scholarly journals Combination of RC4 and Adler32 in Improving Security and Validity

2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Encryption is needed in the digital world. It can help users to secure confidential information that will be sent. Many algorithms can be used to do that. RC4 or Rivest Cipher 4 made by Ron Rivest is a synchronous type of stream cipher that is a cipher that has a symmetric key and encrypts or decrypts plaintext bits per bit by performing XOR operations with a number generated on S-BOX. RC4 can be run with variable key lengths and operate with byte orientation. RC4 encryption method has weaknesses. One of the disadvantages of RC4 is that the attacker can know the sample or the entire plaintext of the ciphertext without having to know the encryption key. RC4 merger with Adler32 will help improve data security. Adler32 still has weaknesses. Although these weaknesses are rare, if a third party can combine the values of A and B according to the modified results in the text, changes in information can occur even though the feature value of the hash function has the same value before and after modification. The hash function value can be solved to get the A and B values; then the information will be modified and adjusted to the A and B values. The result is that the information is no longer original while the hash function indicates that the information is still original. However, Adler32 is very helpful when combined with RC4 where both algorithms work together to improve the security and validity of a document.

2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Author(s):  
Trisna Setiawaty ◽  
Olven Manahan

Ksecurity wheel is one of the essential needs of the data, or information. With this regard the importance of the information or data by the party or person of interest. This research aims to design and build a system for data security deed of sale that can help the Notary / PPAT. The system was built using the RC4 (Rivest Code 4) which is a symmetric key cryptographic algorithms and is stream cipher, there is a process of encryption and decryption. The encryption is the process of encoding the original message or plaintext into ciphertext encrypted text. While decryption is the process of encoding back to cipherteksmenjadiplainteks (original data). This research resulted in a system that is able to change the data that can be read into the data that is not easily understood.


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


2020 ◽  
pp. 019459982096963
Author(s):  
Vanessa F. Torrecillas ◽  
Kaden Neuberger ◽  
Alexander Ramirez ◽  
Paul Krakovitz ◽  
Jeremy D. Meier

Objective Third-party payers advocate for prior authorization (PA) to reduce overutilization of health care resources. The impact of PA in elective surgery is understudied, especially in cases where evidence-based clinical practice guidelines define operative candidacy. The objective of this study is to investigate the impact of PA on the incidence of pediatric tonsillectomy. Study Design Cross-sectional study. Setting Health claims database from a third-party payer. Methods Any pediatric patient who had evaluation for tonsillectomy from 2016 to 2019 was eligible for inclusion. A time series analysis was used to evaluate the change in incidence of tonsillectomy before and after PA. Lag time from consultation to surgery before and after PA was compared with segmented regression. Results A total of 10,047 tonsillectomy claims met inclusion and exclusion criteria. Female patients made up 51% of claims, and the mean age was 7.9 years. Just 1.5% of claims were denied after PA implementation. There was no change in the incidence of tonsillectomy for all plan types ( P = .1). Increased lag time from consultation to surgery was noted immediately after PA implementation by 2.38 days (95% CI, 0.23-4.54; P = .030); otherwise, there was no significant change over time ( P = .98). Conclusion A modest number of tonsillectomy claims were denied approval after implementation of PA. The value of PA for pediatric tonsillectomy is questionable, as it did not result in decreased incidence of tonsillectomy in this cohort.


2020 ◽  
Vol 10 (5) ◽  
pp. 6187-6190
Author(s):  
A. S. Alshammari

The keyspace of a cryptography system must be long enough in order to protect it from brute force attacks. The One-Time Pad (OTP) encryption is unconditionally secure because of its truly random keystream that is used only once. This paper proposes a new chaotic symmetric cryptosystem approach, comparable to OTP. The proposed system utilizes two Lorenz generators, a main and an auxiliary, where the aim of the second one is to make one of the main Lorenz generator’s parameters to vary continually with time in a chaotic manner. This technique was built on digitizing two Lorenz chaotic models to increase the security level. The scrambling scheme was developed and the Lorenz stream cipher binary stream successfully passed the NIST randomness test. The cryptosystem showed a high degree of security, as it had a keyspace of 2576, and it was compared with existing symmetric key cryptography systems, such as DES, 3DES, AES, Blowfish, and OTP.


2017 ◽  
Vol 4 ◽  
pp. 82-86
Author(s):  
Dawid Górniak ◽  
Piotr Kopniak

The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1.


Author(s):  
Abinaya R

Password authentication is the most widely used authentication technique, for it is available at a low cost and easy to deploy. Many users usually set their passwords using familiar vocabulary for its convenience to remember. Passwords may be leaked from weak systems. Vulnerabilities are continuously being determined, and no longer all systems may be well timed patched to resist attacks, which give adversaries an opportunity to illegally access vulnerable systems. To overcome the vulnerabilities of password attacks, here propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems. In our framework, first, the received plain password from a client is hashed through a cryptographic hash function (e.g., SHA-512). Then, the hashed password is randomly shuffled to get a negative password. Finally, the negative password is encrypted into an Encrypted Negative Password using a symmetric-key algorithm RC5, to further improve security. The proposed hash function and encryption methodologies make it difficult to break passwords from ENPs. This proposed ENP system will be implemented for banking environment to improve security of password storage and transaction details.


Recognizing the significance of customer retention and creation, customer centric firms are continuously and systematically measuring customer satisfaction in terms of how well their customers are being treated and what are the factors influencing customer satisfaction level. Even when conscious efforts are being made by the business to keep its customers satisfied, there may be an instance where a consumer instead of getting his/her grievance resolved with the vendor / service provider approaches the consumer forum i.e. third party for resolution of grievance. An important question that arises in such scenario is that whether such aggrieved persons are satisfied with the offering of the forum or not. Moreover, in today’s dynamic and digital world, third party complaints are on continuous rise. The present study focuses on identifying various factors which influence the satisfaction level of consumer complainants. Through well designed questionnaire, involving likert scale statements related to distributive, procedural and interactional justice, responses have been collected from 300 respondents from the district of Ludhiana from the State of Punjab. Analysis of responses, using factor analysis technique, has enabled the identification of factors such as convenience and cost, behavioural aspect and credentials of the personnel working with consumer dispute redressal forums, established under Consumer Protection Act 1986


Sign in / Sign up

Export Citation Format

Share Document