Optimization of Prime Decision Algorithm in RSA Algorithm

2021 ◽  
pp. 277-283
Author(s):  
Zhenghui Chang ◽  
Pengfei Gong
Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


Author(s):  
Abubakar Muhammad Miyim ◽  
Mahamod Ismail ◽  
Rosdiadee Nordin

The importance of network selection for wireless networks, is to facilitate users with various personal wireless devices to access their desired services via a range of available radio access networks. The inability of these networks to provide broadband data service applications to users poses a serious challenge in the wireless environment. Network Optimization has therefore become necessary, so as to accommodate the increasing number of users’ service application demands while maintaining the required quality of services. To achieve that, the need to incorporate intelligent and fast mechanism as a solution to select the best value network for the user arises. This paper provides an intelligent network selection strategy based on the user- and network-valued metrics to suit their preferences when communicating in multi-access environment. A user-driven network selection strategy that employs Multi-Access Service Selection Vertical Handover Decision Algorithm (MASS-VHDA) via three interfaces; Wi-Fi, WiMAX and LTE-A is proposed, numerically evaluated and simulated. The results from the performance analysis demonstrate some improvement in the QoS and network blocking probability to satisfy user application requests for multiple simultaneous services.


2021 ◽  
Vol 181 (1) ◽  
pp. 1-35
Author(s):  
Jane Hillston ◽  
Andrea Marin ◽  
Carla Piazza ◽  
Sabina Rossi

In this paper, we study an information flow security property for systems specified as terms of a quantitative Markovian process algebra, namely the Performance Evaluation Process Algebra (PEPA). We propose a quantitative extension of the Non-Interference property used to secure systems from the functional point view by assuming that the observers are able to measure also the timing properties of the system, e.g., the response time of certain actions or its throughput. We introduce the notion of Persistent Stochastic Non-Interference (PSNI) based on the idea that every state reachable by a process satisfies a basic Stochastic Non-Interference (SNI) property. The structural operational semantics of PEPA allows us to give two characterizations of PSNI: one based on a bisimulation-like equivalence relation inducing a lumping on the underlying Markov chain, and another one based on unwinding conditions which demand properties of individual actions. These two different characterizations naturally lead to efficient methods for the verification and construction of secure systems. A decision algorithm for PSNI is presented and an application of PSNI to a queueing system is discussed.


Sign in / Sign up

Export Citation Format

Share Document