A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPU

Author(s):  
Srinivasa K. G. ◽  
Siddesh G. M. ◽  
Srinidhi Hiriyannaiah ◽  
Anusha Morappanavar ◽  
Anurag Banerjee

The world of digital communication consists of various applications which uses internet as the backbone for communication. These applications consist of data related to the users of the application, which is confidential and integrity needs to be maintained to protect against unauthorized access and use. In the information hiding field of research, Cryptography is one of the wide techniques used to provide security to the internet applications that overcome the challenges like confidentiality, integrity, authentication services etc. In this paper, we present a novel approach on symmetric key cryptography technique using genetic algorithm that is implemented on CUDA architecture.

Cryptography ◽  
2020 ◽  
pp. 193-213
Author(s):  
Srinivasa K. G. ◽  
Siddesh G. M. ◽  
Srinidhi Hiriyannaiah ◽  
Anusha Morappanavar ◽  
Anurag Banerjee

The world of digital communication consists of various applications which uses internet as the backbone for communication. These applications consist of data related to the users of the application, which is confidential and integrity needs to be maintained to protect against unauthorized access and use. In the information hiding field of research, Cryptography is one of the wide techniques used to provide security to the internet applications that overcome the challenges like confidentiality, integrity, authentication services etc. In this paper, we present a novel approach on symmetric key cryptography technique using genetic algorithm that is implemented on CUDA architecture.


2018 ◽  
pp. 90-97 ◽  
Author(s):  
Reshu Goyal ◽  
Praveen Dhyani ◽  
Om Prakash Rishi

Time has changed and so does the world. Today everything has become as a matter of one click. With this effort we are trying to explore the new opportunities features and capabilities of the new compeers of Internet applicability known as Social Media or Web 2.0. The effort has been put in to use the internet, social media or web 2.0 as the tool for marketing issues or the strategic business decision making. The main aim is to seek social media, web 2.0 internet applications as the tool for marketing.


2014 ◽  
Vol 631-632 ◽  
pp. 165-170
Author(s):  
Shu Hui Shi ◽  
Zao Ping Li ◽  
Ya Feng Liu

With the computer technology boomingly developing and the internet applications gradually spreading all over the world, more and more requirements of endpoint user acquires all kinds of resources via different security level networks. TCG provides approaches to prevent endpoint device from being ruined. However, more NARs on a single physical platform handle connections to different networks which lead to security problems, due to tightly coupled of NARs. In this paper, a lightweight trusted connect framework based hardware-level virtualization is proposed. And we illustrate core implement with improved KVM.


2019 ◽  
Vol 8 (3) ◽  
pp. 3679-3685

Symmetric-key cryptography is a classical cryptography in which both sender and receiver use the same key K to encrypt and decrypt the message. The main challenge between sender and receiver is to agree upon the secret-key which should not be revealed to public. Key management is the major issue in symmetric-key cryptosystem. To avoid these, a novel approach in generating the keystream Ks for any symmetric-key algorithms using U-matrix is proposed in this paper. The advantage of this method is generation of key K from Ks is based on some deterministic procedure which is then applied to DES algorithm and K is not necessarily remembered by both sender and receiver. Further, in each round different key is used as opposed to usage of single key in classical DES. Experimental results clearly show the security is increased when it is compared with classical DES.


2020 ◽  
Vol 157 ◽  
pp. 04010
Author(s):  
Ilya Devterov ◽  
Ivan Skyba

At present there is more than half of the world population who is currently using the Internet, due to which it seems relevant to develop not only technical, but also humanitarian and metaphysical views and theories that can serve the basis for the analysis of this phenomenon. The aim of these areas of studies should be rethinking of the role and place of man in the structure of modern society, as well as the role and place of the society in human life. The methodology for these processes comprehension lies in the plane of ontology, social philosophy and anthropology, based on the integration of the latter with cybernetics and mathematics, synergetics and mathematical modeling. Systemic and historical methods are inevitably capable of synthesizing the results of such a methodological approach, leading to the appearance of neologisms, the explication of new notions that most adequately reflect the essence of modern processes. The article illustrates a number of phenomena that should be studied with the aim of forming a person not as an object, but as a subject of global digital communication.


Author(s):  
P. B. Mane ◽  
A. O. Mulani

Now a day digital information is very easy to process, but it allows unauthorized users to access this information. To protect this information from unauthorized access, Advanced Encryption Standard (AES) is one of the most frequently used symmetric key cryptography algorithm. Main objective of this paper is to implement fast and secure AES algorithm on reconfigurable platform. In this paper, AES algorithm is designed with the aim to achieve less power consumption and high throughput. Keys are generated using MATLAB and remaining algorithm is designed using Xilinx SysGen, implemented on Nexys4 and simulated using Simulink. Synthesis result shows that it consumes 121 slice registers and its operating frequency is 1102.536 MHz. Throughput of the overall system is 14.1125 Gbps.


Author(s):  
ABDUL RAZZAQUE ◽  
NILESHSINGH V. THAKUR

Image compression scheme proposed by researchers have no consideration of security. Similarly image encryption scheme proposed by the authors have no consideration of image size. In this paper a simultaneous image compression and encryption scheme is discussed. The order of the two processes viz. compression and encryption is EC i.e. image encryption is performed first then the image compression is applied. For image encryption a symmetric key cryptography multiplicative cipher is used. Similarly for compression Discrete Cosine Transform is used. Image Compression is concerned with minimizing the number of bit required to represent an image. The compression can be lossless or lossy. Image Encryption is hiding image from unauthorized access with the help of secret key that key can be private or public.


Author(s):  
Pushkar Aneja

With the growing use of the Internet, and more people being connected with it, the security of the data becomes a major concern. It is necessary that the data can only be accessed by the intended receiver and no person in the middle makes alterations to it. This is achieved by encryption of the data using cryptography. This paper presents a comparative analysis of RSA (Rivest-Shamir-Adleman), Caesar Cipher and Playfair Cipher cryptographic techniques. This paper also presents a comparative analysis of Symmetric Key Cryptography and Asymmetric Key Cryptography. Also, this paper includes the basic working of the above-mentioned techniques along with their implementation in C language over Visual Studio Code 1.49.3.


Sign in / Sign up

Export Citation Format

Share Document