for the image owners as both the Internet and cloud servers are not void of danger.This article proposes a novel algorithm for securing the NDAs in the form of images.As an agreement is signed between the two parties,it will be encrypted before sending to the cloud server or travelling through the public network,the Internet.As the image is input to the algorithm,its pixels would be scrambled through the set of randomly generated rectangles for an arbitrary amount of time.The confusion effects have been realized through an XOR operation between the confused image,and chaotic data.Besides,5D multi-wing hyperchaotic system has been employed to spawn the chaotic vectors due to good properties of chaoticity it has.The machine experimentation and the security analysis through a comprehensive set of validation metric vividly demonstrate the robustness,defiance to the multifarious threats and the prospects for some real-world application of the proposed encryption algorithm for the NDA images. 展开更多
关键词 Non-disclosure agreement encryption decryptION secret key chaoticmap CONFUSION diffusion
在线阅读 下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
19
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT encryption decryptION cloud security matrix cipher
在线阅读 下载PDF
Chaos-Based Encryption of ECG Signals: Experimental Results
20
作者 Gutenbert Kenfack Alain Tiedeu 《Journal of Biomedical Science and Engineering》 2014年第6期368-379,共12页
In this work, we suggest a system for chaos-based encryption of electrocardiographic signals. It uses simple electronics organized around a colpitts chaotic oscillator. The system has been designed, implemented and te... In this work, we suggest a system for chaos-based encryption of electrocardiographic signals. It uses simple electronics organized around a colpitts chaotic oscillator. The system has been designed, implemented and tested. The encrypted signal has been decrypted and compared to the original ECG signal. Experimental results were analysed and proved encouraging. 展开更多
关键词 ECG COLPITTS OSCILLATOR CHAOS encryptION decryptION
在线阅读 下载PDF
上一页 1 2 56 下一页 到第
使用帮助 返回顶部