Uniform Core-shell SiO2@Sr2CeO4:Eu3+ nanocomposites: Exploring multiple strategies towards flexible luminescent films and data security applications

2021 ◽  
pp. 101583
Author(s):  
H.S. Sudheendra ◽  
G.P. Darshan ◽  
M.K. Kokila ◽  
D.R. Lavanya ◽  
H.B. Premkumar ◽  
...  
2004 ◽  
Vol 04 (02) ◽  
pp. C1-C5 ◽  
Author(s):  
LASZLO B. KISH ◽  
SWAMINATHAN SETHURAMAN

Secure encryption of data is one of the most important parts of information technology and major concern of data security, military, defense and homeland security applications. The main aim of the paper is to propose a new way of approach to encryption. We propose a new possible approach [1] to encryption, which could be a fast, simple, inexpensive, robust, flexible, and mobile way of data encryption for absolutely secure data transmission by using classical digital information. The Eavesdropper is allowed to know the received signal thus the method has a higher level of protection than that of quantum encryption. Factorization algorithms do not help to break the code. Proper scrambling operators, which are necessary for the method, are study of current research.


2020 ◽  
Vol 3 (1) ◽  
pp. 13-30
Author(s):  
Malak G. Alkhudaydi ◽  
Adnan A. Gutub

Cryptography and steganography are combined to provide practical data security. This paper proposes integrating light-weight cryptography with improved Arabic text steganography for optimizing security applications. It uses light-weight cryptography to cope with current limited device capabilities, to provide acceptable required security. The work tests hiding encrypted secret information within Arabic stego-cover texts, using all common diacritics found naturally in the Arabic language. The study considers different challenging situations and scenarios in order to evaluate security practicality. It further carries out simulations on some short texts from the Holy Quran, taking them as standard authentic texts, that are fixed and trusted, therefore providing realistic study feedback that is worth monitoring. Our improved approach features preferred capacity and security, surpassing the best previous diacritics stego approach, showing interesting potential results for attractive enlightening exploration to come.


2005 ◽  
Author(s):  
H. Nakamura ◽  
T. Sawase ◽  
T. Kihara ◽  
K. Matsubara

2019 ◽  
Author(s):  
Ronal Watrianthos

Security is very important in all aspects to protect data. Text messages on mobile phones, which is sms (short messages service) is one of theimportant data that needs a data security system. Data security is used to maintain the confidentiality of important data that we have on mobile devices.The encryption process is used so that messages cannot be read by other unwanted parties. While the decryption process is used so that the messagecan be read back by the intended party. Rivest Cryptography, Shamir, Adleman (RSA) is one of the asymmetric cryptographic algorithms that use a keypair, that is the public key and private key. The key length can be set, where the longer the key formation bit, the harder it is to solve because it is difficultto factor two very large numbers. This study applies the Rivest, Shamir, Adleman (RSA) algorithm for text message security applications based onAndroid. Based on the research that has been done, the author can draw conclusions, namely: Rivest, Shamir, Adleman (RSA) cryptographic algorithmcan be implemented for text message security Android based. So it is safer to exchange text messages (SMS) so that user privacy is guaranteed


2018 ◽  
Author(s):  
Taronisokhi Zebua

Security has two techniques namely cryptography and steganography. The combination of these two techniques can be used as one of the solutions to improve the security of data and confidential information, where cryptographic techniques used to encode messages and steganography techniques used to hide messages that have been encoded before. Steganography can be seen as a continuation of cryptography. If on cryptography, the ciphertext remains available, then with steganography the ciphertext can be hidden so that the third party does not know its existence. The hidden secret data can be re-extracted exactly as it was in the original state. The combination of cryptographic and steganographic techniques will be applied in designing a data security application that can be used to improve data or information security. Applications that are ready to be designed, will be able to be used to insert a secret message into the media container so that the secret message that has been sent will arrive at the recipient intact without any damage to the message or the container media. In practice, applications that have been designed must be owned by both parties. Both sender and recipient.


2019 ◽  
Vol 8 (4) ◽  
pp. 5619-5623

AES stands for Advanced Encryption Standard. It is widely used in today’s various security applications. S-box method is the most common and important in today’s data security and embedded applications.. This S-box consumes a considerable percentage of power of the whole system. S-box is very prone to differential power attacks(DPA). DPA is the most threatening types of attacks in cryptographic systems. In this paper, we have implemented one positive polarity Reed Muller type S-box is implemented using adiabatic logic. Efficient charge recovery logic(ECRL)is used here. FinFET based ECRL is used to implement the S-box has been observed and calculated .The performance of ECRL based S-box is compared with conventional CMOS based S-box. The statistical parameters for DPA cipher design are also analyzed.


Sign in / Sign up

Export Citation Format

Share Document