scholarly journals Securitary Text on Images with RC-128 Bit Synthric Key Encryption

2021 ◽  
Vol 6 (2) ◽  
pp. 94-102
Author(s):  
Muslih Muslih ◽  
Abdussalam Abdussalam ◽  
Elkaf Rahmawan Pramudya

The main purpose of using cryptography is to provide the following four basic information security services. One of the purposes of cryptography is secrecy. Confidentiality is the fundamental security service provided by cryptography. This is a security service that stores information from unauthorized persons. Confidentiality can be achieved through a variety of ways ranging from physical security to the use of mathematical algorithms for data encryption. Vernam cipher is a stream cipher where the original data or plain with 8x8 block operation. Experimental results prove that RC4 can perform encryption and decryption with a fast execution process. In this study used a processor with 8GB of RAM. The encryption result of the text used yields the average encryption time and decryption average of 2 second.

2019 ◽  
Vol 3 (III) ◽  
pp. 1-13
Author(s):  
Adan Moro Guracha ◽  
Felix Kiruthu

Security service delivery in public sector is crucial as it entails protecting government personnel as well as property. Therefore, security is increasingly viewed as a key condition for economic growth and development. Lack or ineffective security service delivery weakens the performance of any organization. This study sought to determine if service delivery improves as a result of outsourcing of security services to commercial state owned enterprises in Kenya. Specifically, this research aimed at determining the effects of outsourcing cash protection, body guarding, property protection and information/data protection services on security service delivery of selected commercial state owned enterprises in Nairobi City County in Kenya. The study was guided by two theories; the Functionalist model and securitization theory. A descriptive research design was adopted. The target population for this study was a census of all the 29 selected commercial state owned enterprises. The study targeted security managers, assistant security managers and security staff, hence total target population was 958 respondents. The sample size was selected through purposive and random sampling techniques. The research used questionnaires to collect data. Descriptive statistics including frequencies, percentages, means and standard deviations were used. Further, inferential statistics including correlation and regression analysis were used to illustrate the relationship between the independent and the dependent variables. The study used a multiple regression model. The regression results indicated that, there is a positive and significant relationship between outsourcing cash protection security services and security service delivery of commercial state owned enterprises in Kenya (β=0.247, p=0.001); a positive and significant relationship between outsourcing bodyguard security services and security service delivery of commercial state owned enterprises in Kenya (β=0.271, p=0.000); a positive and significant relationship between outsourcing property guarding security services and security service delivery of commercial state owned enterprises in Kenya (β=0.289, p=0.033); and a positive and significant relationship between outsourcing information security services and security service delivery of commercial state owned enterprises in Kenya(β=0.389, p=0.015). From the findings, the study concluded that outsourcing security services has a significant influence on security service delivery of commercial state owned enterprises in Nairobi City County, Kenya. In particular, the study concluded that outsourcing cash protection, body guarding services, property guarding and information security services, had a positive and significant effect on security service delivery of commercial state owned enterprises in Kenya. The study recommended that commercial state owned enterprises should strengthen their cash protection security services, security officers should be trained on how to protect human life especially, the personnel that they are supposed to protect, private security companies should keep data on any property that enters and leaves the company’s premises, and that private data security officers should have access to IT skills. This is an open-access article, access, citation and distribution of this article is allowed with full recognition of the authors and the source.  This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.


Author(s):  
Trisna Setiawaty ◽  
Olven Manahan

Ksecurity wheel is one of the essential needs of the data, or information. With this regard the importance of the information or data by the party or person of interest. This research aims to design and build a system for data security deed of sale that can help the Notary / PPAT. The system was built using the RC4 (Rivest Code 4) which is a symmetric key cryptographic algorithms and is stream cipher, there is a process of encryption and decryption. The encryption is the process of encoding the original message or plaintext into ciphertext encrypted text. While decryption is the process of encoding back to cipherteksmenjadiplainteks (original data). This research resulted in a system that is able to change the data that can be read into the data that is not easily understood.


In this paper, we introduce an encryption and decryption procedure with high security by mathematical model, using Laplace transformation and Inverse Laplace Transformation for the given transforming data from one end to other end. We also give an example. Here we convert plain text to ASCII code. We take two primes as a primary key for encryption and decrypt in of the original data.


Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


Istoriya ◽  
2021 ◽  
Vol 12 (8 (106)) ◽  
pp. 0
Author(s):  
Tatiana Vagramenko

This article reconstructs the history of one KGB operation against the Jehovah’s Witnesses in Ukraine, launched by the Ukrainian security services in 1951. The operation aimed to infiltrate the Jehovah’s Witness underground organization in Ukraine and to organize a Witness country committee as a covert operation. The plan was designed such that the Soviet security service became the head of the Jehovah’s Witnesses organization, and the headquarters of the official Watch Tower Bible and Tract Society became a channel in their counter-intelligence operations. This article tells about the failures and unexpected side-effects of the secret operation caused by internal conflicts within the Soviet politics of religion. Paradoxically, in the context of a disintegrated Witness underground network, caused by the post-war deportations and mass arrests, severed communication channels with the Watch Tower Society and the absence of religious literature, the Soviet security service became an alternative communication channel between the faith communities and a source of religious reproduction (including the source of the production of Watch Tower literature). This study dwells upon historical materials from recently opened SBU (former KGB) archives in Ukraine.


Author(s):  
Bachujayendra Kumar ◽  
Rajya Lakshmidevi K ◽  
M Verginraja Sarobin

Wireless sensor networks (WSNs) have been used widely in so many applications. It is the most efficient way to monitor the information. There areso many ways to deploy the sensors. Many problems are not identified and solved. The main challenge of WSN is energy efficiency and information security. WSN power consumption is reduced by genetic algorithm-based clustering algorithm. Information from cluster head to base station may have a lot of chances to get hacked. The most reliable way to manage energy consumption is clustering, and encryption will suit best for information security. In this paper, we explain clustering techniques and a new algorithm to encrypt the data in the network.


2017 ◽  
Vol 6 (2) ◽  
pp. 57 ◽  
Author(s):  
Hirofumi Miyajima ◽  
Noritaka Shigei ◽  
Syunki Makino ◽  
Hiromi Miyajima ◽  
Yohtaro Miyanishi ◽  
...  

Many studies have been done with the security of cloud computing. Though data encryption is a typical approach, high computing complexity for encryption and decryption of data is needed. Therefore, safe system for distributed processing with secure data attracts attention, and a lot of studies have been done. Secure multiparty computation (SMC) is one of these methods. Specifically, two learning methods for machine learning (ML) with SMC are known. One is to divide learning data into several subsets and perform learning. The other is to divide each item of learning data and perform learning. So far, most of works for ML with SMC are ones with supervised and unsupervised learning such as BP and K-means methods. It seems that there does not exist any studies for reinforcement learning (RL) with SMC. This paper proposes learning methods with SMC for Q-learning which is one of typical methods for RL. The effectiveness of proposed methods is shown by numerical simulation for the maze problem.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 64 ◽  
Author(s):  
S. Renu ◽  
S.H. Krishna Veni

The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


2020 ◽  
Vol 5 (4) ◽  
pp. 395-398
Author(s):  
Taleb Samad Obaid

To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the information transferred between both sides sender/receiver in the network must be scrambled using the encryption algorithm. The second side (receiver) should be outlook the original data using the decryption algorithms. Some encryption techniques applied the only one key in the cooperation of encryption and decryption algorithms. When the similar key used in both proceeds is called symmetric algorithm. Other techniques may use two different keys in encryption/decryption in transferring information which is known as the asymmetric key.  In general, the algorithms that implicated asymmetric keys are much more secure than others using one key.   RSA algorithm used asymmetric keys; one of them for encryption the message, and is known as a public key and another used to decrypt the encrypted message and is called a private key. The main disadvantage of the RSA algorithm is that extra time is taken to perform the encryption process. In this study, the MATLAB library functions are implemented to achieve the work. The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with the private information. The algorithms are implemented successfully on different sizes of messages files.


Sign in / Sign up

Export Citation Format

Share Document