scholarly journals Implementation of modified GSO based magic cube keys generation in cryptography

2021 ◽  
Vol 1 (9 (109)) ◽  
pp. 43-49
Author(s):  
Alaa Noori Mazher ◽  
Jumana Waleed

Over the last few decades, tremendous and exponential expansion in digital contents together with their applications has emerged. The Internet represents the essential leading factor for this expansion, which provides low-cost communication tools worldwide. However, the main drawback of the Internet is related to security problems. In order to provide secure communication, enormous efforts have been spent in the cryptographic field. Recently, cryptographic algorithms have become essential for increasing information safety. However, these algorithms require random keys and can be regarded as compromised when the random keys are cracked via the attackers. Therefore, it is substantial that the generation of keys should be random and hard to crack. In this paper, this is guaranteed via one of the most efficient nature-inspired algorithms emerged by inspiring the movements of stars, galaxies, and galaxy superclusters in the cosmos that can be utilized with a mathematical model (magic cube) for generating hardly cracking random number keys. In the proposed cryptographic system, the Modified Galactic Swarm Optimization (GSO) algorithm has been utilized in which every row and column of magic cube faces are randomly rotated until reaching the optimal face, and the optimal random elements are selected as optimal key from the optimal face. The generated optimized magic cube keys are used with several versions of RC6 algorithms to encrypt various secret texts. Furthermore, these generated keys are also used for encrypting images using the logical XOR operation. The obtained results of NIST tests proved that the generated keys are random and uncorrelated. Moreover, the security of the proposed cryptographic system was proved

2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


2002 ◽  
Vol 41 (05) ◽  
pp. 414-418 ◽  
Author(s):  
I. Mavridis ◽  
C. Ilioudis ◽  
C. Georgiadis ◽  
G. Pangalos

Summary Objectives: Internet technologies provide an attractive infrastructure for efficient and low cost communications in regional health information networks. The advantages provided by the Internet come however with a significantly greater element of risk to the confidentiality and integrity of information. This is because the Internet has been designed primarily to optimize information sharing and interoperability, not security. The main objective of this paper is to propose the exploitation of public-key cryptography techniques to provide adequate security to enable secure healthcare Internet applications. Methods: Public-key cryptography techniques can provide the needed security infrastructure in regional health networks. In the regional health-care security framework presented in this paper, we propose the use of state-of-art Public Key Infrastructure (PKI) technology. Such an e-Health PKI consists of regional certification authorities that are implemented within the central hospitals of each region and provide their services to the rest of the healthcare establishments of the same region. Results: Significant experience in this area has been gained from the implementation of the PKI@AUTH project. Conclusions: The developed PKI infrastructure already successfully provides its security services to the AHEPA university hospital. The same infrastructure is designed to easily support a number of hospitals participating in a regional health information network.


Author(s):  
Luísa Cruz Lobato

El artículo analiza la estructuración de la política de ciberseguridad de Brasil entre los años de 2003 y 2016 como componente de su estrategia de inserción internacional y proyección de liderazgo en el Sul Global. El campo de la gobernanza de la Internet, de lo cual la ciberseguridad es parte, ofrece al país una oportunidad de relativo bajo costo de protagonismo en la elaboración de normas internacionales. Analizase documentos principales de esa política y argumentase que ella es parte de los esfuerzos de proyección del soft power del país en el campo de la seguridad internacional, pero que sus incoherencias pueden afectar y hasta mismo comprometer esta estrategia. Por fin, trazase breves proyecciones para esta política ante los cambios políticos en Brasil.AbstractThe article analyzes the structuration of Brazil’s cybersecurity policy between the years of 2003 and 2016 as a component of its strategy of international insertion and projection of leadership in the Global South. The Internet governance field, of which cybersecurity is a part, offers the country a relatively low-cost opportunity of protagonism in the elaboration of international norms. It analyzes cornerstone documents of this policy and argues that it is a part of the country’s efforts to project its soft power in the field of international security, but that its incoherencies can affect and even compromise the strategy. Finally, it draws brief projections to this policy in face of political changes in Brazil. 


Author(s):  
Ravikiran Kamate ◽  
Sulakshna Baliga ◽  
M. D. Mallapur

Background: Internet addiction is not clinical diagnosis, but a potentially pathological behavioral pattern with symptoms: a loss of control over the behavior, preoccupation with the Internet, using the Internet to modify mood, and withdrawal symptoms. Easy access and low cost of Internet packs- are main cause of development of increased internet use in India. Internet addiction – factors like gender, environmental factors, socioeconomic status, etc. have effect on internet use.Methods: Cross-sectional study conducted during January 2016 to February 2016. Data was collected among 500 engineering students of four engineering colleges of Belagavi city using young's questionnaire. Analysis was performed using SPS 20. Chi-square applied as statistical test of significance for the association between age, sex, residence, SES and schooling. P<0.01 was considered to be statistically significant.Results: The present study revealed that 16.2 and 6.2% of participants had moderate and severe form of internet addiction respectively. With increase in age prevalence of addiction increased. Internet addiction was more among Males when compared to females. Addiction was seen more in students whose both parents were working.Conclusions: Internet addiction is an emerging form of addiction among students with males more than females mostly among engineering students who are dependent on internet for their work, carrier and completion of course Hence it's time to develop comprehensive intervention approach to promote healthy and safe internet use from family, college and peers.


Author(s):  
L.P.S.S.K. Dayananda ◽  
A. Narmilan ◽  
P. Pirapuraj

Background: Weather monitoring is an important aspect of crop cultivation for reducing economic loss while increasing productivity. Weather is the combination of current meteorological components, such as temperature, wind direction and speed, amount and kind of precipitation, sunshine hours and so on. The weather defines a time span ranging from a few hours to several days. The periodic or continuous surveillance or the analysis of the status of the atmosphere and the climate, including parameters such as temperature, moisture, wind velocity and barometric pressure, is known as weather monitoring. Because of the increased usage of the internet, weather monitoring has been upgraded to smart weather monitoring. The Internet of Things (IoT) is one of the new technology that can help with many precision farming operations. Smart weather monitoring is one of the precision agriculture technologies that use sensors to monitor correct weather. The main objective of the research is to design a smart weather monitoring and real-time alert system to overcome the issue of monitoring weather conditions in agricultural farms in order for farmers to make better decisions. Methods: Different sensors were used in this study to detect temperature and humidity, pressure, rain, light intensity, CO2 level, wind speed and direction in an agricultural farm and real time clock sensor was used to measured real time weather data. The major component of this system was an Arduino Uno microcontroller and the system ran according to a program written in the Arduino Uno software. Result: This is a low-cost smart weather monitoring system. This system’s output unit were a liquid crystal display and a GSM900A module. The weather data was displayed on a liquid crystal display and the GSM900A module was used to send the data to a mobile phone. This smart weather station was used to monitor real-time weather conditions while sending weather information to the farmer’s mobile phone, allowing him to make better decisions to increase yield.


Author(s):  
H. B. Chi ◽  
M. F. N. Tajuddin ◽  
N. H. Ghazali ◽  
A. Azmi ◽  
M. U. Maaz

<span>This paper presents a low-cost PV current-voltage or <em>I-V</em> curve tracer that has the Internet of Things (IoT) capability. Single ended primary inductance converter (SEPIC) is used to develop the <em>I-V</em> tracer, which is able to cope with rapidly changing irradiation conditions. The <em>I-V</em> tracer control software also has the ability to automatically adapt to the varying irradiation conditions. The performance of the <em>I-V</em> curve tracer is evaluated and verified using simulation and experimental tests.</span>


Author(s):  
Bin Lin

The Internet of Things is another information technology revolution and industrial wave after computer, Internet and mobile communication. It is becoming a key foundation and an important engine for the green, intelligent and sustainable development of economic society. The new networked intelligent production mode characterized by the integration innovation of the Internet of Things is shaping the core competitiveness of the future manufacturing industry. The application of sensor network data positioning and monitoring technology based on the Internet of Things in industry, power and other industries is a hot field for the development of the Internet of Things. Sensor network processing and industrial applications are becoming increasingly complex, and new features have appeared in the sensor network scale and infrastructure in these fields. Therefore, the Internet of Things perception data processing has become a research hotspot in the deep integration process between industry and the Internet of Things. This paper deeply analyzes and summarizes the characteristics of sensor network perception data under the new trend of the Internet of Things as well as the research on location monitoring technology, and makes in-depth exploration from the release and location monitoring of sensor network perception data of the Internet of Things. Sensor network technology integrated sensor technology, micro-electromechanical system technology, wireless communication technology, embedded computing technology and distributed information processing technology in one, with easy layout, easy control, low power consumption, flexible communication, low cost and other characteristics. Therefore, based on the release and location monitoring technologies of sensor network data based on the Internet of Things in different applications, this paper studies the corresponding networking technologies, energy management, data management and fusion methods. Standardization system in wireless sensor network low cost, and convenient data management needs, design the iot oriented middleware, and develops the software and hardware system, the application demonstration, the results show that the design of wireless sensor network based on iot data monitoring and positioning technology is better meet the application requirements, fine convenient integration of software and hardware, and standardized requirements and suitable for promotion.


Author(s):  
Shumin Su ◽  
Mark Xu

The Internet Civil Diplomacy is a major revolution and an emerging trend witnessed in the information age. It poses a significant impact on foreign affairs and official diplomacy due to its unique characteristics—freedom, equality, individuality, real-time, low-cost, and convenience. This chapter reviews the development of Internet-based civil diplomacy and the practice of China’s Internet-based civil diplomacy, which has been greatly developed in recent years in multiple forms—e.g. Web forums, website signatures, event-driven purpose-build foreign affairs sites. Two types of impact of the civil Internet diplomacy—expansion effect and resonance effect—have been examined in the Chinese context through cases, events, and examples. The chapter also identifies challenges and proposes solutions for future development of the civil Internet diplomacy in China.


Author(s):  
Amit Kumar Sinha

E-commerce and internet businesses are driving the rapid growth of the domestic IT-ITeS industry, attracting unprecedented global interest and funding. Indian e-commerce and internet companies are growing rapidly with about 460 million internet users and a tele-density of around 85.2%. Increasing penetration of the internet, adoption of smartphones and minimal effort low-cost mobile devices, changing demographics, mobile-empowered youth, and the emergence of tier 2 and tier 3 cities as major shopping hubs have been driving the growth of the industry, with new retail forces shifting its dynamics. Furthermore, the continued growth of large pure-play organisations that are powerhouses has moved retailers' focus to the web channel. These companies are not only becoming gateways to product research, but have also introduced consumers to new ways of viewing the retail process.


Sign in / Sign up

Export Citation Format

Share Document