scholarly journals Analysis and software implementation of the modified cryptographic Vernam cipher and the Caesar cipher

Author(s):  
Valentyna Fastovets

Problem. Modern cryptography is a very important part of cybersecurity and confidentiality of many operations. It covers almost all parts of our lives, from e-commerce to specialized education of students. Goal. The advantage of symmetric key cryptography is that working with this method is very easy for users, as one key is used for encryption, as well as for decryption purposes, and this key must be secret and should be known only to the sender and recipient and no one else. On the other hand, public key cryptography has two keys. Unfortunately, this exposes the inherent security flaws, as the integrity of the encryption depends entirely on the password. It was decided to consider the implementation of a modified symmetric Vernam cipher that avoids these problems, and its modification and experimental studies should further strengthen data protection. Methodology. Higher mathematics, linear algebra are very important subjects. But if we want to encourage students with cryptography, we need to use all aspects of the IT cluster more effectively. Ideal for this is the implementation of algorithms and programs using programming languages. It is very important and useful for students studying Cybersecurity to illustrate where and how it is possible to create software implementations of encryption / decryption methods. Results. The article presents the analysis and implementation of the modified cryptographic Vernam cipher and Caesar cipher using a concept that combines modern programming languages and the principles of cryptography, which students study in subject-oriented specialties. Originality. An original approach to teaching Cybersecurity students by implementing ciphers using applied programming is described. Practical value. Using cryptography as a learning tool will help students develop their programming skills and effectively understand the concept of cybersecurity in real-world examples.

System security is a basic aspect of data sharing. Aspires have been made to exhaust particular defects over the web. For this, different creative usage and security methods have been made. The measure of information exchange isn't a factor. The major factor is, how much it's secure, the channel gives while transmitting information. Cryptography is one such structure, which grants secure information transmission without losing its protection and uprightness. In light of the key circulation, cryptography is also assembled into two critical forms Symmetric Key Cryptography as well as Asymmetric Key Cryptography. RSA is one of the best conspicuous public-key cryptography based algorithms is unequivocally utilized for encryption/decryption. It's far based on the logical arrangement of factorization of strongly enormous whole numbers which is a compute-intensive way. In this paper, we have provided a novel, secure and profitable information communication system dependent on the RSA algorithm. Mystery updating signal dealing with systems have been proposed in the exploration for the two data transmission and the channel estimation stages. The proposed one facilitates the advantages of both RSA calculation and One Time Password (OTP) produced by the sender and got just by the endorsed customer. Despite that not at all like conventional RSA algorithm, in this work we embrace perfect key assurance by particle swarm optimization (PSO) during both encryption and decryption. The use of PSO for perfect key decision makes the general technique proficient by extending the security level and making the computation procedure very easy.


2012 ◽  
Vol 64 (3) ◽  
pp. 1207-1216 ◽  
Author(s):  
D. Hrncic ◽  
Aleksandra Rasic-Markovic ◽  
Jelica Bjekic-Macut ◽  
Veselinka Susic ◽  
D. Mladenovic ◽  
...  

Epilepsy is one of the leading neurological disorders and affects 1-2% of the world?s population. Generally, it is a result of an imbalance between excitatory and inhibitory phenomena in the central nervous system (CNS), but the mechanisms of its initiation and propagation still require further investigations. Experimental models represent one of the most powerful tools to better understand the mechanisms of epileptogenesis. Nitric oxide (NO) is gaseous molecule with pleiotropic physiological and pathological effects in almost all organ systems and intriguing biological relevance, especially in the CNS where it acts as a gaseous neurotransmitter. The role of NO in the generation of epilepsy is highly contradictory, since there is evidence of its anticonvulsive, as well as proconvulsive properties. Therefore, we will discuss in this review the involvement of NO-mediated signaling pathways in the mechanisms of epileptogenesis, taking into account the findings revealed in experimental studies on animal models of epilepsy.


Author(s):  
Yan-Wen Chen ◽  
Jeng-Jung Wang ◽  
Yan-Haw Chen ◽  
Chong-Dao Lee

In AES MixColumns operation, the branch number of circulant matrix is raised from 5 to 9 with 8´8 circulant matrices that can be enhancing the diffusion power. An efficient method to compute the circulant matrices in AES MixColumns transformation for speeding encryption is presented. Utilizing 8´8 involutory matrix multiplication is required 64 multiplications and 56 additions in in AES Mix-Columns transformation. We proposed the method with diversity 8´8 circulant matrices is only needed 19 multiplications and 57 additions. It is not only to encryption operations but also to decryption operations. Therefore, 8´8 circlant matrix operation with AES key sizes of 128bits, 192bits, and 256 bits are above 29.1%, 29.3%, and 29.8% faster than using 4´4 involutory matrix operation (16 multiplications, 12 additions), respectively. 8´8 circulant matrix encryption/decryption speed is above 78% faster than 8´8 involutory matrix operation. Ultimately, the proposed method for evaluating matrix multiplication can be made regular, simple and suitable for software implementations on embedded systems.


Author(s):  
Sabitha S ◽  
Binitha V Nair

Cryptography is an essential and effective method for securing information’s and data. Several symmetric and asymmetric key cryptographic algorithms are used for securing the data. Symmetric key cryptography uses the same key for both encryption and decryption. Asymmetric Key Cryptography also known as public key cryptography uses two different keys – a public key and a private key. The public key is used for encryption and the private key is used for decryption. In this paper, certain asymmetric key algorithms such as RSA, Rabin, Diffie-Hellman, ElGamal and Elliptical curve cryptosystem, their security aspects and the processes involved in design and implementation of these algorithms are examined.


Author(s):  
Khaleel Ahmad ◽  
Masroor Ansari

A vagrant is a freeware tool that facilitates to easily manage and configure multiple virtual machines. The main goal of its creation is to simplify the environment maintenance in a large project with multi technical tasks. It provides the better manageability and maintainability for the developers and prevents needless maintenance and improve the productivity for development using simple functions. Vagrant supports almost all main languages for the development, but it is written in the Ruby language. Vagrant was initially supported by Virtual Box, but the version 1.1 has the full vital support for VMware, KVM and other virtualization environment as well as for the server like Amazon EC2. It supports many programming languages such as C#, Python, PHP and JavaScript to enhance the project efficiency. Recently, version 1.6 may serve as a fully virtualized operating system due to the added support for Docker containers.


Author(s):  
Dulal C. Kar ◽  
Hung L. Ngo ◽  
Clifton J. Mulkey

It is challenging to secure a wireless sensor network (WSN) because of its use of inexpensive sensor nodes of very limited processing capability, memory capacity, and battery life that preclude using traditional security solutions. Due to perceived excessive computational and architectural overhead, public key algorithms are altogether avoided for WSNs. Currently security in WSNs is provided using only symmetric key cryptography, but it requires keys to be embedded in sensor nodes before deployment and the entire network has to go through a key establishment phase after deployment. Accordingly, in this chapter, we summarize, discuss, and evaluate recent results reported in literature on sensor network security protocols such as for key establishment, random key pre-distribution, data confidentiality, and broadcast authentication. In addition, we discuss promising research results in public key cryptography for WSNs, particularly related to elliptic curve cryptography and its application for identity based encryption.


2019 ◽  
Vol 56 (7) ◽  
pp. 756-773 ◽  
Author(s):  
C.M. Lesher

The preferential localization of Fe–Ni–Cu–PGE sulfides within the horizontal components of dike–sill–lava flow complexes in large igneous provinces (LIPs) indicates that they were fluid dynamic traps for sulfide melts. Many authors have interpreted them to have collected sulfide droplets transported upwards, often from deeper “staging chambers”. Although fine (<1–2 cm) dilute (<10%–15%) suspensions of dense (∼4–5 g/cm3) sulfide melt can be transported in ascending magmas, there are several problems with upward-transport models for almost all LIP-related deposits: (1) S isotopic data are consistent with nearby crustal sources, (2) xenoliths appear to be derived from nearby rather than deeper crustal sources, (3) lateral sheet flow or sill facies of major deposits contain few if any sulfides, (4) except where there is evidence for a local S source, sulfides or chalcophile element enrichments rarely if ever occur in the volcanic components even where there is mineralization in the subvolcanic plumbing system, and (5) some lavas are mildly to strongly depleted in PGE >>> Cu > Ni > Co, indicating that unerupted sulfides sequestered PGEs at depth. Two potential solutions to this paradox are that (i) natural systems contained surfactants that lowered sulfide–silicate interfacial tensions, permitting sulfide melts to coalesce and settle more easily than predicted from theoretical/experimental studies of artificial/analog systems, and (or) (ii) sulfides existed not as uniformly dispersed droplets, as normally assumed, but as fluid-dynamically coherent pseudoslugs or pseudolayers that were large and dense enough that they could not be transported upwards. Regardless of the ultimate explanation, it seems likely that most high-grade Ni–Cu–PGE sulfide deposits in LIPs formed at or above the same stratigraphic levels as they are found.


2021 ◽  
pp. 99-103
Author(s):  
A. A. Molyavko ◽  
A. V. Marukhlenko ◽  
N. P. Borisova

Experimental studies have shown that with an increased level of mineral nutrition (N120P180K240) all varieties increased the yield (by 1.7–4.1 tons/ha, or by 10–25%), while the most productive varieties being Bryansky Nadezhny, Bryanskaya Novinka, Slava Bryanshchiny (21.9–22.9 tons/ha). In terms of dry substances content almost all varieties met the requirements of processing, which called for for a dry substance level in tubers of at least 20–24%. With an increase in the dose of fertilizers the amount of starch and dry matter in tubers decreased. On an average background, the starch content compared to the control decreased by 0.7–1.1%, dry substances — by 0.7– 1.2%, on an increased background respectively — by 1.2–1.7%, dry substances — by 1.4–2.7%. The taste of potatoes on an increased background of fertilizers worsened regardless of variety. In terms of darkening of the flesh, raw cleaned tubers of all varieties are not suitable for long-term storage (for example, for 24 hours), while boiled tubers of all varieties did not reduce the quality. Growing potatoes on an increased background of mineral nutrition increased the darkening of raw tubers of the studied varieties compared to control. In the studied varieties the content of reducing sugars in many cases exceeded the amount allowed for the manufacture of crispy potatoes, and therefore its quality was reduced, mainly due to the color of the slices. Almost all varieties gave puree of good quality. An increase in the background of fertilizers slightly worsened the consistency of puree, which reduced the overall estimate.


2018 ◽  
Vol 21 (4) ◽  
pp. 73-83
Author(s):  
A. V. Bykov ◽  
S. G. Parafes ◽  
V. I. Smyslov

Designing a modern flight vehicle is associated with the need to solve many scientific and technical problems. These tasks include the prevention of insecure self-oscillations in flight, taking into account the elasticity of the structure. These problems relate to dynamic aeroelasticity, a science that examines the interaction of an elastic structure (at its oscillation) with an air flow. Maneuverable unmanned aerial vehicles (UAVs) are considered. Since UAVs are essentially not used without an automatic control system (ACS), its presence must be taken into account when considering the vibrations of an elastic structure in flight. The influence of the elasticity of UAV design on the operation of ACS in flight is manifested in the possibility of self-oscillations in the loop "elastic UAV – ACS". Self-oscillations lead to disruption of normal operation of the onboard equipment or its failure. The complexity of the problem requires its consideration at almost all stages of UAV’s development, including the creation of a prototype and testing. The computational and experimental studies of the characteristics of elastic oscillations in the UAV flight of the cross-shaped scheme are considered. The features of these UAVs (options with a modular design, the nonlinearity of the airframe, rudders, ACS, and others) due to a significant amount of testing that is the basis for the calculations. Electric actuators have a small continuous operation time, and resource use, there are gearboxes with a large gear ratio and backlashes. This determines the dependence of the rotation rigidity of the rudders on the amplitude and frequency, as well as a significant increase in the total moments of inertia. The technique of bench experiment with obtaining data to assess the boundaries of the flutter and the boundaries of the stability of the loop "elastic UAV – ACS" is given. The questions of improvement of the stabilization system of UAV required for the study of its stability at frequencies of elastic oscillations are considered, as well as the evaluation of the limiting cycles of self-oscillations is given.


Sign in / Sign up

Export Citation Format

Share Document