high security level
Recently Published Documents


TOTAL DOCUMENTS

37
(FIVE YEARS 22)

H-INDEX

5
(FIVE YEARS 3)

Author(s):  
Yu-Hsuan Lin ◽  
Dai-Ying Lee ◽  
Ming-Hsiu Lee ◽  
Po-Hao Tseng ◽  
Wei-Chen Chen ◽  
...  

Abstract A self-reference resistive random access memory (ReRAM)-based 1T2R (1-transistor-2-ReRAM) physically unclonable function (PUF) is proposed to provide hardware security feature for electrical products in the IoT/5G era. There are four advantages from the proposed structure: (1) small cell size; (2) intrinsic randomness; (3) no programming circuit; (4) no data retention concern. The conduction mechanism, temperature dependency, and read fluctuation of pristine ReRAM device are studied. An information-address separation scheme is proposed which not only reduces the impact of the read noise and the temperature effect, but also improves the system integrity against hardware attack. The proposed 1T2R PUF unit also has great potential for using as the random seed for linear feedback shift register (LFSR) in pseudo random number generators (PRNG) with high unpredictability, good randomness, and high data rate.


Author(s):  
Bakhan Tofiq Ahmed

<p>Information is a vitalthing that needs to be secured and well protected during transmission between two or more parties over the internet. This can be achieved by steganography technology. Steganography is the concealing science in which the information is concealed inside other information in a way that the concealed information cannot be detectable by the human eye. Many ways are available to hide data inside a cover media for example text, image, and audio steganography, but image steganography is the most utilized technique among the others. Secure image steganography has a high-security level than traditional technique by combining steganography with cryptography due to encrypting secret information by cryptography algorithm before embedding it into the cover media by steganography algorithm. In this paper,a systematic review has been presented about secure image steganography and its renowned types. Many researchers proposed secure image steganography by using various cryptography and steganography algorithms which have been reviewed. The least significant bit ‘LSB’ was the renowned steganography algorithm which has been used by researchers due to its simplicity, while various cryptography algorithms like advanced encryption standard (AES) and blowfishhave been used to propose secure image steganography in the reviewed papers. The comparison among the reviewed papers indicated that the LSB with hash-RSA gave a greater peak signal-noise ratio ‘PSNR’ value than the others which was 74.0189 dB.</p>


Author(s):  
Inas Ali Abdulmunem

Cryptography and steganography are significant tools for data security. Hybrid the cryptography with Steganography can give more security by taking advantage of each technique. This work has proposed a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext then hiding modified encrypt ciphertext in the text by used the proposed modified space method. For cryptography, we have been utilized an advanced encryption standard (AES) to the encrypted message, The AES algorithm is utilized a 128bit Block Size and 256bit key size. The ciphertext characters is then replaced by the characters identified by dictionary list. The dictionary is time-dependent, where each of the equivalent words will shifting based on the time-shift equation. The modified ciphertext is then embedded into a cover text so that the attacker cannot separate them by applying cryptanalysis.  The “Modifying Spaces” method used “Spaces” to build a steganography tool that hide the secret message. The experimental results show that the proposed method has achieved high-security level when combined cryptography and steganography in such way that the ciphertext is changed to another value by a used dictionary with time sequence that makes cryptanalysis test failed to guess and identify the algorithm that been used for encryption. The stego. test shows the proposed method achieved good results in term of capacity and visibility which is approved it hard to notice. The tests also approved that the proposed methods run fast with a less computational requirement.


2021 ◽  
Author(s):  
Tao Zheng ◽  
Haoran Xu ◽  
Xiangfu Wang ◽  
Xiaohong Yan

Abstract The optical information storage ZnO-P2O5-SiO2:Mn2+ glass was prepared by the melting method. The photoluminescence (PL), long persistence luminescence (LPL) and photo-stimulated luminescence (PSL) show the same luminescence spectra with main peaks located at 607 nm. The research shows that the color of luminescence depends on the coordination environment of Mn2+ in the crystal lattice and the red luminescence depends on the 4T1(4G)→6A1g(6S) electronic transition of Mn2+. PSL and LPL phenomenon can’t be observed in 70ZnO-10P2O5-20SiO2 glass, which indicates that Mn2+ ions serve as glowing centers in PSL and LPL phenomenon. Thermo-luminescence (TL) shows that the depth of the traps in glass is as high as 0.908eV. The 254 nm ultraviolet light was used to record information in the glass and read it under 980 nm infrared light excitation. The ZnO-P2O5-SiO2:Mn2+ glass in this work is a high-security level optical information storage medium.


Author(s):  
Zahra'a M. Baqir ◽  
Hassan J. Motlak

IoT is that a rapid expanding program presently for blend all equipment things like (sensors, gadgets, hardware and so on.) assemble and embed those with programming creating our own gadgets use The petroleum pump is these days running physically. it's an activity that fundamentally a drawnout time and requires more workforce. Additionally, put fuel stations in away zones is extermely costly. So achievement an automatic fuel filling system using web technology to solve these problems. There are dense proposed systems which goal to improve the fueling operation so as to form it less difficulty and more dependabl and more-safe, guarinte that the purchaser gets the same quantity of fuel in interchange for what he/she pays, so assist to end fraud at different fuel stations. these systems take human-software interaction by the web-enabeled procedure, thus keep off all errors made by people. The fundamental objective of this review paper is to survey of recent projects in design protype of smart petro pump based on RFID as payment tool and control on it remotely with high security level and concluded with future potential direction in design of smart petrol pump system.


Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 4
Author(s):  
Bayan Alabdullah ◽  
Natalia Beloff ◽  
Martin White

Data security has become crucial to most enterprise and government applications due to the increasing amount of data generated, collected, and analyzed. Many algorithms have been developed to secure data storage and transmission. However, most existing solutions require multi-round functions to prevent differential and linear attacks. This results in longer execution times and greater memory consumption, which are not suitable for large datasets or delay-sensitive systems. To address these issues, this work proposes a novel algorithm that uses, on one hand, the reflection property of a balanced binary search tree data structure to minimize the overhead, and on the other hand, a dynamic offset to achieve a high security level. The performance and security of the proposed algorithm were compared to Advanced Encryption Standard and Data Encryption Standard symmetric encryption algorithms. The proposed algorithm achieved the lowest running time with comparable memory usage and satisfied the avalanche effect criterion with 50.1%. Furthermore, the randomness of the dynamic offset passed a series of National Institute of Standards and Technology (NIST) statistical tests.


ACS Omega ◽  
2021 ◽  
Vol 6 (3) ◽  
pp. 2121-2126
Author(s):  
Cheolheon Park ◽  
Hyung Jong Bae ◽  
Jinsik Yoon ◽  
Seo Woo Song ◽  
Yunjin Jeong ◽  
...  

Author(s):  
Ikram Ben abdel ouahab ◽  
Mohammed Bouhorma ◽  
Lotfi El Aachak ◽  
Anouar Abdelhakim Boudhir

Objective: Newborn malware increase significantly in recent years, becoming more dangerous for many applications. So, researchers are focusing more on solutions that serve the defense of new malwares trends and variance, especially zero-day malware attacks. The prime goal of our proposition is to reach a high security level by defending against malware attacks effectively using advanced techniques. Methods: In this paper, we propose an Intelligent Cybersecurity Framework specialized on malware attacks in a layered architecture. After receiving the unknown malware, the Framework Core layer use malware visualization technique to process unknown samples of the malicious software. Then, we classify malware samples into their families using: K-Nearest Neighbor, Decision Tree and Random Forest algorithms. Classification results are given in the last layer, and based on a Malware Behavior Database we are able to warn users by giving them a detail report on the malicious behavior of the given malware family. The proposed Intelligent Cybersecurity Framework is implemented in a graphic user interface easy to use. Results: Comparing machine learning classifiers, Random Forest algorithm gives best results in the classification task with a precision of 97,6%. Conclusion: However, we need to take into account results of the other classifiers for more reliability. Finally, obtained results are as efficient as fast that meets cybersecurity frameworks general requirements.


2020 ◽  
Vol 3 (1) ◽  
pp. 30-37
Author(s):  
Oussama Noui ◽  
Amine Barkat ◽  
Assia Beloucif

Information security is one of the important issues in the information age, image encryption algorithms have been increasingly studied to guarantee the secure image transmission over the internet and through wireless networks. In this article, we propose a new approach for image encryption based on polar decomposition and orthogonal matrices. This scheme offers good confusion and diffusion qualities. The proposed algorithm is shown to be secure against important cryptanalytic attacks (statistical attacks, sensitivity dependence, differential attacks, brute force attacks...), theoretical analysis and computer simulations both confirm that it has a high security level.


Sign in / Sign up

Export Citation Format

Share Document