encryption method
Recently Published Documents





2022 ◽  
Vol 22 (2) ◽  
pp. 1-20
Bharat S. Rawal ◽  
Poongodi M. ◽  
Gunasekaran Manogaran ◽  
Mounir Hamdi

Block chain provides an innovative solution to information storage, transaction execution, security, and trust building in an open environment. The block chain is technological progress for cyber security and cryptography, with efficiency-related cases varying in smart grids, smart contracts, over the IoT, etc. The movement to exchange data on a server has massively increased with the introduction of the Internet of Things. Hence, in this research, Splitting of proxy re-encryption method (Split-PRE) has been suggested based on the IoT to improve security and privacy in a private block chain. This study proposes a block chain-based proxy re-encryption program to resolve both the trust and scalability problems and to simplify the transactions. After encryption, the system saves the Internet of Things data in a distributed cloud. The framework offers dynamic, smart contracts between the sensor and the device user without the intervention of a trustworthy third party to exchange the captured IoT data. It uses an efficient proxy re-encryption system, which provides the owner and the person existing in the smart contract to see the data. The experimental outcomes show that the proposed approach enhances the efficiency, security, privacy, and feasibility of the system when compared to other existing methods.

Dana Khwailleh ◽  
Firas Al-balas

The rapid growth of internet of things (IoT) in multiple areas brings research challenges closely linked to the nature of IoT technology. Therefore, there has been a need to secure the collected data from IoT sensors in an efficient and dynamic way taking into consideration the nature of collected data due to its importance. So, in this paper, a dynamic algorithm has been developed to distinguish the importance of data collected and apply the suitable security approach for each type of data collected. This was done by using hybrid system that combines block cipher and stream cipher systems. After data classification using machine learning classifiers the less important data are encrypted using stream cipher (SC) that use rivest cipher 4 algorithm, and more important data encrypted using block cipher (BC) that use advanced encryption standard algorithm. By applying a performance evaluation using simulation, the proposed method guarantees that it encrypts the data with less central processing unit (CPU) time with improvement in the security over the data by using the proposed hybrid system.

Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 334
Li Li ◽  
Ahmed A. Abd El-Latif ◽  
Sajad Jafari ◽  
Karthikeyan Rajagopal ◽  
Fahimeh Nazarimehr ◽  

Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity have serious security issues. Chaos models play an important role in designing robust multimedia data cryptosystems. In this paper, a novel chaotic oscillator is presented. The oscillator has a particular property in which the chaotic dynamics are around pre-located manifolds. Various dynamics of the oscillator are studied. After analyzing the complex dynamics of the oscillator, it is applied to designing a new image cryptosystem, in which the results of the presented cryptosystem are tested from various viewpoints such as randomness, time encryption, correlation, plain image sensitivity, key-space, key sensitivity, histogram, entropy, resistance to classical types of attacks, and data loss analyses. The goal of the paper is proposing an applicable encryption method based on a novel chaotic oscillator with an attractor around a pre-located manifold. All the investigations confirm the reliability of using the presented cryptosystem for various IoT applications from image capture to use it.

Basim Abood ◽  
Abeer Naser Faisal ◽  
Qasim Abduljabbar Hamed

In this paper, elliptic curves Diffie Hellman-Rivest Shamir Adleman algorithm (ECDH-RSA) is a novel encryption method was proposed, which based on ECDH and RSA algorithm to secure transmitted data in heterogeneous wireless sensor networks (HWSNs). The proposed encryption is built under cheesboard clustering routing method (CCRM). The CCRM used to regulate energy consumption of the nodes. To achieve good scalability and performance by using limited powerful max-end sensors besides a large powerful of min-end sensors. ECDH is used for the sharing of public and private keys because of its ability to provide small key size high protection. The proposed authentication key is generated by merging it with the reference number of the node, and distance to its cluster head (CH). Decreasing the energy intake of CHs, RSA encryption allows CH to compile the tha data which encrypted with no need to decrypt it. The results of the simulation show that the approach could maximize the life of the network by nearly (47%, and 35.7%) compare by secure low-energy adaptive clustering hierarchy (Sec-LEACH and SL-LEACH) approches respectively.

2022 ◽  
Vol 70 (1) ◽  
pp. 123-134
Ahmed S. Sakr ◽  
M. Y. Shams ◽  
Amena Mahmoud ◽  
Mohammed Zidan

Entropy ◽  
2021 ◽  
Vol 24 (1) ◽  
pp. 40
Haiju Fan ◽  
Heng Lu ◽  
Chenjiu Zhang ◽  
Ming Li ◽  
Yanfang Liu

Recently, an image encryption algorithm based on random walk and hyperchaotic systems has been proposed. The main idea of the original paper is to scramble the plain image by means of random walk matrix and then to append diffusion. In this paper, the encryption method with security holes is analyzed by chosen plaintext attack. In addition, this paper improves the original encryption algorithm. The experimental and simulation results show that the improved algorithm has the advantages of the original and can improve the ability to resist attack.

2021 ◽  
Vol 2131 (2) ◽  
pp. 022104
Qixin Zhang

Abstract We believe that isomorphic encryption technology can provide strong technical support for users’ privacy protection in a distributed computing environment. There are three types of quasi-homomorphism encryption methods: partial homomorphism encryption, shallow homomorphism encryption, and full homomorphism encryption. homomorphism encryption methods have important applications for ciphertext data computing in distributed computing environments, such as secure cloud computing, fee computing, and remote file storage ciphertext retrieval. It is pointed out that the construction of the homomorphism encryption method is still in the theoretical stage and cannot be used for real high-density data calculation problems. How to design (natural) isomorphic encryption schemes according to algebraic systems is still a challenging research. This question discusses the problem of Learning With Rounding (LWR). Based on the difficulty of LWR, multiple IDs, and attribute categories, a fully homomorphism encryption method corresponding to an ID is proposed. In this paper, in order to reflect the effectiveness of the proposed method, we propose a homomorphism encryption technology based on the password search attribute.

Yantong Xiao ◽  
Xiaojun Tong ◽  
Miao Zhang ◽  
Zhu Wang

2021 ◽  
pp. 1-13
Weiwei Wu

The traditional channel encryption method is interfered by noise signal, which leads to long encryption time and poor security. This paper proposes a communication channel security encryption method based on cloud computing technology. In order to obtain the minimum benefits of the same channel and orthogonal channel in the frequency conversion receiver, the dual input and dual output model is constructed; the influence of time domain and frequency domain on the transmission signal is analyzed, and the nonlinear transmission characteristics of the channel signal are obtained. Through cloud computing technology, the channel transmission characteristics are divided into dynamic parameters and static parameters to realize the key distribution of communication channel under cloud computing technology; the balance factor is used to provide the key for the sorted generators to realize the secure encryption of communication channel. The results show that the average error probability of the proposed method is about 0.275, and the signal-to-noise ratio is between 115 and 118 SNR.

Sign in / Sign up

Export Citation Format

Share Document