scholarly journals Subject Review: Comparison Between 3DES, AES and HiSea Algorithms

Author(s):  
Shaimaa Khudhair Salah ◽  
Waleed Rasheed Humood ◽  
Ahmed Othman Khalaf ◽  
Zainab Khyioon Abdalrdha

Security is one of the main sources of information protection, especially sensitive information that is transmitted over the Internet. Encryption is one of the most important elements used, which is an effective and necessary element to provide high-level security communication between different entities by transmitting unclear and encrypted information that does not allow unauthorized person to access, the method of choosing the appropriate and correct encryption algorithm is important to provide a secure connection that provides a more efficient and accurate encryption system. In this paper, we will review the algorithms (Triple DES, AES & HiSea) for secret key encryption that are most commonly used for this type of encryption.

2018 ◽  
Vol 7 (4.5) ◽  
pp. 347
Author(s):  
Mohd Vasim Ahamad ◽  
Misbah Urrahman Siddiqui ◽  
Maria Masroor ◽  
Urooj Fatima

With the technology advancements and easy availability of internet, every day millions of users share information electronically through emails, file sharing, e-commerce, etc.  As, internet is highly vulnerable to various attacks, sending sensitive information over the Internet may be dangerous. One of the ways to protect the sensitive Information is using the cryptographic techniques. So, while sharing sensitive information over the Internet, it should be sent in encrypted form to prevent the access by unauthorized person. Encryption can be     defined as the process of transforming information in such a manner that only authorized person can understand the shared information. In this paper, we have taken Playfair encryption algorithm for encryption and modified it by using Fibonacci series. Fibonacci series is used to generate a random key, which is used for encrypting the message in Playfair encryption algorithm. Using Fibonacci numbers and generating random keys provide significant security to shared information. 


Author(s):  
Shima Ramesh Maniyath ◽  
Thanikaiselvan V.

In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.


Author(s):  
Oleksandr Kravchenko

The object of the thesis is the use of steganographic methods for organizing a covert communication channel in a public channel, providing resistance to lossy compression. The aim of the thesis is to develop an algorithm for embedding data into bitmap images that is resistant to JPEG compression and attacks on the container. In this thesis, the features of the JPEG algorithm are investigated, steganographic methods of information protection are analyzed, and a steganographic algorithm is designed that is resistant to JPEG compression and attacks on the container. Additional security is provided by the polyalphabetic substitution cipher and user secret key used to encrypt the original message. The algorithm was developed using the Python 3 programming language, the NumPy, SciPy, MatPlotLib libraries and the Jupyter Lab package. The task was completed using standard mathematical and statistical methods and tools of the high-level programming language Python 3.


Khazanah ◽  
2020 ◽  
Vol 12 (2) ◽  
Author(s):  
L Tarangga Arief G ◽  

Cryptanalysis is a process of finding weaknesses in cryptographic algorithms and using these weaknesses to decipher the ciphertext without knowing the secret key. One technique of cryptanalysis is frequency analysis, using the frequency of letters to translate ciphertext to plaintext. Frequency analysis is usually used to test the success of an encryption algorithm. Every language in the world has its own property in letter frequency. This made every language had a different aspect to make sure the algorithm working properly for securing plaintext. This makes it important to know the frequency analysis in Indonesian. The method that was used in this research paper is the proportion estimate to estimate the error from the result and the data we collected is from 10,000 articles that were scrapped from the internet. The result of this paper is the frequency of each letter in the Indonesian language.


2015 ◽  
Vol 28 (28) ◽  
pp. 53-68 ◽  
Author(s):  
Zbigniew Głąbiński

Abstract The article presents the results of the questionnaire survey studying the level of Polish tourists’ ecological awareness, as well as the degree of their familiarity and interest in the European Ecological Network Natura 2000 in the coastal areas. The survey was held in the years 2012-2013 and was conducted among the respondents visiting the Polish Baltic coast. The majority of tourists (80%) arriving at the seaside for recreational purposes declare a high level of interest in environmental protection and daily pro-ecological behaviours. The most popular sources of information on the environment comprise television and the Internet. The majority of tourists express their interest in recreation in protected areas, yet up to 82% of them are not familiar with the notion of Natura 2000. The knowledge about the locations of Natura 2000 sites in the vicinity of tourists’ holiday spots is equally poor. The visitors to the coastal areas are highly critical of the availability of information on Natura 2000 and indicate the information boards, websites and leaflets as the most desired sources of information.


Author(s):  
Peter B. Zirra ◽  
G.M. Wajiga

This study aimed at providing algorithms to secure sensitive information in store or in transit via unsecure channels from the hands of the Internet criminals by scrambling the sensitive information into a set of linear equations in matrix form and deciphering by solving the systems of the linear equations in conjunction with the principles of the delta encoding scheme, a formula and a lookup alphanumeric position table. The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. The proposed algorithms ensured that unauthorized users do not have access to sensitive and classified documents stored or transmitted to an intended recipient without a secret key. This means that, there is confidentiality, non-repudiation and integrity of our sensitive and classified information from the hands of unauthorized users on the Internet because of the robustness of the proposed algorithms.  


2018 ◽  
Vol 2 (1) ◽  
Author(s):  
Raid Daoud ◽  
Yaareb Al-Khashab

The internet service is provided by a given number of servers located in the main node of internet service provider (ISP). In some cases; the overload problem was occurred because a demand on a given website goes to very high level. In this paper, a fuzzy logic control (FLC) has proposed to distribute the load into the internet servers by a smart and flexible manner. Three effected parameters are tacked into account as input for FLC: link capacity which has three linguistic variables with Gaussian membership function (MF): (small, medium and big), traffic density with linguistic variables (low, normal and high) and channel latency with linguistic variables (empty, half and full); with one output which is the share server status (single, simple and share). The proposed work has been simulated by using MATLAB 2016a, by building a structure in the Fuzzy toolbox. The results were fixed by two manners: the graphical curves and the numerical tables, the surface response was smoothly changed and translates the well-fixed control system. The numerical results of the control system satisfy the idea of the smart rout for the incoming traffics from the users to internet servers. So, the response of the proposed system for the share of server ratio is 0.122, when the input parameter in the smallest levels; and the ratio is 0.879 when the input parameters are in highest level. The smart work and flexible use for the FLC is the main success solution for most of today systems control.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2021 ◽  
pp. 1-41
Author(s):  
Ana Cristina Lindsay ◽  
Qun Le ◽  
Denise Lima Nogueira ◽  
Márcia M. T. Machado ◽  
Mary L. Greaney

Abstract Objectives: The objective of this study was to assess sources of information about gestational weight gain (GWG), diet, and exercise among first-time pregnant Brazilian women in the United States (US). Design: Cross-sectional survey. Setting: Massachusetts, United States. Participants: First-time pregnant Brazilian women. Results: Eighty-six women, the majority of whom were immigrants (96.5%) classified as having low-acculturation levels (68%), participated in the study. Approximately two-thirds of respondents had sought information about GWG (72.1%), diet (79.1%), and exercise (74.4%) via the internet. Women classified as having low acculturation levels were more likely to seek information about GWG via the internet (OR = 7.55; 95% CI: 1.41, 40.26) than those with high acculturation levels after adjusting for age and receiving information about GWG from healthcare provider (doctor or midwife). Moreover, many respondents reported seeking information about GWG (67%), diet (71%), and exercise (52%) from family and friends. Women who self-identified as being overweight pre-pregnancy were less likely to seek information about diet (OR = 0.32; 95% CI: 0.11, 0.93) and exercise (OR = 0.33; 95% CI: 0.11, 0.96) from family and friends than those who self-identified being normal weight pre-pregnancy. Conclusions: This is the first study to assess sources of information about GWG, diet, and exercise among pregnant Brazilian immigrants in the US. Findings have implications for the design of interventions and suggest the potential of mHealth intervention as low-cost, easy access option for delivering culturally and linguistically tailored evidence-based information about GWG incorporating behavioral change practices to this growing immigrant group.


2021 ◽  
Vol 10 (5) ◽  
pp. 311
Author(s):  
Xiaolong Wang ◽  
Haowen Yan ◽  
Liming Zhang

Encryption of vector maps, used for copyright protection, is of importance in the community of geographic information sciences. However, some studies adopt one-to-one mapping to scramble vertices and permutate the coordinates one by one according to the coordinate position in a plain map. An attacker can easily obtain the key values by analyzing the relationship between the cipher vector map and the plain vector map, which will lead to the ineffectiveness of the scrambling operation. To solve the problem, a vector map encryption algorithm based on a double random position permutation strategy is proposed in this paper. First, the secret key sequence is generated using a four-dimensional quadratic autonomous hyperchaotic system. Then, all coordinates of the vector map are encrypted using the strategy of double random position permutation. Lastly, the encrypted coordinates are reorganized according to the vector map structure to obtain the cipher map. Experimental results show that: (1) one-to-one mapping between the plain vector map and cipher vector map is prevented from happening; (2) scrambling encryption between different map objects is achieved; (3) hackers cannot obtain the permutation key value by analyzing the pairs of the plain map and cipher map.


Sign in / Sign up

Export Citation Format

Share Document