scholarly journals on subliminal cryotography

2006 ◽  
Vol 3 (1) ◽  
pp. 124-130
Author(s):  
Baghdad Science Journal

in recent years cryptography has played a big role especially in computer science for information security block cipher and public

2016 ◽  
Vol 2 (4) ◽  
pp. 428
Author(s):  
Sufyan T. Al-Janabi

Information security now is considered to be cross-disciplinary and comprehensive field. It integrates the accumulation of knowledge in many disciplines like computer science, mathematics, communications, electronics, physics, etc. Thus, there has been an ongoing effort to improve the experiences in information security experimentation. Many international institutions are investigating enhanced approaches to provide hands-on learning and research environments. However, academic institutions are facing with the difficult challenge of providing lab infrastructuresthat meet the increasingly growing needs of cybersecurity training. In this paper, we report on the necessity and importance of building an effective national testbed for cybersecurity experimentation. We also present a general top-level architecture for this testbed emphasizing the most important enabling technologies.


Author(s):  
Lech J. Janczewski ◽  
Andrew M. Colarik

The current state of the information security domain in the United States and much of the rest of the industrialized world can best be characterized as overly optimistic. The protection of computing systems and telecommunication infrastructures from unauthorized usage, manipulation, and sabotage faces serious challenges to ensure ongoing serviceability. This is especially true when we consider our growing dependence on these infrastructures. The state of affairs regarding the security aspects of these systems is even worse. Peter G. Neumann of the Computer Science Laboratory at SRI International in Menlo Park, California states:


2018 ◽  
Author(s):  
Alex Root

AbstractOrganisms must maintain proper regulation including defense and healing. Life-threatening problems may be caused by pathogens or by a multicellular organism’s own cells through cancer or auto-immune disorders. Life evolved solutions to these problems that can be conceptualized through the lens of information security, which is a well-developed field in computer science. Here I argue that taking an information security view of cells is not merely semantics, but useful to explain features of signaling, regulation, and defense. An information security perspective also offers a conduit for cross-fertilization of advanced ideas from computer science, and the potential for biology to inform computer science. First, I consider whether cells use passwords, i.e., initiation sequences that are required for subsequent signals to have effects, by analyzing the concept of pioneer transcription factors in chromatin regulation and cellular reprogramming. Second, I consider whether cells may encrypt signal transduction cascades. Encryption could benefit cells by making it more difficult for pathogens or oncogenes to hijack cell networks. By using numerous molecules cells may gain a security advantage in particular against viruses, whose genome sizes are typically under selection pressure. I provide a simple conceptual argument for how cells may peform encryption through post-translational modifications, complex formation, and chromatin accessibility. I invoke information theory to provide a criterion of an entropy spike to assess whether a signaling cascade has encryption-like features. I discuss how the frequently invoked concept of context-dependency may over-simplify more advanced features of cell signaling networks, such as encryption. Therefore, by considering that biochemical networks may be even more complex than commonly realized we may be better able to understand defenses against pathogens and pathologies.


Author(s):  
Ángel Pisco Gómez ◽  
Yanina Holanda Campozano Pilay ◽  
Jimmy Leonardo Gutiérrez García ◽  
Mario Javier Marcillo Merino ◽  
Robards Javier Lima Pisco

La investigación realizada presenta una perspectiva de Análisis de las principales técnicas de hacking para la Universidad Estatal del Sur de Manabí. Actualmente las universidades, organizaciones y compañías están expuestas  a numerosas amenazas  que violan sus sistemas informáticos, ya que esto pone en riesgo la integridad de la información. Un  hacker es  una persona con grandes conocimientos de informática que se dedica a acceder ilegalmente a sistemas informáticos ajenos y a manipularlos. Ya que uno de los métodos para lograr mitigar eficazmente los impactos provocados por un ataque informático, es precisamente tener conocimiento de la manera como estos atacan y conocer los posibles puntos débiles de un sistema comúnmente explotados y en los cuales se debe hacer especial énfasis al momento de concentrar los esfuerzos de seguridad propensos a la prevención de los mismos. La metodología que se utilizo fue la cualitativa la cual nos ayudó a describir de forma minuciosa los hechos, situaciones, comportamientos, interacciones que se observan mediante la investigación realizada. Ya que la información representa un papel muy importante dentro de las instituciones pues es la parte más primordial y día a día se encuentra expuesta a sufrir modificaciones y en muchos casos a ser hacheada  en su totalidad y es por eso importante asegurar la integridad de la  información. Por lo tanto, es necesario determinar que herramientas utilizar, y las técnicas fundamentales para probar la vulnerabilidad de los sistemas de información y de las redes instaladas. PALABRAS CLAVE: herramientas; información; seguridad; técnicas; vulnerabilidades. ANALYSIS OF THE MAIN HACKING TECHNIQUES FOR THE SOUTHERN MANABI STATE UNIVERSITY ABSTRACT The research carried out presents an analysis perspective of the main hacking techniques for the State University of the South of Manabí. Currently universities, organizations and companies are exposed to numerous threats that violate their computer systems, as this puts the integrity of the information at risk. A hacker is a person with great knowledge of computer science that is dedicated to illegally accessing foreign computer systems and manipulating them. The methodology that was used was the qualitative one which helped us to describe in a thorough way the facts, situations, behaviors, interactions that are observed through the research carried out. Since one of the methods to achieve effectively mitigate the impacts caused by a computer attack, is precisely to have knowledge of how they attack and know the possible weaknesses of a system commonly exploited and in which special emphasis should be made at the time to concentrate security efforts prone to the prevention of them. Since the information represents a very important role within the institutions because it is the most fundamental part and day to day is exposed to undergo modifications and in many cases to be hacked in its entirety and it is therefore important to ensure the integrity of the information . Therefore, it is necessary to determine which tools to use, and the fundamental techniques to test the vulnerability of the information systems and the installed networks. KEY WORDS: techniques; tools; vulnerabilities; information; security


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Information security is the protection of personal and non-personal data from various threats to guarantee privacy. For business practices, data security can reduce business risk, and increase the return of investment and business opportunities. In designing information system security systems, there are information security aspects that need to be considered. Many threats will come before the information circulating. Information is a matter that will be targeted by wild parties. Cryptographic algorithms are needed to protect data from these threats. Data Encryption Standard (DES) belongs to the symmetry cryptography system and is classified as a block cipher type. DES operates on 64-bit block size. DES encrypts 64 plaintext bits into 64-bit ciphertext using 56 private key bits or subkeys. The internal key is generated from an external key that is 64 bits long. The DES method is an excellent cryptographic technique used to secure data. DES has 16 rounds to ensure safer data against unexpected attacks. Applying DES to data encryption will be very useful for protecting data.


2018 ◽  
Vol 12 (4) ◽  
pp. 54-67
Author(s):  
Charifa Hanin ◽  
Fouzia Omary ◽  
Souad Elbernoussi ◽  
Khadija Achkoun ◽  
Bouchra Echandouri

The communication of private information is very dangerous, since unauthorized entities can intercept it. Thus, encryption is one of the principal information security solutions that helps keep information confidentiality. This latter can be satisfied by the use of various encryption techniques, namely block cipher. In this paper, the authors propose a novel block cipher using reversible and irreversible one-dimensional cellular automata (CA) with an ant colony optimization (ACO)-based S-box in order to establish more confusion. The obtained experimental results confirm that the designed cipher resists against statistical attacks, and it has both good confusion and diffusion comparing to the existent classical symmetric cryptosystems.


Sign in / Sign up

Export Citation Format

Share Document