Cryptographic Techniques for Automotive Technology

Author(s):  
Md. Iftekhar Salam ◽  
Madhusudan Singh
Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


2020 ◽  
Vol 2020 ◽  
pp. 1-22
Author(s):  
Stefano de Luca ◽  
Roberta Di Pace

It is common opinion that traditional approaches used to interpret and model users’ choice behaviour in innovative contexts may lead to neglecting numerous nonquantitative factors that may affect users’ perceptions and behaviours. Indeed, psychological factors, such as attitudes, concerns, and perceptions may play a significant role which should be explicitly modelled. By contrast, collecting psychological factors could be a time and cost consuming activity, and furthermore, real-world applications must rely on theoretical paradigms which are able to easily predict choice/market fractions. The present paper aims to investigate the above-mentioned issues with respect to an innovative automotive technology based on the after-market hybridization of internal combustion engine vehicles. In particular, three main research questions are addressed: (i) whether and how users’ characteristics and attitudes may affect users’ behaviour with respect to new technological (automotive) scenarios (e.g., after-market hybridization kit); (ii) how to better “grasp” users’ attitudes/concerns/perceptions and, in particular, which is the most effective surveying approach to observe users’ attitudes; (iii) to what extent the probability of choosing a new automotive technology is sensitive to attitudes/concerns changes. The choice to install/not install the innovative technology was modelled through a hybrid choice model with latent variables (HCMs), starting from a stated preferences survey in which attitudes were investigated using different types of questioning approaches: direct questioning, indirect questioning, or both approaches. Finally, a comparison with a traditional binomial logit model and a sensitivity analysis was carried out with respect to the instrumental attributes and the attitudes. Obtained results indicate that attitudes are significant in interpreting and predicting users’ behaviour towards the investigated technology and the HCM makes it possible to easily embed psychological factors into a random utility model/framework. Moreover, the explicit simulation of the attitudes allows for a better prediction of users’ choice with respect to the Logit formulation and points out that users’ behaviour may be significantly affected by acting on users’ attitudes.


Author(s):  
Dilip Kumar Sharma ◽  
Ningthoujam Chidananda Singh ◽  
Daneshwari A Noola ◽  
Amala Nirmal Doss ◽  
Janaki Sivakumar

2022 ◽  
Vol 54 (9) ◽  
pp. 1-37
Author(s):  
Asma Aloufi ◽  
Peizhao Hu ◽  
Yongsoo Song ◽  
Kristin Lauter

With capability of performing computations on encrypted data without needing the secret key, homomorphic encryption (HE) is a promising cryptographic technique that makes outsourced computations secure and privacy-preserving. A decade after Gentry’s breakthrough discovery of how we might support arbitrary computations on encrypted data, many studies followed and improved various aspects of HE, such as faster bootstrapping and ciphertext packing. However, the topic of how to support secure computations on ciphertexts encrypted under multiple keys does not receive enough attention. This capability is crucial in many application scenarios where data owners want to engage in joint computations and are preferred to protect their sensitive data under their own secret keys. Enabling this capability is a non-trivial task. In this article, we present a comprehensive survey of the state-of-the-art multi-key techniques and schemes that target different systems and threat models. In particular, we review recent constructions based on Threshold Homomorphic Encryption (ThHE) and Multi-Key Homomorphic Encryption (MKHE). We analyze these cryptographic techniques and schemes based on a new secure outsourced computation model and examine their complexities. We share lessons learned and draw observations for designing better schemes with reduced overheads.


2021 ◽  
pp. 1-13
Author(s):  
Fernando Rebollar ◽  
Rocío Aldeco-Perez ◽  
Marco A. Ramos

The general population increasingly uses digital services, meaning services which are delivered over the internet or an electronic network, and events such as pandemics have accelerated the need of using new digital services. Governments have also increased their number of digital services, however, these digital services still lack of sufficient information security, particularly integrity. Blockchain uses cryptographic techniques that allow decentralization and increase the integrity of the information it handles, but it still has disadvantages in terms of efficiency, making it incapable of implementing some digital services where a high rate of transactions are required. In order to increase its efficient, a multi-layer proposal based on blockchain is presented. It has four layers, where each layer specializes in a different type of information and uses properties of public blockchain and private blockchain. An statistical analysis is performed and the proposal is modeled showing that it maintains and even increases the integrity of the information while preserving the efficiency of transactions. Besides, the proposal can be flexible and adapt to different types of digital services. It also considers that voluntary nodes participate in the decentralization of information making it more secure, verifiable, transparent and reliable.


Sign in / Sign up

Export Citation Format

Share Document