scholarly journals The security of RC4 algorithm using keys generation depending on user's retina

Author(s):  
Huda M. Salih ◽  
Raghda Salam Al Mahdawi

Digital technologies grow more rapidly; information security threats are becoming increasingly dangerous. Advanced and various cyber-attacks and security threats, like targeted emails, and information exploitation, pose a critical threat that basically undermines our trust in the digital society. Rivest cipher 4 (RC4) algorithm is a significant cipher of a stream that could be utilized with protocols of the internet, the advantage of the RC4 algorithm is that it is simple and effective. There are several weak, especially after the pseudo-random generation algorithm (PRGA), PRGA's initially 256 rounds (the amount of the RC4 permutation). Several modified RC4 studies have been published thus far, however, they all face either standard privacy or achievement evaluation issues. This paper proposes a new RC4 algorithm that is based on the user's retina (RC4-Retina), which has solved both of these weak points it was indicated in the standard RC4 algorithm. The novelty of retina key scheduling algorithm (RKSA), which is generated by relying on the user's retina of the algorithm will modify the matrix of permutation used to configure the keys. The efficiency of the improved algorithm was measured by depending on the average security of ciphertext of different keys and different messages, results were good compared to the standard algorithm.

Author(s):  
Shane W. Kraus ◽  
Marc N. Potenza

The Internet has revolutionized the way in which we consume and participate in sexual activities. Digital technologies are shaping the ways in which people interact with one another romantically and sexually. This chapter reviews some of the ways in which digital technologies are potentially shaping sexual behaviors, especially those of adolescents and young adults. Evidence suggests that technologies are facilitating increasingly more sexual activities among young people and adults, yet our understanding of these remains incomplete. The Internet has made pornography highly accessible to most individuals around the world, but the effects of frequent pornography use on individuals’ sexual beliefs and practices remain largely unknown. Sexting is also common among adolescents and adults, with some initial evidence finding that sexting was a partial mediator between problematic alcohol use and sexual hookups. More work on sexting behaviors is needed, particularly among vulnerable populations or groups at risk for exploitation. The wide use of smartphone applications designed to help users find casual sex partners are becoming more common, mirroring the increasing acceptability of having relationally uncommitted sex among young adults. More research is needed to investigate the influences of digital technologies on shaping the sexual practices of adolescents and emerging adults who may be spending increasingly more time online. Furthermore, more research is needed to examine both the potential benefits and risks associated with digital technologies that may facilitate sexual behaviors.


2019 ◽  
Vol 6 (1) ◽  
pp. 47-63 ◽  
Author(s):  
Bettina Nissen ◽  
Ella Tallyn ◽  
Kate Symons

Abstract New digital technologies such as Blockchain and smart contracting are rapidly changing the face of value exchange, and present new opportunities and challenges for designers. Designers and data specialists are at the forefront of exploring new ways of exchanging value, using Blockchain, cryptocurrencies, smart contracting and the direct exchanges between things made possible by the Internet of Things (Tallyn et al. 2018; Pschetz et al. 2019). For researchers and designers in areas of Human Computer Interaction (HCI) and Interaction Design to better understand and explore the implications of these emerging and future technologies as Distributed Autonomous Organisations (DAOs) we delivered a workshop at the ACM conference Designing Interactive Systems (DIS) in Edinburgh in 2017 (Nissen et al. 2017). The workshop aimed to use the lens of DAOs to introduce the principle that products and services may soon be owned and managed collectively and not by one person or authority, thus challenging traditional concepts of ownership and power. This workshop builds on established HCI research exploring the role of technology in financial interactions and designing for the rapidly changing world of technology and value exchange (Kaye et al. 2014; Malmborg et al. 2015; Millen et al. 2015; Vines et al. 2014). Beyond this, the HCI community has started to explore these technologies beyond issues of finance, money and collaborative practice, focusing on the implications of these emerging but rapidly ascending distributed systems in more applied contexts (Elsden et al. 2018a). By bringing together designers and researchers with different experiences and knowledge of distributed systems, the aim of this workshop was two-fold. First, to further understand, develop and critique these new forms of distributed power and ownership and second, to practically explore how to design interactive products and services that enable, challenge or disrupt existing and emerging models.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


2020 ◽  
pp. 53-60
Author(s):  
Mohammed I. Alghamdi ◽  

Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution.


2021 ◽  
pp. 5-16
Author(s):  
Parth Rustagi ◽  
◽  
◽  
◽  
◽  
...  

As useful as it gets to connect devices to the internet to make life easier and more comfortable, it also opens the gates to various cyber threats. The connection of Smart Home devices to the internet makes them vulnerable to malicious hackers that infiltrate the system. Hackers can penetrate these systems and have full control over devices. This can lead to denial of service, data leakage, invasion of privacy, etc. Thus security is a major aspect of Smart home devices. However, many companies manufacturing these Smart Home devices have little to no security protocols in their devices. In the process of making the IoT devices cheaper, various cost-cutting is done on the security protocols in IoT devices. In some way, many manufactures of the devices don’t even consider this as a factor to build upon. This leaves the devices vulnerable to attacks. Various authorities have worked upon to standardize the security aspects for the IoT and listed out guidelines for manufactures to follow, but many fail to abide by them. This paper introduces and talks about the various threats, various Security threats to Smart Home devices. It takes a deep dive into the solutions for the discussed threats. It also discusses their prevention. Lastly, it discusses various preventive measures and good practices to be incorporated to protect devices from any future attacks.


2018 ◽  
Vol 189 (4) ◽  
pp. 46-59
Author(s):  
Marian Kopczewski ◽  
Agnieszka Napieralska

The 21<sup>st</sup> century is undoubtedly a period of enormous progress in the field of digital technology, a period in which the boundary between the real world and the virtual world becomes less and less visible. The Internet has undeniably become a facilitation of everyday life, since it is a tool of work, communication or a way to spend free time for many users. The virtual world is present in almost all areas of our lives, and people spend more and more time in front of the computer screens, operating websites, e-mails or social networks. Highly developed digital technology is a boon of the 21st century, but despite its numerous advantages, negative aspects are also visible. Virtual knowledge displaces physical interpersonal contacts; physical activity is replaced by spending free time in front of a computer monitor. Various threats (social, psychological, psychological, ethical and moral) resulting from modern digital technologies and the increasing degree of dependence on them are extremely significant. The authors of this article present the results of own research, aiming at making the reader aware that there are both positive and negative aspects of the virtual world.


Author(s):  
Anita Lie

Digital technologies and the Internet have revolutionized the way people gather information and acquire new knowledge. With a click of a button or a touch on the screen, any person who is wired to the internet can access a wealth of information, ranging from books, poems, articles, graphics, animations and so much more. It is imperative that educational systems and classroom practices must change to serve our 21st century students better. This study examines the use of Edmodo as a social media to teach a course in Pedagogy to a class of digital natives. The media is used as an out-of-class communication forum to post/submit assignments and resources, discuss relevant issues, exchange information, and handle housekeeping purposes. A survey of students' responses and discussions on their participatory process leads to insights on how the social media helps achieve the required competences.


Author(s):  
ADRIJANA DVORŠAK

The role of international security organizations is to create a consensus on values, norms and rules relating to cyber warfare. NATO produces cyber policy and provides for education and the exchange of information also through publicistic activity. To a lesser extent it has also developed operational capabilities for joint cyber defence and cyber warfare. NATO can expect initiatives for close cooperation in cyber defence and the establishment of common cyber capabilities, which are all rational responses to unconventional threats. The benefits stemming from such cooperation differ by state. The author is nonetheless convinced that the United States will benefit the most from the said cooperation as their economy is the most dependent on information and communication technology, the most globalised and allegedly the most frequent target of cyber attacks.


Sign in / Sign up

Export Citation Format

Share Document