Improving Information Security Practices through Computational Intelligence - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

10
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781466694262, 9781466694279

Author(s):  
El-Sayed M. El-Alfy

Protecting confidentiality of sensitive data is growing in importance in many personal, commercial, governmental, medical and military applications. Data encryption remains the most prevalent mechanism for this goal in cybersecurity to store and communicate data in unintelligible form. However, images are known to have intrinsic characteristics different from text, which limit the applicability of conventional cryptographic algorithms. This chapter provides a review of the work related to image cryptosystems based on chaos theory and biologically-inspired algorithms. Then, a case study is presented using ideas from genetic crossover and mutation to confuse and diffuse images to generate secure cipher images with very low correlation between pixels.


Author(s):  
Sedat Akleylek ◽  
Zaliha Yuce Tok

In this chapter, the aim is to discuss computational aspects of lattice-based cryptographic schemes focused on NTRU in view of the time complexity on a graphical processing unit (GPU). Polynomial multiplication algorithms, having a very important role in lattice-based cryptographic schemes, are implemented on the GPU using the compute unified device architecture (CUDA) platform. They are implemented in both serial and parallel way. Compact and efficient implementation architectures of polynomial multiplication for lattice-based cryptographic schemes are presented for the quotient ring both Zp [x]/(xn-1) and Zp [x]/(xn+1), where p is a prime number. Then, by using these implementations the NTRUEncrypt and signature scheme working over Zp [x]/(xn+1) are implemented on the GPU using CUDA platform. Implementation details are also discussed.


Author(s):  
Martin Drahanský ◽  
Petr Hanáček ◽  
František Zbořil ◽  
Martin Henzl ◽  
František V. Zbořil ◽  
...  

This chapter shows how cryptomodules can increase security of wireless sensor network and possibilities of biometric authentication against a node or the whole network. For secure operation of a wireless sensor network, security objectives such as confidentiality, integrity, and authentication must be implemented. These security objectives typically employ cryptography, therefore sensor nodes should be able to compute cryptographic algorithms and provide secure tamper-resistant storage for cryptographic keys. Use of dedicated secure hardware for this purpose and security threats are discussed. Two scenarios where the biometric authentication would be appreciated are introduced – smart home and storehouse with medicaments. Biometric generation of cryptographic keys, biometric authentication in wireless network and possible attacks on biometrics are presented. When designing and verifying communication protocols using informal techniques, some security errors may remain undetected. Formal verification methods that provide a systematic way of finding protocol flaws are discussed.


Author(s):  
Mradul Dhakar ◽  
Akhilesh Tiwari

The tremendous work in the field of security has made enormous efforts towards the ascertainment of innovative ideas along with their practical applicability. These motivated the security agencies to adopt them practically. But adequate remedies are not accomplished yet due to the enhanced technological aspects even in the unlawful communities. These communities have become a major concern for the security agencies and can be considered as unaddressed issue. This concern led to the introduction of Intrusion Detection Systems (IDSs). The IDS is a means for detecting the intrusive events concealed among the activities of normal users. Additionally, such systems also provide necessary assistance in preventing future intrusions. The present chapter focuses on improving the performance of the IDS in order to meet the contemporary progression by proposing a system that is able to achieve a system that is effective, adaptive and intelligent in nature and is able to remarkably detect intrusions. In order to accomplish the desired system, the chapter involves development of intelligent IDS.


Author(s):  
El-Sayed M. El-Alfy ◽  
Wasan Awad

The evolution of communication networks and information systems, to support wireless access, cloud and grid computing, and big data, provides great business opportunities. However, it also generates a new trend of sophisticated network threats and offers several challenges in securing information and systems confidentiality, integrity and availability. The traditional techniques used by security experts are mostly static and lack the much needed characteristics of adaptation and self-organization, computational efficiency and error resilience to deal with evolving attacks. The inherent characteristics of computational intelligence (CI) paradigms provide a promising alternative that has gained popularity resulting in significant applications in information security. There is a plethora of CI paradigms commonly used in this domain including artificial neural networks, evolutionary computing, fuzzy systems, and swarm intelligence. This chapter provides an overview of the widely-recognized CI paradigms and shades the light on some of their potential applications in information security.


Author(s):  
V. Santhi ◽  
D. P. Acharjya

In recent days, due to the advancement in technology there are increasing numbers of threats to multimedia data which are floating around in the Internet especially in the form of image data. Many methods exist to provide security for digital images but transform domain based digital watermarking could be considered as a promising method. Many transformation techniques are used to insert watermark in cover data, but this chapter deals with watermarking approaches in Hadamard transform domain. In traditional watermarking approaches the scaling parameter is empirically considered for inserting watermark but to maintain the quality of underlying cover images it needs to be calculated based on the content of the cover images. In order to make the watermarking algorithm completely automated the embedding and scaling parameters are calculated using the content of cover images. Many methods are existing for calculating scaling parameter adaptively but this chapter discusses various approaches using computational intelligence to arrive at optimum value of scaling and embedding parameters.


Author(s):  
Leila Mechtri ◽  
Fatiha Djemili Tolba ◽  
Salim Ghanemi

Mobile Ad-hoc NETworks (MANETs) are believed to be highly vulnerable to security threats due to the numerous constraints they present such as: the absence of a fixed infrastructure, the dynamic topology change, their dependence on cooperative communication, the unreliability of wireless links and most importantly the absence of a clear line of defense. Since intrusion detection and agent technology proved to offer several potential advantages, there has been a great tendency for using agents to build optimal, adaptive and comprehensive intrusion detection systems to fit MANET security requirements. This chapter presents a survey and analysis of the work that has been recently done for the deployment of agent technology in the area of MANET intrusion detection. In particular, recent advances in that field in terms of existing frameworks, architectures and implementations as well as a discussion of the obtained advantages in addition to the potentially introduced vulnerabilities are presented.


Author(s):  
Wasan Awad ◽  
Amal M. Al Hiddi

The main objective of this chapter is to propose a new effective algorithm to design stream cipher systems automatically using simulated annealing algorithm and genetic programming with a different method for representing the genetic programming population individuals. Usually the individual programs represented as LISP expressions; in the proposed method the programs are represented as strings of integers representing the individual program syntactic rule numbers. Genetic programming with this representation method is called genetic algorithm for developing software (GADS). The performance of the proposed algorithm will be studied by applying different genetic methods and parameters. Furthermore, it will be compared with other representation methods such as LISP expression.


Author(s):  
Mohammad Tariq Banday

Information security has been the focus of research since decades; however, with the advent of Internet and its vast growth, online information security research has become recurrent. Novel methods, techniques, protocols, and procedures are continuously developed to secure information from growing threats. Digital signature certificates, currently offers one of the most trusted solutions to achieve CIA-trio for online information. This chapter discusses online information security through cryptography. It explains digital signature certificates; their benefits, the underlying standards, involved techniques, procedures, algorithms, processes, structure, management, formats, and illustration of their working. It highlights the potential of digital signatures and certificates in information security across different devices, services, and applications. It introduces a few useful tools to learn, train, and implement digital signature certificates.


Author(s):  
Wasan Awad ◽  
El-Sayed M. El-Alfy

Computational intelligence (CI) has attracted the attention of many researchers for its effectiveness in solving different kinds of problems. It has been applied to solve problems in a wide area of applications. The aim of this chapter is to present an overview of existing literature about the applications of CI in cryptology. It demonstrates and studies the applicability of CI in cryptology. The problems examined in this chapter are the automated design of cipher systems, and the automated cryptanalysis of cipher systems. It has been shown that CI methods, such as genetic algorithms, genetic programming, Tabu search, and memetic computing are effective tools to solve most of cryptology problems.


Sign in / Sign up

Export Citation Format

Share Document