scholarly journals Enhanced a TCP security protocol by using optional fields in TCP header

2016 ◽  
Vol 1 (24) ◽  
pp. 485-502
Author(s):  
Abdul Hadi M. Alaidi

The Transfer Control Protocol (TCP) itself does not guarantee the security of data that it transmits. However, under some circumstances, the security of TCP communication is required, e.g. the client-server communication in banking systems. Nowadays, the source socket layer (SSL) protocol is widely used; however, SSL is based on RSA (a public-key cryptographic algorithm) algorithm, which would require more computational resource. Therefore, an alternative faster solution utilizing symmetrical algorithm (AES) are proposed to achieve these goals: bidirectional authentication, encrypted data transmission and Integrity check. Moreover, use the optional fields in TCP header for carrying related information and introduced a new device SAM (Secure access module) which provides security-related functionalities: encryption, decryption, key-diversification etc

Author(s):  
Sapria Ulandari Lubis

The problem of the originality of the file is about how the file can be maintained its authenticity and ensures that the file has never been changed at all. In this study the object file used is the audio file. The process of manipulating files often occurs during data transmission activities from the sender to the recipient. The solution that can be done to handle the crime of manipulation is to apply a hash type cryptographic technique in which the hash value is encrypted from an audio file that can be used as a keyword to ensure the audio file has never been manipulated or has been manipulated. The hash cryptographic algorithm used is the type of MD5 algorithm. The results obtained from the process of implementing the MD5 algorithm using MATLAB R2010a software and the HASH Pro application are audio file hash codes. Keywords: Implementation, Encryption, Decryption, MD5 Method, Cryptography.


Author(s):  
Aleksander B. Vavrenyuk ◽  
Viktor V. Makarov ◽  
Viktor A. Shurygin ◽  
Dmitrii V. Tcibisov

2019 ◽  
Vol 9 (8) ◽  
pp. 1596
Author(s):  
Yishu Qiu ◽  
Yezi Xu ◽  
Lvqing Yang ◽  
Jinsheng Lu ◽  
Dingzhao Li

As an important part of economic development, warehousing logistics also needs to be transformed and upgraded in order to adapt to the development of the new situation. The RFID reader records the related information of the goods to improve the efficiency of warehouse operation by identifying the RFID tags attached to the goods in batches. This paper also proposes an improved group-based anti-collision algorithm (GMQT) to solve the problem of tag collision in the process of Radio Frequency Identification (RFID) identification. The simulation results show that the GMQT algorithm improves the recognition efficiency of the system. The algorithm has the advantages of small data transmission and stable performance; in particular, the recognition efficiency is not affected by the number of tags.


2007 ◽  
Vol 1 (1) ◽  
pp. 3-8 ◽  
Author(s):  
X. Bavard ◽  
J.-P. Goedgebuer ◽  
A. Locquet ◽  
L. Larger

2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Amal Hafsa ◽  
Mohamed Gafsi ◽  
Jihene Malek ◽  
Mohsen Machhout

Securing medical images is a great challenge to protect medical privacy. An image encryption model founded on a complex chaos-based Pseudorandom Number Generator (PRNG) and Modified Advanced Encryption Standard (MAES) is put forward in this paper. Our work consists of the following three main points. First, we propose the use of a complex PRNG based on two different chaotic systems which are the 2D Logistic map in a complex set and Henon’s system in the key generation procedure. Second, in the MAES 128 bits, the subbytes’ operation is performed using four different S-boxes for more complexity. Third, both shift-rows’ and mix-columns’ transformations are eliminated and replaced with a random permutation method which increases the complexity. More importantly, only four rounds of encryption are performed in a loop that reduces significantly the execution time. The overall system is implemented on the Altera Cyclone III board, which is completed with an SD card interface for medical image storage and a VGA interface for image display. The HPS software runs on μClinux and is used to control the FPGA encryption-decryption algorithm and image transmission. Experimental findings prove that the propounded map used has a keyspace sufficiently large and the proposed image encryption algorithm augments the entropy of the ciphered image compared to the AES standard and reduces the complexity time by 97%. The power consumption of the system is 136.87 mw and the throughput is 1.34 Gbit/s. The proposed technique is compared to recent image cryptosystems including hardware performances and different security analysis properties, such as randomness, sensitivity, and correlation of the encrypted images and results prove that our cryptographic algorithm is faster, more efficient, and can resist any kind of attacks.


Network security has been great concern with recent technical advancement in wireless communication. And for that, a secured system is to be developed to provide data security over wireless transmission. This paper presents wireless body area network (WBAN) with cryptographic AES algorithm which monitors patient biomedical parameters based on sensors, Arduino and ZigBee. WBAN provides real-time measurements of patients health based on biomedical sensor. AES cryptographic algorithm is implemented for secure communication over wireless network by encryption and decryption of physiological parameters. Implementation of algorithm using Arduino has been communicated by ZigBee network to provide security to the encrypted data (cipher text) on medium cost devices. This ensures security of data for medical rehabilitation and monitoring of patients. The main purpose of this paper is to help a physician to treat patients during emergency by monitoring patients round the clock (24*7). This paper is helpful for elderly and disabled people with no assistance to measure and send the results to the doctor immediately


2021 ◽  
Vol 252 ◽  
pp. 01027
Author(s):  
Yanrong Jing ◽  
Wenqian Zhang ◽  
Lin Ge ◽  
Nanfang Li ◽  
Xiyuan Shang ◽  
...  

In order to ensure the effect of network data transmission in scientific research institutions and avoid network information from being attacked and damaged, a secure sharing method of network data transmission based on multi-layer encryption technology is proposed. Combined with multi-layer encryption technology, the network data transmission security protocol is constructed to ensure the security and integrity of the initial file. The network information transmission security evaluation system is further constructed. The network transmission path security of scientific research institutions is tracked, evaluated and tested in real time. The network data transmission security sharing platform is constructed to ensure the safe sharing of massive and complex data Experiments have proved that the security and sharing processing effect of the network data transmission security sharing method based on multi-layer encryption technology are significantly improved compared with the traditional methods, and fully meet the research requirements.


2021 ◽  
Vol 11 (2) ◽  
pp. 396-405
Author(s):  
Dr.V. Vennila ◽  
L.I. Poomani ◽  
S. Thaaranya

In the field of computer networks, cryptography and steganography are the well-known features for best security purpose. The main idea is to transmit the data securely. So, providing acceptable level of security is essential for data transmission. Also it should reduce the time complexity of the security algorithm. Here we have employed the “Elliptic Curve Cryptography” scheme to encrypt the data and image. A “Least Significant Bit” steganography algorithm is used to insert the encrypted data to be hidden inside the image in order to send the data securely. The encrypted data from the image is then decrypted by the decryption algorithm. Finally the hidden data is taken from the decrypted data. Then the image is compressed before sending through the internet. MATLAB is utilized to mimic outcomes which show that it has great inserting limit and security.


2021 ◽  
Author(s):  
Arif Ozgun Harmanci ◽  
Miran Kim ◽  
Su Wang ◽  
Wentao Li ◽  
Yongsoo Song ◽  
...  

As DNA sequencing data is available for personal use, genomic privacy is becoming a major challenge. Nevertheless, high-throughput genomic data analysis outsourcing is performed using pipelines that tend to overlook these challenges. Results: We present a client-server-based outsourcing framework for genotype imputation, an important step in genomic data analyses. Genotype data is encrypted by the client and encrypted data are used by the server that never observes the data in plain. Cloud-based framework can benefit from virtually unlimited computational resources while providing provable confidentiality. Availability: Server is publicly available at https://www.secureomics.org/OpenImpute. Users can anonymously test and use imputation server without registration.


Sign in / Sign up

Export Citation Format

Share Document