scholarly journals Image Encryption Using RK-RSA Algorithm in Aadhaar Card

Author(s):  
R. Felista Sugirtha Lizy Et.al

Cryptography is used for secretly sending information. The information or given data is protected by cryptographic technique. The technique is used in Text and images. The technique is supported by a lot of algorithms. RSA is a better encryption technique for smart cards. In this paper, an image in the Aadhaar card is encrypted using the RK-RSA algorithm for better protection and confidentiality. The proposed RK-RSA algorithm is very secure for smart cards and Aadhaar cards. The better performance of the RK-RSA is evaluated based on the Avalanche Effect, Speed, Throughput, and Power Consumption. The improved performance of the RK-RSA algorithm’s experimental results is reported. The mathematical justification supporting the RK-RSA algorithm is also detailed.

Author(s):  
R. Felista Sugirtha Lizy Et.al

Information Security has become an essential concern in the modern world. Encryption is an effective way to prevent an unofficial person from viewing the digital information with the secret key. RSA encryption is often used for digital signatures which can prove the authenticity and reliability of a message. As RSA encryption is less competent and resource-heavy, it is not used to encrypt the entire message. If a message is encrypted with a symmetric-key RSA encryption it will be more efficient. Under this process, only the RSA private key will be able to decrypt the symmetric key. The Euclidean algorithm is attainably one of the most extensively known algorithms.  The Euclidean algorithm is used for finding the greatest common divisor of two numbers. The algorithm can also be defined for more general rings than just the integers. This work is very useful to improve the data security in Smart card and Aadhaar card. In this paper, the RSA algorithm is modified using the Euclidean technique to improve its performance. The proposed algorithm shows its better performance in terms of speed, throughput, power consumption, and the avalanche effect. Experimental results and mathematical justification supporting the proposed method are reported.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Fei Yao

The previous encryption methods of hospital financial data have the problem of overburden. Therefore, a research study on hybrid encryption of hospital financial data based on Noekeon algorithm is proposed. From the basic principles of the Noekeon algorithm and the application and implementation of the Noekeon algorithm, a hybrid encryption scheme for hospital financial data based on the Noekeon algorithm is designed. In order to improve the security of the encryption system, the RSA algorithm is used to encrypt the encrypted content twice. The hybrid algorithm realizes the hybrid encryption of the hospital's financial data. Finally, a hybrid encryption system for hospital financial data based on Noekeon algorithm is designed. Experimental results show that this method has a higher success rate and better comprehensive performance. It not only improves the encryption efficiency of hospital financial data but also enhances the security of hospital financial data, which has greater application value.


2010 ◽  
Vol 44-47 ◽  
pp. 2747-2751
Author(s):  
Hai Rong Wang ◽  
Jun Qiang Ren ◽  
Guo Liang Sun ◽  
Di Cen

This paper presents a micro solid electrolyte CO2 gas sensor in which Li2CO3, Li2TiO3-TiO2 serves as sensing and reference electrodes respectively, and the Li3PO4 film acts as the electrolyte. The sensor was constructed in the sequent layers of O2, CO2, Li2CO3, Pt | Li3PO4 | Pt, Li2TiO3-TiO2, O2, CO2 on the Al2O3 substrate by MEMS process. Experimental results indicate that the micro solid-electrolyte CO2 gas sensor has a relatively rapid speed of response. By discussions, we may find that the improved performance will be realized by optimizing the primary parameters of the sensor.


2012 ◽  
Vol 182-183 ◽  
pp. 427-430
Author(s):  
Li Feng Wei ◽  
Liang Cheng ◽  
Xing Man Yang

A adaptive control method of the pulse demagnetizer was presented, Can adjust the strength of the charge current automatically according to the changes of the magnetic content to ensure the constant of the magnetic field.The experimental results have shown that it has the advantages of low power consumption, strong anti-interference capability, stable and reliable operation, long life and good demagnetizing effect, when compared to the conventional demagnetizers.


2012 ◽  
Vol 2012 ◽  
pp. 1-10 ◽  
Author(s):  
Qiang Zhang ◽  
Xianglian Xue ◽  
Xiaopeng Wei

We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.


Author(s):  
Kenneth Marut ◽  
Colin Stewart ◽  
Alex Villanueva ◽  
Dragan Avirovik ◽  
Shashank Priya

A bio-inspired jet propulsion mechanism was designed and developed for development of proficient unmanned undersea vehicles (UUVs). The propulsion mechanism mimics that of the Sarsia sp. jellyfish which measures approximately 1 cm in diameter. In order to achieve a biomimetic uniform bell contraction, an electrical motor was used in conjunction with a novel circumferential actuator based upon a mechanical iris diaphragm. This mechanism allows actuation of a deformable cavity. The current prototype was scaled to a diameter 10 times larger than Sarsia measuring 10 cm in diameter. The performance of the propulsion mechanism was analyzed both experimentally theoretically. The prototype was mounted on a test stand which allowed for measurement of thrust and power consumption. Analytical and experimental results were compared to that of the performance of Sarsia. It was found that the overall mechanism created a maximum thrust of 5.1 N with a calculated vehicle efficiency of 0.17% and proficiency of 4.8 s−1.


2013 ◽  
Vol 411-414 ◽  
pp. 125-130
Author(s):  
Yan Bo Niu ◽  
An Ping Jiang

SM4 is a 128-bit block cipher used in SOC and smart cards to ensure the safety of data transmission. In order to realize a low power implementation of the SM4 cipher block, some S-boxes were evaluated firstly and we proposed a new architecture of SM4 S-box called MUX S-box with a power consumption of 13.92W@10Mhz on SMIC 0.18m technology, Meanwhile, the implementation of SM4 cipher round based on the SM4 MUX S-box was completed and a low power consumption of 0.33mW @ 10 MHz on 0.18 m CMOS technology is achieved.


Sign in / Sign up

Export Citation Format

Share Document