encryption and authentication
Recently Published Documents


TOTAL DOCUMENTS

142
(FIVE YEARS 40)

H-INDEX

17
(FIVE YEARS 3)

2022 ◽  
Author(s):  
Frank Vega

Under the assumption that there exist one-way functions, then we obtain a contradiction following a solid argumentation and therefore, one-way functions do not exist by contraposition. Hence, function problems such as the integer factorization of two large primes can be solved efficiently. In this way, we prove that is not safe many of the encryption and authentication methods such as the public-key cryptography. It could be the case that $P = NP$ or $P \neq NP$, even though there are no one-way functions. However, this result proves that $P = UP$.


2021 ◽  
Vol 5 (3) ◽  
pp. 103-111
Author(s):  
Petro Klimushin ◽  
Tetiana Solianyk ◽  
Tetiana Kolisnyk ◽  
Oleksandr Mozhaiv

The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic microcircuits. The main results that had been obtained by using method of structural and functional design represent potentially possible options for using symmetric authentication cryptomicrocircuits to ensure the protection of Internet of Things nodes. The analysis of the presented schemes’ functioning made it possible to form the following conclusions. The host-side private key storage authentication scheme provides a fast symmetric authentication process, but requires secure storage of the private key on the host side. The simplest authentication scheme without storing a secret key on the host side, which does not imply the use of a cryptographic chip on the host side, provides a fast symmetric authentication process, but has a relatively low cryptographic strength, since the interaction in the system is performed without a random component in cryptographic transformations, which assumes constant the nature of requests in the system, and, consequently, the possibility of cryptanalysis of messages. To increase the cryptographic strength of such a scheme, it is advisable to introduce into the interaction system a random component in cryptographic transformations and use additional hashing procedures with an intermediate key, which leads to the complication of the scheme due to double hashing, but significantly increases the level of information security of IoT nodes. Downloading software in the system is implemented using secret encryption and authentication keys, which are permanently stored in the secure non-volatile memory of cryptographic chips of IoT nodes. In this case, session keys for encrypting the firmware code or decrypting it are generated on the client and host side, respectively. This approach allows creating unique downloads of the original firmware code (application) by preventing cryptanalysts from obtaining its images and algorithms. The peculiarity of the scheme of exchange of symmetric session encryption keys of messages are: use of a secret key stored on the side of the host and the client; the determination of the session key is performed as a result of hashing a random number with a secret key, that is, the exchange of the session key is performed in an encrypted secure form.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Anand Singh Rajawat ◽  
Pradeep Bedi ◽  
S. B. Goyal ◽  
Piyush Kumar Shukla ◽  
Sajjad Shaukat Jamal ◽  
...  

In terms of growth, effect, and capability, the 5G-enabled Internet of Things (IoT) is incredible. The volume of data distributed and processed by IoT (Internet of Things) systems that trust connectivity and coverage raises some security problems. As IoT technology is directly used in our daily lives, the threats of present cyberspace may grow more prominent globally. Extended network life, coverage, and connectivity are all required for securing IoT-based 5G network devices. As a result of these failures, there are flaws that lead to security breaches. Because purposeful faults can quickly render the entire network dysfunctional, they are more difficult to identify than unexpected failures. Securing IoT-based 5G Network Device Connectivity and Coverage for expending Encryption and Authentication Scheme (EAS) framework is proposed in this study, which uses novel security flaws. In this research, we proposed a Boltzmann machine (BMKG)-based encryption algorithm for securing 5G-enabled IoT device network environment and compared various asymmetric algorithms for key exchange.


2021 ◽  
Vol 10 (5) ◽  
pp. 2627-2635
Author(s):  
Mustafa Maad Hamdi ◽  
Lukman Audah ◽  
Mohammed Salah Abood ◽  
Sami Abduljabbar Rashid ◽  
Ahmed Shamil Mustafa ◽  
...  

Ad hoc vehicle networks (VANET) are being established as a primary form of mobile ad hoc networks (MANET) and a critical infrastructure to provide vehicle passengers with a wide range of safety applications. VANETs are increasingly common nowadays because it is connecting to a wide range of invisible services. The security of VANETs is paramount as their future use must not jeopardize their users' safety and privacy. The security of these VANETs is essential for the benefit of secure and effective security solutions and facilities, and uncertainty remains, and research in this field remains fast increasing. We discussed the challenges in VANET in this survey. Were vehicles and communication in VANET are efficient to ensure communication between vehicles to vehicles (V2V), vehicles to infrastructures (V2I). Clarified security concerns have been discussed, including confidentiality, authentication, integrity, availableness, and non-repudiation. We have also discussed the potential attacks on security services. According to analysis and performance evaluations, this paper shows that the ACPN is both feasible and appropriate for effective authentication in the VANET. Finally, the article found that in VANETs, encryption and authentication are critical.


2021 ◽  
Author(s):  
Chun Huang

The recent massive growth of networked multimedia has caused problems relative to the protection of intellectual property rights. This is particularly true to MP3 audio data. These types of protection systems involve the use of both encryption and authentication techniques. In this thesis we describe a form of authentication known as digital watermarking. A novel scheme to embed digital watermark to MP3 music using Quantization Index Modulation (QIM) algorithm is proposed in the thesis. A pseudorandom key is generated as watermark message which is embedded into MDCT coefficients of MP3 directly. At the receiver, the MP3 is decoded partially and the watermark is extracted frame by frame. Furthermore we discuss the recovery method of the watermarking after the watermarked MP3 audio is streamed on the network. Distributing digital watermark on Internet through streaming audio is a challenging task because most digital watermarking algorithm is very sensitive to packet loss due to the associated synchronization problem. On the current Internet, packet loss is almost inevitable since its backbone protocols are operating in best-effort manner and do not guarantee the successful delivery of data packets. Therefore it is very essential to develop a scheme that resists the damage caused by packet loss to audio watermarks. Our robust watermarking scheme can recover the watermarks despite the packets loss (loss rate equal or less than 10%) on the networks. In addition, we integrate the classical Forward Error Correction (FEC) code in our watermarking scheme, which achieves 100% recovery rate when the packet loss is 6%.


Sign in / Sign up

Export Citation Format

Share Document