Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,...Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension.展开更多
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i...With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers.展开更多
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built...A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data.展开更多
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o...This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.展开更多
A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed i...A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed into an arbitrary elliptical polarization state, To verify the identity of a communicator, a reverse procedure is performed by the receiver, For simply describing the transformation procedure, the analytical methods of Poincaré sphere and quaternion are adopted. Since quantum noise provides such a measurement uncertainty for the eavesdropping that the identity information cannot be retrieved from the elliptical polarization state, the proposed scheme is secure.展开更多
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ...Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown.展开更多
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt...An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU.展开更多
With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data lea...With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data leakage.A common method to prevent data leakage is to encrypt the data before uploading it,but the traditional encryption method is often not conducive to data sharing and querying.In this paper,a new kind of Attribute-Based Encryption(ABE)scheme,which is called the Sub-String Searchable ABE(SSS-ABE)scheme,is proposed for the sharing and querying of the encrypted data.In the SSS-ABE scheme,the data owner encrypts the data under an access structure,and only the data user who satisfies the access structure can query and decrypt it.The data user can make a substring query on the whole ciphertext without setting keywords in advance.In addition,the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices.展开更多
The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario....The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario.The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data.This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound,thereby disregarding the pins’manual verification.Further,the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches.Firstly,a random signal is encrypted,and then it is transformed into a wave file,after which it gets transmitted in a short burst via the device’s speakers.Subsequently,the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing.Besides,this model requires two devices/gadgets with speakers and a microphone,and no extra hardware such as a camera,for reading the QR code is required.The first module is tested with realtime data and generates high scores for the widely accepted accuracy metrics,including precision,Recall,F1 score,entropy,and mutual information(MI).Additionally,this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files.This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file.Several encryption algorithms and their combinations are taken for this system to compare the resultant file size.Both these systems engender high accuracies and provide secure connectivity,leading to a sustainable communication ecosystem.展开更多
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa...The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.展开更多
With the rapid changes in the field of information,the research and development of optical storage materials with high security and large storage capacity are particularly important in the development of contemporary ...With the rapid changes in the field of information,the research and development of optical storage materials with high security and large storage capacity are particularly important in the development of contemporary society.However,conventional memo ry materials with static fluorescent outputs have the disadvantages of easy simulation and forgery,which limits their practical application in the protection of confidential information.In this research,a dual-stimuli-responsive intelligent fluorescent material based on Tb^(3+)and Eu^(3+)ions doped layered lanthanide hydroxide(LYH:Eu_(x)Tb_(1-x)DPA)was fabricated,which can realize reversible multi-color luminescence conversion(from green to red)by varying the pH and temperature.Combined with the Morse code and security pattern,the multiple encryption and decryption of confidential information and anti-counterfeiting can also be realized.Therefore,the obtained intelligent fluorescent material has a great application prospect for information security.In addition,due to the excellent color tunability,the material can provide the possibility to obtain potential fingerprints with high contrast and no background interference on different color substrates.The unique dual-stimuli-responsive behavior of this material provides more ingenious design inspiration for the design of multi-color intelligent fluorescent devices.展开更多
In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext ot...In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples.展开更多
On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractiona...On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractional orders, standard focal lengths and scaling factors are its keys. Multistage fractional Fourier transforms can add the keys easily and strengthen information se-curity. This method can also realize partial encryption just as wavelet transform and fractional wavelet transform. Optical reali-zation of encryption and decryption is proposed. Computer simulations confirmed its possibility.展开更多
Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic device...Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic devices. Among all the forms of data, image is an important aspect that still needs methodologies to be stored securely. This work focuses on a novel technique to secure images using inter block difference and advanced encryption standard (AES). The AES algorithm is chosen for encryption since there is no prevalent attack that is successful in analyzing it. Instead of encrypting the entire image, only a part of the image is encrypted. The proposed work is found to reduce the encryption overhead in a significant way and at the same time preserves the safety of the image. It is also observed that the decryption is done in an efficient and time preserving manner.展开更多
A Wireless Sensor Network(WSN)is constructed with numerous sensors over geographical regions.The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy.As sensor no...A Wireless Sensor Network(WSN)is constructed with numerous sensors over geographical regions.The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy.As sensor nodes are resource constrained in nature,novel techniques are essential to improve lifetime of nodes in WSN.Nodes energy is considered as an important resource for sensor node which are battery powered based.In WSN,energy is consumed mainly while data is being transferred among nodes in the network.Several research works are carried out focusing on preserving energy of nodes in the network and made network to live longer.Moreover,this network is threatened by attacks like vampire attack where the network is loaded by fake traffic.Here,Dual Encoding Recurrent Neural network(DERNNet)is proposed for classifying the vampire nodes s node in the network.Moreover,the Grey Wolf Optimization(GWO)algorithm helps for transferring the data by determining best solutions to optimally select the aggregation points;thereby maximizing battery/lifetime of the network nodes.The proposed method is evaluated with three standard approaches namely Knowledge and Intrusion Detection based Secure Atom Search Routing(KIDSASR),Risk-aware Reputation-based Trust(RaRTrust)model and Activation Function-based Trusted Neighbor Selection(AF-TNS)in terms of various parameters.These existing methods may lead to wastage of energy due to vampire attack,which further reduce the lifetime and increase average energy consumed in the network.Hence,the proposed DERNNet method achieves 31.4%of routing overhead,23%of end-to-end delay,78.6%of energy efficiency,94.8%of throughput,28.2%of average latency,92.4%of packet delivery ratio,85.2%of network lifetime,and 94.3%of classification accuracy.展开更多
In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which...In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.Abstract: In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.展开更多
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor...In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well.展开更多
In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive c...In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously.展开更多
With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of d...With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of data user can be maintained as well as security and privacy of data provided to the user. Symmetric key cryptography is a part of the cryptographic technique which ensures high security and confidentiality of data transmitted through the communication channel using a common key for both encryption and decryption. In this paper I have analyzed comparative encryption algorithms in performance, three most useful algorithms: Data Encryption Standard (DES), Triple DES (3DES) also known as Triple Data Encryption Algorithm (TDEA), and Advanced Encryption Standard (AES). They have been analyzed on their ability to secure data, time taken to encrypt data and throughput the algorithm requires. The performance of different algorithms differs according to the inputs.展开更多
基金financially supported by Shanghai Pujiang Program 23PJ1406500.
文摘Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension.
文摘With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers.
基金funded by Princess Nourah bint Abdulrahman UniversityResearchers Supporting Project number (PNURSP2024R408), Princess Nourah bint AbdulrahmanUniversity, Riyadh, Saudi Arabia.
文摘A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61001099 and 10971120)the Foundation for the Author of National Excellent Doctoral Dissertation of China (Grant No. 200444)
文摘This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.
基金Project supported by the National Natural Science Foundation of China (Grant No 60472018).
文摘A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed into an arbitrary elliptical polarization state, To verify the identity of a communicator, a reverse procedure is performed by the receiver, For simply describing the transformation procedure, the analytical methods of Poincaré sphere and quaternion are adopted. Since quantum noise provides such a measurement uncertainty for the eavesdropping that the identity information cannot be retrieved from the elliptical polarization state, the proposed scheme is secure.
基金Project supported by the National Natural Science Foundationof China (Nos. 60302012+2 种基金 60202002) and the Youth ScientificResearch Foundation of Ningbo (No. 2003A61006) China
文摘Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown.
文摘An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU.
基金This work is supported by the National Natural Science Foundation of China(No.62071280,No.61602287)the Major Scientific and Technological Innovation Project of Shandong Province(No.2020CXGC010115)the Guangxi Key Laboratory of Cryptography and Information Security(GCIS201901).
文摘With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data leakage.A common method to prevent data leakage is to encrypt the data before uploading it,but the traditional encryption method is often not conducive to data sharing and querying.In this paper,a new kind of Attribute-Based Encryption(ABE)scheme,which is called the Sub-String Searchable ABE(SSS-ABE)scheme,is proposed for the sharing and querying of the encrypted data.In the SSS-ABE scheme,the data owner encrypts the data under an access structure,and only the data user who satisfies the access structure can query and decrypt it.The data user can make a substring query on the whole ciphertext without setting keywords in advance.In addition,the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices.
文摘The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario.The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data.This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound,thereby disregarding the pins’manual verification.Further,the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches.Firstly,a random signal is encrypted,and then it is transformed into a wave file,after which it gets transmitted in a short burst via the device’s speakers.Subsequently,the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing.Besides,this model requires two devices/gadgets with speakers and a microphone,and no extra hardware such as a camera,for reading the QR code is required.The first module is tested with realtime data and generates high scores for the widely accepted accuracy metrics,including precision,Recall,F1 score,entropy,and mutual information(MI).Additionally,this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files.This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file.Several encryption algorithms and their combinations are taken for this system to compare the resultant file size.Both these systems engender high accuracies and provide secure connectivity,leading to a sustainable communication ecosystem.
基金The National Natural Science Foundation of China (No. 60273049, 60303026, 60473020)
文摘The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.
基金financial support from the National Natural Science Foundation of China(22078238,21961132005,and 21908160)the National Key Research and Development Program of China(2022YFC2104800 and 2021YFC2100800).
基金Project supported by the National Natural Science Foundation of China(51773052,U1904168,21805071,61505049)the Program for Science&Technology Innovation Talents in Universities of Henan Province(20HASTIT015,19HASTIT040)。
文摘With the rapid changes in the field of information,the research and development of optical storage materials with high security and large storage capacity are particularly important in the development of contemporary society.However,conventional memo ry materials with static fluorescent outputs have the disadvantages of easy simulation and forgery,which limits their practical application in the protection of confidential information.In this research,a dual-stimuli-responsive intelligent fluorescent material based on Tb^(3+)and Eu^(3+)ions doped layered lanthanide hydroxide(LYH:Eu_(x)Tb_(1-x)DPA)was fabricated,which can realize reversible multi-color luminescence conversion(from green to red)by varying the pH and temperature.Combined with the Morse code and security pattern,the multiple encryption and decryption of confidential information and anti-counterfeiting can also be realized.Therefore,the obtained intelligent fluorescent material has a great application prospect for information security.In addition,due to the excellent color tunability,the material can provide the possibility to obtain potential fingerprints with high contrast and no background interference on different color substrates.The unique dual-stimuli-responsive behavior of this material provides more ingenious design inspiration for the design of multi-color intelligent fluorescent devices.
基金This project was funded by the Deanship of Scientific Research(DSR),King Abdul-Aziz University,Jeddah,Saudi Arabia under Grant No.(D-63-611-1442).
文摘In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples.
基金Project (No. 10276034) supported by the National Natural ScienceFoundation of China
文摘On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractional orders, standard focal lengths and scaling factors are its keys. Multistage fractional Fourier transforms can add the keys easily and strengthen information se-curity. This method can also realize partial encryption just as wavelet transform and fractional wavelet transform. Optical reali-zation of encryption and decryption is proposed. Computer simulations confirmed its possibility.
文摘Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic devices. Among all the forms of data, image is an important aspect that still needs methodologies to be stored securely. This work focuses on a novel technique to secure images using inter block difference and advanced encryption standard (AES). The AES algorithm is chosen for encryption since there is no prevalent attack that is successful in analyzing it. Instead of encrypting the entire image, only a part of the image is encrypted. The proposed work is found to reduce the encryption overhead in a significant way and at the same time preserves the safety of the image. It is also observed that the decryption is done in an efficient and time preserving manner.
文摘A Wireless Sensor Network(WSN)is constructed with numerous sensors over geographical regions.The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy.As sensor nodes are resource constrained in nature,novel techniques are essential to improve lifetime of nodes in WSN.Nodes energy is considered as an important resource for sensor node which are battery powered based.In WSN,energy is consumed mainly while data is being transferred among nodes in the network.Several research works are carried out focusing on preserving energy of nodes in the network and made network to live longer.Moreover,this network is threatened by attacks like vampire attack where the network is loaded by fake traffic.Here,Dual Encoding Recurrent Neural network(DERNNet)is proposed for classifying the vampire nodes s node in the network.Moreover,the Grey Wolf Optimization(GWO)algorithm helps for transferring the data by determining best solutions to optimally select the aggregation points;thereby maximizing battery/lifetime of the network nodes.The proposed method is evaluated with three standard approaches namely Knowledge and Intrusion Detection based Secure Atom Search Routing(KIDSASR),Risk-aware Reputation-based Trust(RaRTrust)model and Activation Function-based Trusted Neighbor Selection(AF-TNS)in terms of various parameters.These existing methods may lead to wastage of energy due to vampire attack,which further reduce the lifetime and increase average energy consumed in the network.Hence,the proposed DERNNet method achieves 31.4%of routing overhead,23%of end-to-end delay,78.6%of energy efficiency,94.8%of throughput,28.2%of average latency,92.4%of packet delivery ratio,85.2%of network lifetime,and 94.3%of classification accuracy.
基金Supported by the National Natural Science Foundation of China(61472429,61070192,91018008,61303074,61170240)the Beijing Municipal Natural Science Foundation(4122041)National High-Technology Research and Development Program of China(863 Program)(2007AA01Z414)
文摘In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.Abstract: In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.
文摘In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well.
基金Supported by the National Natural Science Foundation of China (60970119, 60803149)the National Basic Research Program of China (973 Program) (2007CB311201)
文摘In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously.
文摘With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of data user can be maintained as well as security and privacy of data provided to the user. Symmetric key cryptography is a part of the cryptographic technique which ensures high security and confidentiality of data transmitted through the communication channel using a common key for both encryption and decryption. In this paper I have analyzed comparative encryption algorithms in performance, three most useful algorithms: Data Encryption Standard (DES), Triple DES (3DES) also known as Triple Data Encryption Algorithm (TDEA), and Advanced Encryption Standard (AES). They have been analyzed on their ability to secure data, time taken to encrypt data and throughput the algorithm requires. The performance of different algorithms differs according to the inputs.