ENGINEERING RESEARCH PAPERS

research paper and project in cryptography-recent 2014




A Key Division Scheme to Improve Visual Cryptography on Half Tone Images
free download

Abstract:Visual Cryptography is a special encryption technique to hide information in images in such a way that will not be retrieved by human visual system. The benefit of the visual secret sharing scheme is in its decryption process where without any complex

Web Security Using Visual Cryptography Against Phishing
free download

Abstract: Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed

A Cryptography Algorithm Using the Operations of Genetic Algorithm Pseudo Random Sequence Generating Functions
free download

ABSTRACT In today's computer world security, integrity, confidentiality of the organization's data is the most important issue. This paper deals with the confidentiality of electronic data which is transmitted over the internet. Data encryption is widely used to ensure security of

Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis.
free download

Abstract. We select a set of elliptic curves for cryptography and analyze our selection from a performance and security perspective. This analysis complements recent curve proposals that suggest (twisted) Edwards curves by also considering the Weierstrass model.

9th Conference on the Theory of Quantum Computation, Communication and Cryptography
free download

Editors Steven T. Flammia Aram W. Harrow Department of Physics Department of Physics University of Sydney Massachusetts Institute of Technology steven.flammia@sydney.edu.au aram@mit.edu ACM Classification 1998 E.3 Data Encryption, E.4 Coding and

Tampering attacks in pairing-based cryptography
free download

Definition 1 A pairing is a bilinear, non-degenerate, and efficiently computable map e : G × G ? GT where G,GGT are finite groups of the same size. Bilinearity: Non-degeneracy: for all P ? G \ {O} there is a Q ? G such that e(P,Q) = 1. Definition 1 A pairing is a bilinear,

An Efficient Cryptography Analysis of Propp Wilson Algorithm for Dynamic Resource Allocation in Cloud Computing
free download

AbstractCloud computing is emerging as a critical information communication technology and a new computing paradigm; it has a heavy impact on human life in the future. This computing model enables a suitable on-demand network access of configurable

Quantum Cryptography–Current Methods and Technology
free download

Abstract If properly harnessed, the application of quantum particles will dramatically alter the computing world. This power will be particularly important in the field of cryptography, which has thus far relies on the complexity of classical operations to encrypt data or hide keys.

Symmetric Cryptography
free download

Abstract From 05.01. 2014 to 10.01. 2014, the Seminar 14021 in Symmetric Cryptography was held in Schloss Dagstuhl–Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were

Cryptography
free download

2.2.5 Two Security Problems of the One-Time Pad . . . . . . . 13 2.2.6 Computational Security: Additive Stream Ciphers . . . . . 14 2.2.7 Addressing the Three Problems . . . . . . . . . . . . . . . . 15 2.2.8 Pseudo-randomness: The Concept . . . . . . . . . . . . . . 15 2.2.9 BlockCiphersandAES . .

Audio Steganography And Security Using Cryptography
free download

Abstract:Steganography is an art of sending hidden data or secret messages over a public channel so that a third party cannot detect the presence of the secret messages. We propose two novel approaches of substitution technique of audio steganography that improves the

Scope and Challenges in Visual Cryptography
free download

Abstract:Visual cryptography is one of the techniques used to encrypt the images by dividing the original image into transparencies. The transparencies can be sent to the intended person, and at the other end the transparencies received person can decrypt the

A Comprehensive View on Encryption Techniques of Visual Cryptography?
free download

Abstract:Visual Cryptography plays an important role in area of information security. It is a technique of cryptography to secure the visual information by encrypting them into cipher text. At user's end human visual system is used for decryption. For this there is no need of

Novel Approach for Visual Cryptography Using Adaptive Local Filter
free download

Abstract: Visual Cryptography Scheme is an encryption method that is used to encode secret written materials into an image and encode this image into n share images. The decoding only requires only selecting some subset of these n images, making transparencies of

target PIXELS COMBINED WITH PSNR AND VISUALCRYPTOGRAPHY FOR SECURE APPLICATION
free download

Abstract:Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity

Weak-Key Leakage Resilient Cryptography.
free download

A public-key encryption scheme(PKE) is a tuple of PPT algorithms (Gen,Enc,Dec) that satisfies the following: .1 Gen(1n) ? (pk, sk). .2 Encpk(m) ? c. .3 Decsk(c)= m. Zuoxia Yu Advisor: Prof. Qiuliang Xu ( Shandong University) Weak Key-Leakage Resilient Cryptography

Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
free download

Abstract. As new technologies emerge such as wearables, it opens up for new challenges, especially related to security and privacy. One such recent technology is smart glasses. The use of glasses introduces security and privacy concerns for the general public but also for

A Random Key Based Visual Cryptography Approach for Information Security
free download

Abstract:The cryptographic mechanism basically secures the data while performing the information distribution in an open environment. According to type of data, application or the user, different kind of secure cryptographic approaches are available. In this paper,

IMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION
free download

Region incrementing visual cryptography is used to hide multiple secrecy levels in a single image. In n level region incrementing visual cryptography scheme, image is divided in n regions. Each region consists of one level information. For implementing visual

ECE 646, Cryptography and Computer Network Security Fall 2014 Instructor
free download

Laboratory classes will involve getting familiar with selected open-source implementations of cryptographic algorithms and protocols. Based on this knowledge and your own experiments, you will be asked to solve a set of simple problems, and prepare a short
Previously called the Workshop on Selected Areas in Cryptography, the Conference on Selected Areas in Cryptography (SAC) series was initiated in 1994, when the first workshop was held at Queen's University in Kingston. The SAC conference has been held annually

Securing Fingerprint and Iris Templates using Non-Expanded Inverted Share Image VisualCryptography
free download

Abstract:A biometric authentication system operates by acquiring raw biometric data from a subject eg, fingerprint and iris images. This original raw data is stored in the central database. Preserving the privacy of this digital biometric data has become very important.

Cryptography and Security Systems
free download

Cryptography and security systems are two fields of security research that strongly interact and complement each other. The series of International Conferences on Cryptography and Security Systems (CSS) is a forum for presentation of theoretical and applied research

Cryptography during Data Sharing and Accessing Over Cloud
free download

Abstract Data sharing is an important functionality in cloud environment. With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be

Digital Watermarking using Asymmetric Key Cryptography and Spatial Domain Technique
free download

Abstract: Earlier the digital watermarking was evaluated according to imperceptibility, capacity and robustness. In this paper based on security considerations we address a new secure approach. Our new approach is inspired from the cryptanalytic approach. In order
the 18th Conference on Financial Cryptography and Data Security, was held during March 3–7, at Accra Beach Hotel Spa, Barbados. We received 165 abstract registrations, 138 full paper submissions, out of which 31 were accepted, 12 as short

Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical CurveCryptography.
free download

Abstract Technological advancements in cloud computing due to increased connectivity and exponentially proliferating data has resulted in migration towards cloud architecture. Cloud computing is technology where the users' can use high end services in form of

Cryptography: An Art of Data Hiding
free download

Abstract:Cryptography is being used by mankind in order to successfully transmit secret message without being caught by the enemies. From the ancient times to this modern world Cryptography has evolved rapidly. This paper discusses the various cryptographic

Cryptography Algorithms using Artificial Neural Network
free download

Abstract: In the recent years there has been quite a development in the field of artificial intelligence one of which has been the introduction of the artificial neural networks (ANN). The ANN can be considered as an information processing unit which to a great extent

Current Refuge Trends using Classical and Quantum Cryptography
free download

Abstract: Cryptography is the knowledge of keeping private information from unofficial access of ensuring data integrity and endorsement, and it is the strongest tool for scheming against much category of security threats. Role of cryptography appears in several

Cryptography for Securing Ubiquitous Bluetooth Mobile Communications
free download

Abstract: In the last few years with the increasing popularity of the Bluetooth Technology (BT) also the interest in robbing the personal information has arisen. Bluetooth is a connection oriented service. To communicate with one another, one of them needs to initiate the

A New Framework of Distributed System Security Using DNA Cryptography and Trust Based Approach
free download

ABSTRACT The development of new security frameworks for distributed system is a critical research issue. Trust management based security approaches are highly applicable in distributed system security. This is not requiring the need for resolving identities in the

A Public Key Cryptography Security System For Big Data
free download

Abstract Big data is the one which is emerging in IT industry. As we know, it is used to describe the massive data produced by various applications and systems. The database becomes so large and difficult to manage it. Normally the data is stored in petabyte,

CRYPTOGRAPHY FOR SECURITY AND PRIVACY IN CLOUD COMPUTING
free download

Cloud computing is progressively entering our lives with the idea of renting computing infrastructures to customers. Therefore, it is important to consider the security of this service as the user's data is now deployed to distant remote storages not controlled by the data

Review on Network Security and Cryptography
free download

Abstract With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe transmission of

Survey on Encryption Algorithm Based On Chaos Theory and DNA Cryptography
free download

Abstract: DNA Cryptography is a new born cryptography that overcomes the difficulties of traditional cryptography due to its extraordinary information density inherent in DNA molecules, exceptional energy efficiency and vast parallelism. A lot of work have been
In this paper, a novel visual cryptography (VC) copyright protection scheme based on artificial bee colony algorithm (ABCA) is proposed. First, we apply wavelet decomposition (discrete wavelet transform, DWT) to decompose the cover image, and ABCA is used to

Secure of Face Authentication using Visual Cryptography
free download

Abstract: Visual Cryptography is a process of creating shares from an Image so that it would becomes unreadable for intruder or unauthenticated person. There are various measures on which performance of visual cryptography scheme depends, such as pixel expansion,

Encrypt an Audio file using Combine Approach of Transformation and Cryptography.
free download

Abstract:Encryption is a technique which is used to encode a file which can only accessible by authorised person. In this paper, an audio file is encrypted by applying transformation and cryptography. Transformation is used to convert an audio file from time

White-Box Cryptography
free download

Abstract Cryptographic algorithms are designed to protect data or communication in the presence of an attacker. If these algorithms make use of a secret key, then their security relies on the secrecy of the key. Hence, the primary objective of an attacker typically is to

A Comparison of Different Methods of Instruction in Cryptography
free download

ABSTRACT Cryptography is the foundation on which information and cyber security is built. As Mark Stamp has written,cryptography or 'secret codes' are a fundamental information security tool.[6] Without the ability to encrypt and decrypt messages or data, the

Artificial Immune Based Cryptography Optimization Algorithm
free download

Xuanwu Zhou1, 2, Kaihua Liu1, Zhigang Jin 1, Shourong Tian3, Yan Fu1, 3 and Lianmin Qin3 1 School of Electronics and Information Engineering, Tianjin University, Tianjin 300072, China 2 Command College of the Chinese Armed Police Forces, Tianjin 300250,

A Review on Symmetric Key Encryption Techniques in Cryptography
free download

ABSTRACT---In today's digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of

On Group Rings and some of their Applications to Combinatorics and Cryptography
free download

1LAGA, Universities of Paris 8 and Paris 13, CNRS Department of Mathematics University of Paris 8, 2 rue de la liberté, 93526 Saint-Denis cedex 02, France 2Department of Electrical and

A Unique Approach to Multimedia Based Dynamic Symmetric Key Cryptography
free download

Abstract: In the past decades, Most of the cryptography and steganography based techniques emphasized on securing text or images only. They made use of traditional approaches like transpositions or substitutions for text security and image transformation

Multilevel Network Security Combining Cryptography and Steganography on ARM Platform
free download

Abstract This paper presents two level data security in Network system. Cryptographic algorithm BLOWFISH and Steganography algorithm List significant Bit (LSB) are used for data security. Confidential information is encrypted by BLOWFISH algorithm, and then

A SURVEY FOR CRYPTOGRAPHY AND STEGANOGRAPHY OF VIDEO INFORMATION IN MODERN COMMUNICATIONS
free download

Abstract:The image cryptography and steganography performed in frequency domain using random phase mask encodingare presented. These of random phase maskallowsto deccorrelate initial image and makes it unrecognized. This property is used for proposed

Secure E-marketing Using Steganography Emergence of Cryptography
free download

Abstract-Traditional selling goods is possible to do electronically because of certain software programs that run the main functions of an E-commerce including product display online ordering and inventory management. E-commerce includes business activities that are

Visual Cryptography and Steganography: A Review
free download

Abstract: To maintain the privacy and certainty of pictures may be a spirited space of analysis, with two totally different approaches being followed, the primary being encrypting the pictures through encoding algorithms using keys, the secondary approach involves

An Intrusion Detection System for MANET using Hybrid Cryptography
free download

Abstract: Over the decade, security has become a most important issue in Mobile Adhoc Network compared to other networks, MANETs are more weak to the various types of attacks. In this case the detection should be focused as another part before an attacker

Randomized Text Encryption: a New Dimension in Cryptography
free download

Abstract Cryptography refers to protecting transmitted information from unauthorized interception or tampering, while cryptanalysis is art of breaking such secret ciphers and reading information, or perhaps replacing it with different information. The research

Secure Optical Scanning Cryptography based Stereo Image Watermarking using Genetic Algorithm
free download

Abstract Watermarking has become an important tool for multimedia object creator or distributor to address the growing concern of multimedia owners. An attempt has been made to develop a complete secure digital stereo image non-blind watermarking system for

Visual Cryptography Scheme for Secret Image Retrieval
free download

Abstract The (t, n) visual cryptography (VC) is a secret stacking of t-1 any out of transparencies reveals the sharing scheme where a secret image is encoded into transparencies, and the secret image. The stacking of or fewer transparencies is unable to

Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
free download

Abstract The significance of digital information security has been enhanced due to the boost of internet communication. Providing security for server client communication over the internet is a critical issue due to open world digital eavesdroppers. Generally, password

SOPC BASED WIRELESS REMOTE PATIENT MONITORING USING ULTRA LIGHTWEIGHTCRYPTOGRAPHY
free download

ABSTRACT Remote Patient Monitoring (RPM) provides flexible and powerful patient surveillance through wearable devices at anytime and anywhere. This can be achieved by using a Body Sensor Network (BSN), which is deployed on a human body for monitoring
The secured data communication over internet is the most important concern nowadays. Our main aim is to build an apparently attack resistant encryption model. Session key may be one solution where new encryption key is used in every session but that needs key

Information Security Based on Steganography Cryptography Techniques: A Review
free download

Abstract:Over past few decades, with the advancement of communication technology the use of internet has grown extremely to exchange information without any distance barrier. However, such network is most popular for fast and easy process to exchange information

Anti-Phishing Framework for Banking Based on Visual Cryptography
free download

Abstract Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for individuality theft, economic gain and other fake activities. In this thesis we have projected

A Review on Cryptography Using Armstrong Numbers and Colors
free download

Abstract-Data Security is the science and study of methods of protecting data from unauthorized disclosure and modification. As per the technology upgraded, there is need to secure data which is transmitted over the network. Unsecured networks can be hacked

Towards Cognitive Cryptography
free download

Abstract This publication describes the new paradigm of cognitive cryptography. This new scientific area is marked by a new generation of information systems, focused on developing intelligent cryptographic protocols and procedures utilising cognitive information

Algorithmic Problems of Group Theory, Their Complexity, and Applications to Cryptography
free download

This volume consists of contributions by participants and speakers in special sessions at two AMS meetings. These special sessions concerned algorithmic problems of group theory, their complexity, and applications to cryptography. The AMS Special Session on

Can cryptography secure next generation air traffic surveillance
free download

Abstract:The proposed next-generation air traffic control system depends crucially on a surveillance technology called ADS-B. By 2020, nearly all aircraft flying through US airspace must carry ADS-B transponders to continuously transmit their precise real-time location Visual cryptography is a kind of cryptography that can be decrypted only by a human visual system when stacking transparencies. Extended visual cryptography allows to print meaningful images on transparencies which can conceal the existence of'secret'in the

Multiple Selective Regions Image Cryptography on Modified RC4 Stream Cipher.
free download

Abstract Cryptography is the technique which is utilized for secure communication over the network. By using Cryptography technique readable information is converted into an unreadable form. Cryptography is used to protect data from unauthorized access.

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division
free download

Abstract Broadly speaking a term Cryptography used to secure hide the original information of a message from the unauthorised users. First time used to encrypt a plaintext into cipher text where a key was associated at the time of encryption to change original

Evolutionary Algorithms, Fuzzy Logic and Artificial Immune Systems applied to Cryptographyand Cryptanalysis: State-of-the-art review
free download

Abstract:The need and importance of secure information communication, particularly text, image and video transmission has made cryptography to take a larger space in current research era. Improvement of pictorial information for betterment of human perception

Cryptography by Swapping Bits: Algorithm SKG 2.0
free download

Satish Kumar Garg Govt. PG College Ambala Cantt-133001 (Haryana) India E-mail: sat. phy@ gmail. com Abstract: In the present work the author has introduced a new cryptographic method, called algorithm SKG 2.0, for data encryption and decryption of any

Symmetric Key Cryptography: Current Trends
free download

Abstract:The present day age is the time when Information has become the most powerful commodity communication online or through wireless networks has become an integral part of our lives. The data being transmitted is prone to various passive and active

A Note on the Bellare-Rivest Protocol for Translucent Cryptography
free download

Abstract We remark that the Bellare-Rivest protocol for translucent cryptography [J. Cryptology (1999) 12: 117-139] can not truly enable the government to decrypt partial encrypted communications. Keywords. Translucent cryptography, individual privacy,

Secured Bank Authentication using Image Processing and Visual Cryptography.
free download

Abstract:Today's banking system has brought core banking for the user's convenience, which is a set of services, where authentication plays main role. But these days, because of tremendous realization and growth in the field of hacking it is not safe to rely on internet to

Data Hiding At 7 th Bit (RGB) With Cryptography
free download

Abstract: In recent years it have been witnessed, the rapid development of the internet and telecommunication techniques. But with this development, the security of information is becoming very difficult. To tackle information security problem steganography and

Understanding Steganography over Cryptography and Various Steganography Techniques
free download

Abstract: This paper is all about the study of the steganography and techniques used for the steganography. Firstly we will understand the term steganography, use of steganography and techniques used for the steganography. In steganography, we use text transformation,

An Operational Characterization of the Notion of Probability by Algorithmic Randomness and Its Application to Cryptography
free download

Abstract: The notion of probability plays an important role in almost all areas of science, including cryptography. In modern mathematics, however, probability theory means nothing other than measure theory, and the operational characterization of the notion of probability

SURVEY ON SECURITY ARCHITECTURE BASED ON ECC (ELLIPTIC CURVECRYPTOGRAPHY) IN NETWORK
free download

Abstract Cryptography is the technique of hiding message in some unintelligible format so that the message lies hidden in plain sight of an unintended person. Public key cryptography offers a wide range of security over the various modes of transferring data, especially over

The Power of Negations in Cryptography
free download

Abstract The study of monotonicity and negation complexity for Boolean functions has been prevalent in complexity theory as well as in computational learning theory, but little attention has been given to it in the cryptographic context. Recently, Goldreich and Izsak [GI12]

A Study on implementation of security in E-Governance using cryptography
free download

Abstract:In the present days of global economic meltdown the Government of the developing countries like INDIA are facing severe challenge in maintaining an efficient administration in its core and allied sectors within an affordable budget. The application of

DNS Server Cryptography Using Symmetric Key Cryptography
free download

The Domain Name System (DNS) is a hierarchical distributed database that facilitates the conversion of human readable host names into IP address and vice versa. The security services are provided in DNS using DNSSEC system which provides security services through cryptography.

Quantum Cryptography: Pitfalls and Assets
free download

Abstract: Secure transmission of messages has been a major goal since ages, for which cryptography is used. Cryptography is a mathematical techniques used for secure communication. Classical cryptography is traditional means that comprises mathematical

Comparison of Asymmetric Algorithms in Cryptography
free download

ABSTRACT:-In this paper we compare asymmetric algorithm like (RSA, Elliptic curve, OAEP) which is used for security when data is transmitting over the network. These algorithms are based on digital signature scheme. Digital signature is the technique of cryptography

ANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNION
free download

Abstract-Cryptography is the study of message secrecy. In modern times, it has become a branch of information theory, as the mathematical study of information and especially its transmission from place to place. It is a central part of several fields: information security

PREVENTION OF WATERMARKING ATTACKS USING CRYPTOGRAPHY METHOD
free download

Abstract: As the need for information over network is high the security for such information is necessary when the information is shared over network or retrieved from network. Media files which are shared in networking sites and other areas must be highly protected to

Design of Commutative Cryptography Core with Key Generation for Distributed FPGA Architecture
free download

Abstract Data security during communication is one of the predominant issues in modern multiple transceiver based communication. In this paper, we have presented a highly robust commutative cryptography core for distributed FPGA architecture called commutative RSA

Quantum Cryptography: Realizing next generation information security
free download

Abstract Quantum cryptography is a technology that ensures ultimate security. Compared to current cryptography that could be defeated by by the development of an ultra high-speed computer, quantum cryptography ensures secure communication because it is based on

Image Encryption Decryption with Symmetric Key Cryptography using MATLAB
free download

Abstract Any communication in the language that you and I speak that is the human language, takes the form of plain text or clear text. That is, a message in plain text can be understood by anybody knowing the language as long as the message is not codified in

An integrated approach to optimizing users from online data resources using cryptographyand network topology mechanism
free download

ABSTRACT An Integrated Approach to Optimizing Users from Online Data Resources Using Cryptography and Network Topology Mechanism is basically a simulation based work in which fetching of a particular data from large number of data flow and generate a unique

Message Transmission Based on DNA Cryptography: Review.
free download

Abstract DNA cryptography is used to encrypt message for secure communication on a network. It is a information carrier for transferring message from sender to receiver. For secure communication, it is not only to encrypt message but also necessary to hide

New Asymmetric Cipher of Non-Commuting Cryptography Class Based on Matrix Power Function
free download

New asymmetric cipher based on matrix power function is presented. Cipher belongs to the class of recently intensively evolving non-commuting cryptography due to expectation of its resistance to potential quantum cryptanalysis. The algebraic structures for proposed

An Extended Visual Cryptography Algorithm for Quality-Improved Gray Scale Image with Sigmoid Function.
free download

Abstract:Conventional visual secret sharing schemes generate noise-like random pixels on shares to hide secret images. It suffers amanagement problem, because of which dealers cannot visually identify each share. This problem is solved by the extended visual

EA-ISP-016-Cryptography Policy
free download

This policy forms part of the University's Information Security Policy Set and should be read in conjunction with the Information Security Policy (EA-ISP-001) and other supporting documentation, including the Enterprise Architecture Policy surrounding Encryption (EA-

Cryptography Based Authentication Methods
free download

Abstract:This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. As well as, this study presents a specific discussion

Secure Authentication Using Visual Cryptography
free download

Abstract-Visual Cryptography is a cryptographic technique which allows visual information (text, picture, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. Visual Cryptography deals with any type of

Augmentation of Information Security by Cryptography in Cloud Computing
free download

Revised: 26 July 2014 Accepted: 13 August 2014 Published: 31 August 2014 Abstract: Cloud computing security challenges and it's additionally an issue to numerous analysts; first necessity was to concentrate on security which is the greatest concern of associations

Public-Key Cryptography with Joint and Related-Key Security
free download

Abstract The principle of key separation dictates using different keys for different cryptographic operations. We investigate the topic of joint security, where a single keypair is used in multiple primitives in a secure manner. We concentrate mainly on the case of

Signcryption Schemes Based on Elliptic Curve Cryptography
free download

Abstract Signcryption is cryptographic primitive which simultaneously provide both the function of digital signature and public key encryption in a single logical step. Identity based cryptography is an alternative to the traditional certificate based cryptosystem. Its main

Malicious Website Detection using Visual Cryptography and OTP
free download

Abstract With the advent of internet, various online attacks have been increased and among them, the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit information from

Implementation of Elliptic Curve Cryptography for Audio Based Application
free download

Abstract:Recently 3G technology has grown rapidly and is becoming a medium of choice for communication. All elements of multimedia (text image audio and video) are used. In this era, network security has become an issue of importance, on which a lot of research is

AN ANTI-PHISHING FRAMEWORK WITH NEW VALIDATION SCHEME USING VISUALCRYPTOGRAPHY
free download

ABSTRACT Phishing is a kind of online security attack where the attacker creates a replica of an existing web page to fool users in order to hack their personal, financial, or password data. Phishing is a form of online fraudulent activity in which an attacker aims to steal a

cryptography old papers



Image based Steganography and Cryptography
FREE DOWNLOAD
ABSTRACT In this paper we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system able to perform steganography and cryptography at the same time using images as cover objects for

A Watermarking Technique based on Visual Cryptography
FREE DOWNLOAD
ABSTRACT With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the multimedia. This paper considers the problem of embedding a binary watermark in a gray-level image using the concept of

When stream cipher analysis meets public-key cryptography
FREE DOWNLOAD
Inspired by fast correlation attacks on stream ciphers, we present a stream cipher-like construction for a public-key cryptosystem whose security relies on two problems: finding a low-weight multiple of a given polynomial and a Hidden Correlation problem. We obtain a

Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
FREE DOWNLOAD
We conduct more and more of our daily interactions over electronic media. The EC-funded project PRIME (Privacy and Identity Management for Europe) envisions that individuals will be able to interact in this information society in a secure and safe way while retaining

Distributed private-key generators for identity-based cryptography
FREE DOWNLOAD
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all

Time-lapse cryptography
FREE DOWNLOAD harvard.edu ABSTRACT The notion of sending a secret message to the future has been around for over a decade. Despite this, no solution to this problem is in common use, or even attained widespread acceptance as a fundamental cryptographic primitive. We name, construct

Elliptic curve cryptography on embedded multicore systems
FREE DOWNLOAD
ABSTRACT The increasing use of network-connected embedded devices and online transactions creates a growing demand of network security for embedded systems. The security requirements, such as authentication, confidentiality and integrity, always make

Towards practical lattice-based cryptography
FREE DOWNLOAD
Lattice-based cryptography began with the seminal work of Ajtai [Ajt96], who showed that random instances of a certain problem are at least as hard to solve as worst-case instances of lattice problems. The initial construction of a one-way function in [Ajt96] as well as the

On the power of two-party quantum cryptography
FREE DOWNLOAD
We study quantum protocols among two distrustful parties. Under the sole assumption of correctness-guaranteeing that honest players obtain their correct outcomes-we show that every protocol implementing a non-trivial primitive necessarily leaks information to a

Perfectly secure multiparty computation and the computational overhead of cryptography
FREE DOWNLOAD
We study the following two related questions:• What are the minimal computational resources required for general secure multiparty computation in the presence of an honest majority?• What are the minimal resources required for two-party primitives such as zero-

Pairing-based cryptography for sensor networks
FREE DOWNLOAD
ABSTRACT Pairing-based Cryptography has enabled a wide range of cryptographic schemes. This work discusses these schemes in the context of wireless sensor networks. To our knowledge, ours is the first work to address this subject.

Analysis of Quantum Cryptography Protocols by Model Checking
FREE DOWNLOAD
ABSTRACT Quantum cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of physics. Actually, the progress of

Entropic security in quantum cryptography
FREE DOWNLOAD
ABSTRACT We present two new definitions of security for quantum ciphers which are inspired by the definitions of entropic security and entropic indistinguishability defined by Dodis and Smith. We prove the equivalence of these two new definitions. We also propose a

When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployedcryptography
FREE DOWNLOAD
ABSTRACT Random number generators (RNGs) are consistently a weak link in the secure use of cryptography. Routine cryptographic operations such as encryption and signing can fail spectacularly given predictable or repeated randomness, even when using good long-

Instruction set extensions for pairing-based cryptography
FREE DOWNLOAD bristol.ac.uk A series of recent algorithmic advances has delivered highly effective methods for pairing evaluation and parameter generation. However, the resulting multitude of options means many different variations of base field must ideally be supported on the target platform.

Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
FREE DOWNLOAD
ABSTRACT As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against the data thieves attacks. Encryption algorithms play a main role in information

Finite field polynomial multiplication in the frequency domain with application to elliptic curvecryptography
FREE DOWNLOAD
We introduce an efficient method for computing Montgomery products of polynomials in the frequency domain. The discrete Fourier transform (DFT) based method originally proposed for integer multiplication provides an extremely efficient method with the best asymptotic

Distributed public-key cryptography from weak secrets
FREE DOWNLOAD
We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key

On simulatability soundness and mapping soundness of symbolic cryptography
FREE DOWNLOAD
TheAbstraction of cryptographic operations by term algebras, called Dolev-Yao models or symbolic cryptography, is essential in almost all tool-supported methods for proving security protocols. Recently significant progress was made–using two conceptually different

Multivariate public key cryptography
FREE DOWNLOAD
A multivariate public key cryptosystem (MPKCs for short) have a set of (usually) quadratic polynomials over a finite field as its public map. Its main security assumption is backed by the NP-hardness of the problem to solve nonlinear equations over a finite field. This family

Latin squares associated to principal autotopisms of long cycles. Application incryptography
FREE DOWNLOAD
ABSTRACT Fixed a principal isotopism T=(a, , o)? S3 n, where Sn is the symmetric group of the set N={0, 1,, n- 1}, we are going to study in this paper the number?(T) of Latin squares which have T as a principal autotopism. As an application in Cryptography, we use it in

Interactive locking, zero-knowledge PCPs, and unconditional cryptography
FREE DOWNLOAD
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs for NP. We show that such protocols exist in the interactive PCP model of Kalai and Raz (