scholarly journals Software Analytical Method for Protecting Digital Information

Known to date means of information protection does not have a high degree of noise immunity and reliability. This work is related to the development of a more effective way to protect the source information using a software-analytical method based on the Vigenère cipher. The best known and most widely used methods of symmetric encryption are DES and the Vigenère cipher. The Vigenère cipher is a polyalphabetic encryption method for alphabetic text by using key words. The Vigenère cipher requires a single key asked a set b of letters. These sets are signed with the repetition of the message, and then the generated sequence is added back to the plaintext on modul (the power of the alphabet). To achieve this goal we propose to use multiple iteration in which the corresponding algorithms of encryption and decryption consist of successive cycles of the same type of encryption. The developed mathematical model for block coding, as well as methods and algorithms for their decoding. Presented in a modified Vigenère algorithm with the use of a block cipher based on variation of number of iteration with shift key, allows, in contrast to the known algorithms that more reliably protect the data on the Web server.

2021 ◽  
Vol 11 (4) ◽  
pp. 1781
Author(s):  
Peng Wang ◽  
Xiang Li

Recent years have seen an increasing emphasis on information security, and various encryption methods have been proposed. However, for symmetric encryption methods, the well-known encryption techniques still rely on the key space to guarantee security and suffer from frequent key updating. Aiming to solve those problems, this paper proposes a novel symmetry-key method for text encryption based on deep learning called TEDL, where the secret key includes hyperparameters in the deep learning model and the core step of encryption is transforming input data into weights trained under hyperparameters. Firstly, both communication parties establish a word vector table by training a deep learning model according to specified hyperparameters. Then, a self-update codebook is constructed on the word vector table with the SHA-256 function and other tricks. When communication starts, encryption and decryption are equivalent to indexing and inverted indexing on the codebook, respectively, thus achieving the transformation between plaintext and ciphertext. Results of experiments and relevant analyses show that TEDL performs well for security, efficiency, generality, and has a lower demand for the frequency of key redistribution. Especially, as a supplement to current encryption methods, the time-consuming process of constructing a codebook increases the difficulty of brute-force attacks, meanwhile, it does not degrade the efficiency of communications.


2015 ◽  
Vol 52 (2) ◽  
pp. 221-232
Author(s):  
Pál Dömösi ◽  
Géza Horváth

In this paper we introduce a novel block cipher based on the composition of abstract finite automata and Latin cubes. For information encryption and decryption the apparatus uses the same secret keys, which consist of key-automata based on composition of abstract finite automata such that the transition matrices of the component automata form Latin cubes. The aim of the paper is to show the essence of our algorithms not only for specialists working in compositions of abstract automata but also for all researchers interested in cryptosystems. Therefore, automata theoretical background of our results is not emphasized. The introduced cryptosystem is important also from a theoretical point of view, because it is the first fully functioning block cipher based on automata network.


Author(s):  
Sergio Roldán Lombardía ◽  
Fatih Balli ◽  
Subhadeep Banik

AbstractRecently, cryptographic literature has seen new block cipher designs such as , or that aim to be more lightweight than the current standard, i.e., . Even though family of block ciphers were designed two decades ago, they still remain as the de facto encryption standard, with being the most widely deployed variant. In this work, we revisit the combined one-in-all implementation of the family, namely both encryption and decryption of each as a single ASIC circuit. A preliminary version appeared in Africacrypt 2019 by Balli and Banik, where the authors design a byte-serial circuit with such functionality. We improve on their work by reducing the size of the compact circuit to 2268 GE through 1-bit-serial implementation, which achieves 38% reduction in area. We also report stand-alone bit-serial versions of the circuit, targeting only a subset of modes and versions, e.g., and . Our results imply that, in terms of area, and can easily compete with the larger members of recently designed family, e.g., , . Thus, our implementations can be used interchangeably inside authenticated encryption candidates such as , or in place of .


2019 ◽  
Vol 2 ◽  
pp. 65-70
Author(s):  
Leyla Mirgamishli ◽  

Given the high degree of openness of the Azerbaijani economy and the sensitivity of national banks to global challenges, the Strategic Road Map on the development of financial services was developed and introduced in 2016 in the Republic. The project was created taking into account the principles of modern technologies: financial inclusion; digital information support; protection of the rights of consumers of banking services; etc. The project implementation led to the modernization of the financial and credit sector of the Republic of Azerbaijan, to the introduction of modern operating systems in various segments of financial institutions.


Author(s):  
Gh Khaleel ◽  
SHERZOD TURAEV ◽  
M.I.M. Tamrin ◽  
Imad F. Al-Shaikhli

The performance and security have central importance of cryptography field. Therefore, theneed to use block ciphers are become very important. This paper presents a new block cipher based on finiteautomata system. The proposed cryptosystem is executed based on parallel computations to reduce thedelay time. Moreover, to achieve high security, we use different machines (variant non-deterministicautomata accepters) as keys for encryption and decryption.


2020 ◽  
Vol 13 (44) ◽  
pp. 4483-4489
Author(s):  
C Beaula ◽  

Background/Objective: The Coronavirus Covid-19 has affected almost all the countries and millions of people got infected and more deaths have been reported everywhere. The uncertainty and fear created by the pandemic can be used by hackers to steal the data from both private and public systems. Hence, there is an urgent need to improve the security of the systems. This can be done only by building a strong cryptosystem. So many researchers started embedding different topics of mathematics like algebra, number theory, and so on in cryptography to keep the system, safe and secure. In this study, a cryptosystem using graph theory has been attempted, to strengthen the security of the system. Method: A new graph is constructed from the given graph, known as a double vertex graph. The edge labeling of this double vertex graph is used in encryption and decryption. Findings: A new cryptosystem using the amalgamation of the path, its double vertex graph and edge labeling has been proposed. From the double vertex graph of a path, we have given a method to find the original path. To hack such an encrypted key, the knowledge of graph theory is important, which makes the system stronger. Applications:The one-word encryption method will be useful in every security system that needs a password for secure communication or storage or authentication. Keywords: Double vertex graphs; path; adjacency matrix; encryption; cryptography


Author(s):  
Ahmad Ahmoud Al-Harahsheh Ahmad Ahmoud Al-Harahsheh

The study aims to recognise "The Degree of Islamic Education Teachers' Commitment for the Teaching Career ethics from the School Principals' Viewpoint in Jerash Governorate. The researcher uses the analytical method. The sample is 80 male and female school principals who are chosen randomly. The questionnaire consists of 54 paragraphs divided into four fields. These fields are the relationship between Islamic Education Teachers and their career (paragraphs 1_14), their relationship with their students (paragraphs 15_30), their relationship with their colleagues (paragraphs 31_44), and the fourth field is the relationship between Islamic Education Teachers and the local society (paragraphs 45_54), The study finds that "The Degree of Islamic Education Teachers' Commitment for the Teaching Career Ethics from the School Principals' Viewpoint in Jerash Governorate" comes generally with high degree. The average of the fields come in the following ascending order: the relationship between Islamic Education Teachers and local society, their career, their students, their colleagues. Also, the results show there are no differences with statistical evidence in their degree of commitment for teaching career ethics according to gender, level of education, experience or the type of university. The study recommends to hold courses and workshops for teachers, school principals and supervisors to enlighten them with the importance of the commitment of teaching career ethics. In addition, it recommends to prepare an ethical charter for new teachers to follow it from the beginning of their work.


2020 ◽  
Vol 4 (2) ◽  
pp. 9
Author(s):  
Angga Aditya Permana ◽  
Desi Nurnaningsih

Cryptography is the science of maintaining data confidentiality, where the original text (plaintext) is encrypted using an encryption key to be ciphertext (text that has been encrypted). In this case cryptography secures data from a third party so that the third party cannot know the original contents of the data because the one who holds the key for encryption and decryption is only the sender and receiver. There are several cryptographic methods that are commonly used, one of which is DES or Data Encryption Standard. DES is included in the key-symmetric cryptography and is classified as a block cipher type


Big data security is the most focused research issue nowadays due to their increased size and the complexity involved in handling of large volume of data. It is more difficult to ensure security on big data handling due to its characteristics 4V’s. With the aim of ensuring security and flexible encryption computation on big data with reduced computation overhead in this work, framework with encryption (MRS) is presented with Hadoop Distributed file System (HDFS). Development of the MapReduce paradigm needs networked attached storage in addition to parallel processing. For storing as well as handling big data, HDFS are extensively utilized. This proposed method creates a framework for obtaining data from client and after that examining the received data, excerpt privacy policy and after that find the sensitive data. The security is guaranteed in this framework using key rotation algorithm which is an efficient encryption and decryption technique for safeguarding the data over big data. Data encryption is a means to protect data in storage with containing a key encryption saved and accessible to reuse the data while required. The outcome shows that the research method guarantees greater security for enormous amount of data and gives beneficial info to related clients. Therefore the outcome concluded that the proposed method is superior to the previous method. Finally, this research can be applied effectively on the various domains such as health care domains, educational domains, social networking domains, etc which require more security and increased volume of data.


Sign in / Sign up

Export Citation Format

Share Document