scholarly journals Alternative N-bit Key Data Encryption for Block Ciphers

2019 ◽  
Author(s):  
Kayque Damasceno ◽  
Carlos Cruz ◽  
Anderson De Oliveira ◽  
Luís De Castro

Post-encryption patterns are cribs that can be used by adversaries to unlock the encryption key both in symmetric or asymmetric cryptography, compromising security. Different methods to mitigate the problem, with their advantages and disadvantages, can be found in the literature, including one-time pad encryption, code-based cryptography and cipher block chaining. This work presents an alternative technique to generate an n-bit, n-block and key cipher that can be derived from reasonable short length key. The proposed technique is able to mitigate post-encryption patterns. Experimental results asserting the capabilities of the proposed cipher techniques are presented and discussed in the text.

2011 ◽  
Vol 101-102 ◽  
pp. 60-66
Author(s):  
Yi Jui Chiu ◽  
Khai Shoon Leong ◽  
Luh Maan Chang

The purpose of this paper is to assess technologies used in the monitoring of nano-particles that are available commercially and under research. The goal of the assessment is to propose a new device based on the technologies assessed. The assessment is performed based on information obtained from literatures review of articles and brochures, and from communications with representatives of the manufacturers of the counters. Two types of nano-particles counters were assessed; counters that are currently commercially available are the condensation particle counter (CPC), the scanning mobility particle spectrometer (SMPS). A description of how each counter works is given, and the advantages and disadvantages are highlighted. Experimental results showed that the performance of capillary had been installed and cleaned. The SMPS mean diameter fell within the range of the NIST standard. The sample offered well distribution in 300 and 400 nm.


2010 ◽  
Vol 44-47 ◽  
pp. 3697-3701
Author(s):  
Wei Liu ◽  
Ling Chen

In order to overcome the shortcomings of traditional algorithms, the algorithm MSPM was proposed. It used longer patterns for mining, which avoided producing lots of patterns with short length. Meanwhile by the use of prefix tree of primary frequent patterns, we extended the primary patterns which avoided plenty of irrelevant patterns. The experimental results show that MSPM not only improves the performance but also achieves effective mining results.


2018 ◽  
Vol 2 (3) ◽  
Author(s):  
Rajalingam B ◽  
Priya R

Medical image fusion is one the most significant and useful disease analytic techniques. This research paper proposed and examines some of the hybrid multimodality medical image fusion methods and discusses the most essential advantages and disadvantages of these methods to develop hybrid multimodal image fusion algorithms that improve the feature of merged multimodality therapeutic image. Computed Tomography, Magnetic Resonance Imaging, Positron Emission Tomography and Single Photon Emission Computed Tomography are the input multimodal therapeutic images used for fusion process. An experimental results of proposed all hybrid fusion techniques provides the best fused multimodal medical images of highest quality, highest details, shortest processing time, and best visualization. Both traditional and hybrid multimodal medical image fusion algorithms are evaluated using several quality metrics. Compared with other existing techniques the proposed technique experimental results demonstrate the better processing performance and results in both subjective and objective evaluation criteria. This is favorable, especially for helping in accurate clinical disease analysis.


2020 ◽  
Vol 9 (6) ◽  
pp. 2484-2491
Author(s):  
Baraa Tareq Hammad ◽  
Ali Maki Sagheer ◽  
Ismail Taha Ahmed ◽  
Norziana Jamil

Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. Data encryption is made possible via DNA sequences. In this paper, two cases utilizing different DNA properties were studied by combining the DNA codes with those conventional cryptography algorithms. The first case concerned on symmetric cryptography that involved DNA coding with OTP (one time pad) algorithms. Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. As observed, the computational time of RSA algorithm combined with DNA coding was longer. In order to alleviate this problem, data redundancy was reduced by activating the GZIP compressed algorithm. The present experimental results showed that DNA symmetric cryptography worked quite well in both time and size analyses. Nevertheless, it was less efficient than the compressed DNA asymmetric cryptography.


Author(s):  
Keith M. Martin

In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers. We focus on two extremely important and influential block cipher algorithms, the Data Encryption Standard and the Advanced Encryption Standard, discussing the history of their development as well as their basic design. We then introduce the modes of operation of a block cipher, explaining why different modes have been proposed. We examine in detail four of the most well-established modes of operation and their core properties, as well as classifying other modes of operation.


2014 ◽  
Author(s):  
Q.. Feng ◽  
S.. Li ◽  
Y.. Su ◽  
Y.. Liu ◽  
X.. Han

Abstract The existence of edge water has both advantages and disadvantages for the development of offshore heavy oil reservoir. On one hand, edge water invasion could supplement the reservoir pressure which is in favor of the oil production, while on the other hand, the asymmetrical invasion of the edge water could result in the quick increase of water cut for production wells and the consequent low oil recovery efficiency. For the purpose of better understanding edge water drive laws of offshore heavy oil reservoir and their effects on remaining oil distribution, several two dimensional visible physical models with different well-types, which are based on geological features and development characteristics of a certain offshore heavy oil reservoir in China, have been built to make the investigation. The experimental results are analyzed and shown as follows. Firstly, edge water mainly encroaches through areas with the maximum pressure gradient in homogeneous reservoir. But for heterogeneous reservoir, edge water would encroach through both high permeability section and areas with maximum pressure gradient. Meanwhile, compared with heterogeneous reservoir, there is more obvious water/oil front and higher reserve recovery degree in homogeneous reservoir under the same conditions. Secondly, the degree of reserve recovery obtained by double vertical wells is much higher than that obtained by single vertical well. So, increasing the number of production well is conducive to the improvement of reservoir recovery degree. Lastly, the recovery efficiency for horizontal well is much higher than that of the vertical well. In addition, Suizhong 36-1 Oilfield, an offshore heavy oil reservoir with edge water drive, has been numerical simulated. The simulated results of edge water drive laws are consistent with the experimental results, which could provide a useful guidance for the development of offshore heavy oil reservoir with edge-water drive.


Author(s):  
Kuppusamy Krishnamoorthy ◽  
Mahalakshmi Jeyabalu

Security of images in transmission medium is most prime issue found in literature. Encryption of images is a way to secure it from unauthorized access. The authors in this chapter insist on the encryption of images via block ciphers. Block ciphers works simultaneously as well as on chunks. In this chapter, an encryption method using improved cipher block chaining is proposed to encrypt RGB color images. For every encryption methodology, key generation process is the most important phase. The authors proposed sub-optimal key generation algorithm and this nature inspired optimization technique reveals complex keys, remains very useful for decision making in dynamic environment. Key generation is crafted as complex with this mathematical model that overcomes the predicament key problem exists in existing methods and upgrades quality of encryption. Results of the proposed algorithm show the efficiency and its resistance against various cryptanalytic attacks.


1996 ◽  
Vol 07 (01) ◽  
pp. 125-151 ◽  
Author(s):  
K. I. KANG ◽  
I. GLESK ◽  
P. R. PRUCNAL

The operating principle of the utilization of resonant optical nonlinearities in recently demonstrated ultra-fast all-optical interferometric switching devices is presented. Optimum switching windows expected from these devices are investigated with a simple theoretical analysis. The experimental results of these devices are presented along with the nonlinear optical properties of a semiconductor optical amplifier. The information from the experimental results of the nonlinear optical properties are used to address a problem associated with a saturation of the semiconductor optical amplifier by an incoming ultra-high bit rate data stream. We also discuss the advantages and disadvantages in different operation modes — same or different wavelengths for the control and data signals. Finally, we discuss the relative advantages and disadvantages among these devices.


2013 ◽  
Vol 347-350 ◽  
pp. 3596-3599
Author(s):  
Lin Ping Feng ◽  
Yu Qiang Wu ◽  
Shuang Pan ◽  
Xi Bin Wang

For uninhabited flying vehicle, it is a key prerequisite of truly autonomous mobile vehicles to simultaneously localize and accurately map its surroundings. Kalman filter-based algorithms require time quadratic in the number of landmarks to incorporate each sensor observation. This paper presents an algorithm so called FastSLAM that recursively estimates the full posterior distribution over robot pose and landmark locations, but scales logarithmically with the number of landmarks in the map. FastSLAM factors the posterior into a product of conditional landmark distributions and a distribution over UAV paths. The algorithm has been tested in UAV environments. Experimental results demonstrate the advantages and disadvantages of the FastSLAM algorithm for UAV.


Sign in / Sign up

Export Citation Format

Share Document