To see the other types of publications on this topic, follow the link: Encryption.

Journal articles on the topic 'Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sun, Chenbo. "Comparative Study of RSA Encryption and Quantum Encryption." Theoretical and Natural Science 2, no. 1 (February 20, 2023): 121–25. http://dx.doi.org/10.54254/2753-8818/2/20220098.

Full text
Abstract:
Encryption is an important factor during online communication. It is useful to protect users privacy and prevent eavesdroppers listening. RSA encryption and quantum encryption are two mainstream encryption methods applied nowadays. This paper focuses on the evaluation and comparison between these two encryptions. It adopts the basic theory of RSA encryption and quantum encryption and provides an analysis of the benefits and shortcomings of these encryptions. It can be concluded that RSA (a type of mathematical encryption) is more popular than quantum encryption (a kind of physical encryption), but is less secure.
APA, Harvard, Vancouver, ISO, and other styles
2

Pourasad, Yaghoub, Ramin Ranjbarzadeh, and Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory." Entropy 23, no. 3 (March 13, 2021): 341. http://dx.doi.org/10.3390/e23030341.

Full text
Abstract:
In recent decades, image encryption, as one of the significant information security fields, has attracted many researchers and scientists. However, several studies have been performed with different methods, and novel and useful algorithms have been suggested to improve secure image encryption schemes. Nowadays, chaotic methods have been found in diverse fields, such as the design of cryptosystems and image encryption. Chaotic methods-based digital image encryptions are a novel image encryption method. This technique uses random chaos sequences for encrypting images, and it is a highly-secured and fast method for image encryption. Limited accuracy is one of the disadvantages of this technique. This paper researches the chaos sequence and wavelet transform value to find gaps. Thus, a novel technique was proposed for digital image encryption and improved previous algorithms. The technique is run in MATLAB, and a comparison is made in terms of various performance metrics such as the Number of Pixels Change Rate (NPCR), Peak Signal to Noise Ratio (PSNR), Correlation coefficient, and Unified Average Changing Intensity (UACI). The simulation and theoretical analysis indicate the proposed scheme’s effectiveness and show that this technique is a suitable choice for actual image encryption.
APA, Harvard, Vancouver, ISO, and other styles
3

Artajaya, Gede Krisna Surya, Agus Muliantara, I. Gusti Ngurah Anom Cahyadi Putra, and I. Ketut Gede Suhartana. "Aplikasi Enkripsi Pesan E-Mail Menggunakan Hybrid Cryptosystem AES dan RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 13, no. 2 (January 13, 2025): 435. https://doi.org/10.24843/jlk.2024.v13.i02.p21.

Full text
Abstract:
The security of communication via e-mail is increasingly important in today's digital era, where cyber attacks are increasing. These threats require the development of effective solutions to protect the confidentiality and integrity of information in e-mail. This study presents the development of an e-mail messaging application that employs a hybrid cryptosystem combining Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms. The aim is to improve the security of e-mail communications by utilizing the strengths of both symmetric and asymmetric encryption methods. AES is used for its efficiency in encrypting large amounts of data, while RSA ensures secure key exchange. The application tested with blackbox testing to verify its functionality and brute force testing to assess the encryption's robustness. The results show that the application successfully passed the blackbox testing, demonstrating that it functions as intended. The encryption results of the application are also excellent, as evidenced by brute force testing which shows that the encryption cannot be broken. This hybrid approach, by integrating AES and RSA, provides a practical solution for enhancing e-mail security.
APA, Harvard, Vancouver, ISO, and other styles
4

Thabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (December 30, 2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.

Full text
Abstract:
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate a crucial key sequence for pixel scrambling. Utilizing stream cipher encryption enhances security. Extensive security analysis tests its resilience against attacks like histogram and correlation techniques. Results are promising: a fairly uniform histogram, minimal correlation among pixels nearing zero, and entropy close to the ideal. Metrics like NPCR and UACI almost match ideal values, ensuring high security. Experiments confirm its effectiveness in encrypting diverse color images. The approach guarantees a uniform histogram, minimal pixel correlation nearing zero, entropy near the ideal value (8), and NPCR/UACI values close to ideals (99.61191% and 33.41068% respectively).
APA, Harvard, Vancouver, ISO, and other styles
5

Et. al., Jaichandran R,. "A Hybrid Encryption Model with Attribute Based Encryption and Advanced Encryption Standard Techniques." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 334–36. http://dx.doi.org/10.17762/turcomat.v12i2.720.

Full text
Abstract:
The emergence of cloud computing has completely changed the information technology sector, storage of information’s and access control. The main challenge in the migration of enterprises is the security to gain data owners confidence. In existing approach, many digital signatures based methodologies are used. In the existing approach, encryption time, security, encryption complexity are the parameters which need more focus. To overcome the existing issue, in this paper we proposed an hybrid architecture invoking attribute based encryption (ABE) for encrypting the key and advanced encryption standard (AES) for file encryption. Thus the proposed methodology provides security, confidentiality and optimizing storage and encryption cost
APA, Harvard, Vancouver, ISO, and other styles
6

Alawi, Attaa R., and Nidaa F. Hassan. "A Proposal Video Encryption Using Light Stream Algorithm." Engineering and Technology Journal 39, no. 1B (March 25, 2021): 184–96. http://dx.doi.org/10.30684/etj.v39i1b.1689.

Full text
Abstract:
Video encrypting is one technique to protect digital videos, it used to avoid unwanted interference and viewing of the transmitted videos. In this paper, a new selective video cryptography algorithm is suggested using light stream algorithm. As it known video size is large in size and it consume time in the encryption process, ChaCha a light encryption algorithm has been used to reduce the encryption time, encryption is done by Xoring frames of video with the key generated from ChaCha algorithm, it produced an acceptable results from robustness point view, but still encryption process consumed time, thus to speed up this process, feature detection operator (FAST) is used to encrypt key points result from FAST operator, in addition key points from this is increased to optimized between speed and robustness of proposed algorithm. In evaluation process, some of measuring quality factors MSE, PSNR, Correlation, NPCR, UACI and entropy are specified for evaluating and comparing between two suggested encryption algorithms which gave good result in encryption process (ChaCha and ChaCha with FAST Enhancement). Experimental results have discovered that the current projected has less encrypting time and better encrypting influence.
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, Eric. "An Exploration of RSA Encryption." Innovation in Science and Technology 3, no. 6 (November 2024): 83–86. https://doi.org/10.56397/ist.2024.11.09.

Full text
Abstract:
This project explores digital cryptography through the cryptography security system of RSA encryption. It also explores digital signature encryption with a simple hashing mechanism. This project resulted in a program that encoded and decoded messages using RSA encryption, handled large numbers, and calculated encryptions in a viable amount of time.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhu, Bingxin, Puwen Wei, and Mingqiang Wang. "Adaptive Security of Broadcast Encryption, Revisited." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1404279.

Full text
Abstract:
We provide a strong security notion for broadcast encryption, called adaptive security in the multichallenge setting (MA-security), where the adversary can adaptively have access to the key generation oracle and the encryption oracle many times (multichallenge). The adversary specially can query for the challenge ciphertexts on different target user sets adaptively, which generalizes the attacks against broadcast encryptions in the real world setting. Our general result shows that the reduction of the adaptive secure broadcast encryption will lose a factor of q in the MA setting, where q is the maximum number of encryption queries. In order to construct tighter MA-secure broadcast encryptions, we investigate Gentry and Water’s transformation and show that their transformation can preserve MA-security at the price of reduction loss on the advantage of the underlying symmetric key encryption. Furthermore, we remove the q-type assumption in Gentry and Water’s semistatically secure broadcast encryption by using Hofheinz-Koch-Striecks techniques. The resulting scheme instantiated in a composite order group is MA-secure with constant-size ciphertext header.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Jian, and Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.

Full text
Abstract:
Image encryption technology has been applied in many fields and is becoming the main way of protecting the image information security. There are also many ways of image encryption. However, the existing encryption algorithms, in order to obtain a better effect of encryption, always need encrypting several times. There is not an effective method to decide the number of encryption times, generally determined by the human eyes. The paper proposes an image encryption algorithm based on chaos and simultaneously proposes a balanced pixel algorithm to determine the times of image encryption. Many simulation experiments have been done including encryption effect and security analysis. Experimental results show that the proposed method is feasible and effective.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Yibo. "Discussion and Optimization of AES and SM4 Encryption Algorithms." Frontiers in Computing and Intelligent Systems 12, no. 1 (April 28, 2025): 119–24. https://doi.org/10.54097/cm6eq023.

Full text
Abstract:
This paper creates a new direction for the operation optimization of Simplified Message Block Cipher for 128-bit Data encryption (SM4) national cipher algorithm, which combines with AES algorithm to provide a simpler encryption method for SM4 algorithm. The AES algorithm is for the whole file system-based f encryption scheme, and the implementation concept is to encrypt the file and maintain data security by encrypting files to encrypt and maintain data security. The advantages of this encryption method are that they have few key numbers and are easy to manage. The disadvantage is that when a user performs database operations, such as adding records, deleting records, changing records, and making selections, it is usually necessary to manipulate one or more records in a table. Currently, it's necessary for users to record the complete process of file encryption or decryption in a database, as the AES algorithm's sluggishness in encrypting the entire file encryption cipher block results in significant time consumption. SM4 algorithm, although the key generation is more cumbersome, but its encryption and decryption speed are relatively fast, so you can combine the two. This is a SM4 encryption scheme that maintains the security of the encryption scheme while having practical efficiency.
APA, Harvard, Vancouver, ISO, and other styles
11

Nori, Ahmed S., and Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file." Sustainable Engineering and Innovation 3, no. 2 (May 29, 2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.

Full text
Abstract:
This paper is presenting design and implementation of Threefish block cipher on grayscale images. Despite the fact that Threefish block cipher is one of the best secure algorithms, most studies concerning Threefish have focused on hardware implementation and have not commonly been applied on image encryption due to huge amount of data. The main contribution here was to reduce the time and the amount of data to be encrypted while maintaining encryption performance. This objective was achieved by encrypting just the most significant bits of image pixels. A 256-bit plain text blocks of the Threefish was constructed from 2n most significant bits of the pixels, where 0<n<3. Furthermore, Threefish block cipher was applied when n=3 to analyze the impact of uninvolving some bits in encryption process on the encryption performance. The results indicated that the encryption achieved good encryption quality when n=1, but it might cause some loss in decryption. In contrast, the encryption achieved high encryption quality when n=2, almost as good as the encryption of the whole pixel bits. Furthermore, the encryption time and the amount of data to be encrypted were decreased 50% as n decreased by 1. It was concluded that encrypting half of the pixel bits reduces both time and data, as well as significantly preserves the encryption quality. Finally, although the proposed method passed the statistical analysis, further work is needed to find a method resistant to the differential analysis.
APA, Harvard, Vancouver, ISO, and other styles
12

Dr., Khaled Musa. "Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security." International Journal of Current Science Research and Review 06, no. 06 (June 7, 2023): 3188–94. https://doi.org/10.5281/zenodo.8013027.

Full text
Abstract:
<strong>ABSTRACT:</strong> Information security is the combination of policies, rules and practices to prevent any unauthorized access or attacks that causes corruption to data, information, and computing services. Information security techniques and programs are built around the core objective to secure data and information by adapting encryption algorithms methods. Encryption algorithm methods impeded in the information security programs or encryption software tools enforce more security by encrypting and decrypting data and information. Encryption algorithm methods are based on algorithms that scramble data and information by converting them into unreadable text. There are various encryption methods used in various encryption software tools. The more encryption algorithm methods used within the encryption software tool, the more security provided on data and information effective data and information security. &nbsp;In this paper, the most used encryption algorithm methods are analyzed and evaluated based on their usage in encryption software tools to determine the most encryption algorithm method that is used ensure more security on data and information. &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
13

Farhan, Mohammed Mahmoud. "Image Authentication Using Public Key." Al-Salam Journal for Engineering and Technology 4, no. 1 (September 6, 2024): 78–87. http://dx.doi.org/10.55145/ajest.2025.04.01.007.

Full text
Abstract:
This study talked about importance of data protection during Internet communication and highlights the utilize of image encryption as a specialized method. Image encryptions contain the utilize of unique key values to hide and show messages within images, with algorithms that are difficult to decryption. This work focuses on a modified version of the Rivest-Shamir-Adleman (RSA) encryption system, which is compatible with grayscale and color images and is implemented in C#. Additionally, it combines Advanced Encryption Standard (AES) and cryptography techniques to enhance encryption protection. Decrypting a confused image contain complex computations with large seed numbers. This proposed addresses image encryption, presenting a higher level of security compared to the original RSA encryption scheme. This research proposed experts in information technology should consider utilizing the modified RSA encryption system to support security during image transmission.
APA, Harvard, Vancouver, ISO, and other styles
14

Alslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (November 30, 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.

Full text
Abstract:
Recently, medical image encryption has gained special attention due to the nature and sensitivity of medical data and the lack of effective image encryption using innovative encryption techniques. Several encryption schemes have been recommended and developed in an attempt to improve medical image encryption. The majority of these studies rely on conventional encryption techniques. However, such improvements have come with increased computational complexity and slower processing for encryption and decryption processes. Alternatively, the engagement of intelligent models such as deep learning along with encryption schemes exhibited more effective outcomes, especially when used with digital images. This paper aims to reduce and change the transferred data between interested parties and overcome the problem of building negative conclusions from encrypted medical images. In order to do so, the target was to transfer from the domain of encrypting an image to encrypting features of an image, which are extracted as float number values. Therefore, we propose a deep learning-based image encryption scheme using the autoencoder (AE) technique and the advanced encryption standard (AES). Specifically, the proposed encryption scheme is supposed to encrypt the digest of the medical image prepared by the encoder from the autoencoder model on the encryption side. On the decryption side, the analogous decoder from the auto-decoder is used after decrypting the carried data. The autoencoder was used to enhance the quality of corrupted medical images with different types of noise. In addition, we investigated the scores of structure similarity (SSIM) and mean square error (MSE) for the proposed model by applying four different types of noise: salt and pepper, speckle, Poisson, and Gaussian. It has been noticed that for all types of noise added, the decoder reduced this noise in the resulting images. Finally, the performance evaluation demonstrated that our proposed system improved the encryption/decryption overhead by 50–75% over other existing models.
APA, Harvard, Vancouver, ISO, and other styles
15

Namdeo, Thorat Nilesh, Amit Singla, and Tanaji Dhaigude. "VISUAL CRYPTOGRAPHY WITH COLOR IMAGE ENCRYPTION VIA IMPROVED ELLIPTIC CURVE CRYPTOGRAPHY (ECC) AND OTP GENERATION: SELF-IMPROVED GOLD RUSH OPTIMIZATION ALGORITHM FOR OPTIMAL KEY GENERATION." International Journal of Innovations & Research Analysis 04, no. 03(I) (September 15, 2024): 52–58. http://dx.doi.org/10.62823/ijira/4.3(i).6808.

Full text
Abstract:
Visual Cryptography is a cryptographic technique that involves encrypting images in such a way that decryption can be performed visually without the need for complex computations. This technique holds significant importance in secure image sharing, as it ensures that sensitive visual information remains confidential during transmission. Recognizing this significance, a novel approach named Self-Improved Gold Rush Optimization (SIGRO)-based Visual Cryptography has been proposed in this research. This approach encompasses two main phases: Embedding and Extraction. It involves encrypting three original images and two secret images using various encryption techniques such as Random grid-based secret image sharing, Extended Visual Cryptography Scheme (EVCS), and Kronecker product-based encryption, along with the integration of security measures like Modified HMAC-based One-Time Password generation technique (MHOTP) for Improved Elliptic Curve Cryptography (IECC)-based encryption and Baker's map-based encryption. In Kronecker product-based encryption stage, the SIGRO algorithm is utilized to generate optimal keys for encryption purposes. The SIGRO algorithm is proposed as a well-versed approach than the conventional Gold Rush Optimization (GRO) algorithm, incorporating three key enhancements. These enhancements significantly contribute to the efficacy and reliability of the SIGRO algorithm in generating optimal keys for Kronecker product-based encryption. Furthermore, the IECC-based encryption utilizes the MHOTP generation technique, where the OTPs generated by this technique serve as the keys for this encryption stage, enhancing the ECC algorithm into an IECC algorithm. The decryption process involves reversing the steps applied during various encryption stages. This proposed approach's significance lies in its ability to enhance security through a combination of encryption methods and security measures.
APA, Harvard, Vancouver, ISO, and other styles
16

Ali Pitchay, Sakinah, Wail Abdo Ali Alhiagem, Farida Ridzuan, and Sundresan Perumal. "Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 98. http://dx.doi.org/10.14419/ijet.v7i4.15.21427.

Full text
Abstract:
This paper provides an enhanced technique for improving the security and protecting the privacy of the cloud computing users by encrypting the data before it reached to server’s storage. Encrypting means the process of converting information or data into unreadable language to prevent unauthorized access. This paper will propose a mobile application design, which will allow the user to encrypt and decrypt the data hence maintaining security and privacy. In the proposed system design, the AES Algorithm will handle the encryption of the data using a keyword which will be defined by the user during the creation of the account. The encryption keyword will be hashed by the system using MD5 Algorithm. The keys will remain in encrypted form, while they are on the server side. Both encrypted data, encryption and decryption keys will be saved on the server in secured form. The idea behind hashing the encryption keys is to protect the keys while they are stored on the server, therefore, any unauthorized access to the server will gain no advantages since every bit of data on the server is encrypted including the private keys. The proposed system design will participate by improving the security and privacy of the users by giving them the capability to encrypt and decrypt data in enhanced way using AES as a data encryption method and MD5 hash algorithm for encrypting the encryption keys.
APA, Harvard, Vancouver, ISO, and other styles
17

H Al-khafaji, Kawther, and Hanan A. Al-Haidari A.Al-Haidari. "Gray X-Ray medical images encryption and decryption by chaotic algorithm." Modern Journal of Health and Applied Sciences 2, no. 1 (March 15, 2025): 1–11. https://doi.org/10.70411/mjhas.2.1.2025143.

Full text
Abstract:
The procedure for securely transferring encrypted images over the network so that an unauthorized user cannot decrypt them is by implementing strong algorithms that cannot be decrypted. There are different methods and multiple algorithms for encrypting and decrypting images. The most common way to encrypt images is the Chaotic Image System. The encryption key and decryption key are called the “symmetric key." In this research, a medical researcher found that the chaotic logistic encryption algorithm has a better effect on encrypting medical X-ray image information and hides the statistical properties of the original medical encryption. Several standards were used to measure image quality during and after encryption, and a comparison was made between them to obtain optimal values ​​for encrypting the X-ray image. The correlation relationship between the adjacent pixels of both the original and the encrypted image was also measured at both values ​​of the initial coefficients. The correlation relationship for the adjacent pixels in the original image was found to be strong. However, in the case of the encrypted image, it is sparse and has little correlation. Finally, in the case of the image in which encryption does not occur, the correlation relationship between adjacent pixels is similar to the original image. Several measurements were used in the research, such as Encryption Time (ET), Decryption Time (DT), and Information Entropy for the Original image (Eo).
APA, Harvard, Vancouver, ISO, and other styles
18

Alzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (January 16, 2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.

Full text
Abstract:
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chaining (CBC), output feedback chaining (OFB), and cipher feedback chaining (CFB). The proposed method works by applying the chaos baker map in different operation modes for encrypting digital images. A group of tests were carried out to examine the impact of operation modes on chaos baker-based encryption. This is done using several encryption metrics like visual inspection, statistical measures, entropy measure, encryption quality measures, and noise resistance measures. Simulation results demonstrated the effectively of baker-based encryption in CBC mode.
APA, Harvard, Vancouver, ISO, and other styles
19

Riyaz Fathima Abdul and Saravanan Arumugam. "A Novel Data Transmission Model Using Hybrid Encryption Scheme for Preserving Data Integrity." Advances in Technology Innovation 10, no. 1 (January 23, 2025): 15–28. https://doi.org/10.46604/aiti.2024.14114.

Full text
Abstract:
The objective of the study is to introduce a novel hybrid encryption scheme, combining both symmetric and asymmetric encryptions with a data shuffling mechanism, to enhance data obfuscation and encryption security. The approach uses RSA for asymmetric encryption and ChaCha20-Poly1305 for symmetric encryption. To increase the complexity, an additional phase involves reorganizing the RSA-encrypted data blocks. Furthermore, symmetric key generation using the key derivation function is employed to generate the key for symmetric encryption through an asymmetric private key. Decryption entails reversing these procedures. This model significantly enhances security through an additional shuffling step, measured by performance metrics like encryption and decryption times, throughput rate, and the avalanche effect. The method, despite increasing execution time compared to symmetric models, yields comparable results for asymmetric models and ensures robustness. The proposed method outperforms traditional methods regarding resistance to cryptanalytic attacks, including chosen-plaintext and pattern analysis attacks.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Zhenhua, Deqi Huang, Yating Tu, and Zikuang Ye. "Layer multiplexing and DNA based color image encryption." Journal of Physics: Conference Series 2858, no. 1 (October 1, 2024): 012039. http://dx.doi.org/10.1088/1742-6596/2858/1/012039.

Full text
Abstract:
Abstract A layer multiplexing-based encrypted image scheme for DNA color images is proposed. Firstly, a memristor is added to the Sprott-B chaotic system to make it a fourth-order memristorised hyper-chaotic system. The hyperchaotic system has better pseudo-randomness. The encryption system proposed generates the initial value of the system by SHA3-256 function to achieve “One image, one secret”. The chaotic sequence is generated by a memory hyperchaotic system for encrypting the image. The encryption process includes image zero complements, image chunking, DNA encryption, layer multiplexing, DNA decryption, and improved XOR diffusion. The encrypted images are analyzed by Matlab. The pixel distribution of the encrypted image is verified to be homogeneous by pixel histogram analysis. The encryption system is tested to have good resistance to shear attacks and noise attacks. The encryption system also has a good encryption effect by information entropy test. Experiments show that the encryption system proposed has a short encryption time and decryption time.
APA, Harvard, Vancouver, ISO, and other styles
21

Wu, Yuchen. "Theoretical Analysis of AES Encryption Optimization Based on Quaternions and Rotation Matrices." Theoretical and Natural Science 100, no. 1 (March 31, 2025): 75–82. https://doi.org/10.54254/2753-8818/2025.21702.

Full text
Abstract:
As a commonly used symmetric encryption method, AES (Advanced Encryption Standard) still has some steps that cannot fully ensure the effectiveness of encryption, and Symmetric Key Encryption has the risk of key leakage in common. This paper mainly researches an optimization model of AES encryption method, which is based on the original AES encryption method. This model adds another password in the SubByte and MixColumns step, in order to ensure the effectiveness of encryption. The optimization model is achieved with programs on python. Experimental data shows that the encryption process is too regular due to the methodologies of the model itself: the location of those bytes after mapping can be separated into some sets, and the transforms of this model cant exchange the mapping of those bytes from different sets. After analyzing and optimizing the model, another improved model is worked out, which can simply confuse the bytes with their locations. The experiments show that the next model has a better encrypting effect than the first one.
APA, Harvard, Vancouver, ISO, and other styles
22

Kulwinder, Kaur*1 &. Brahmaleen Kaur Sidhu2. "AN HYBRID APPROACH FOR EFFICIENT DATA ENCRYPTION AND DECRYPTION FOR DATA SECURITY IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 9 (September 18, 2018): 188–93. https://doi.org/10.5281/zenodo.1421045.

Full text
Abstract:
In this paper, a hybrid encryption is proposed using combination of two asymmetric schemes. The existing schemes are lacking in encrypting large data files, there time complexity may worsen with size. In this work the homomorphic algorithm is used along with RSA, to enhance the encryption and decryption time. The evaluation study has been done between AES, 3DES, DES and proposed algorithm on basis of their time complexities. Our proposed work has very least complexity for both encryption and decryption. Proposed scheme is also highly secure as it involves 2 encryption and decryption rounds.
APA, Harvard, Vancouver, ISO, and other styles
23

Kuo, Tzu-Hsiang, and Ja-Ling Wu. "A High Throughput BFV-Encryption-Based Secure Comparison Protocol." Mathematics 11, no. 5 (March 2, 2023): 1227. http://dx.doi.org/10.3390/math11051227.

Full text
Abstract:
Secure comparison is a fundamental problem in multiparty computation. There are two different parties, each holding an l-bit integer, denoted by 𝑎 and 𝑏, respectively. The goal of secure comparison is to compute the order relationship between 𝑎 and 𝑏, say (𝑎 &gt; 𝑏) ∈ {0.1}, without revealing their inputs to any others. Since previous solutions based on homomorphic encryption need at least Ω(l) encryptions for each l-bit comparison, the total encryption time leads to a computational bottleneck for these protocols. This work presents a fast, semi-honest, secure comparison protocol based on the BFV encryption scheme. With its vector-like plaintext space, the number of required encryptions can be significantly reduced; actually, only six encryptions are needed for each comparison in our protocol. In other words, the proposed protocol can achieve the time complexity Õ (λ + l) for a given security parameter λ. As a result, 4096-bit integers can be securely compared within 12.08 ms, which is 280 times faster than the state-of-the-art homomorphic encryption-based secure comparison protocol. Furthermore, we can compare k pairs of l ⋅ k−1-bit integers with almost the same execution time as comparing l-bit integers and achieve higher throughput regardless of the compared integer size.
APA, Harvard, Vancouver, ISO, and other styles
24

Mandangan, Arif, and Irene Lim Jin Ying. "Chaotic Encryption Scheme for Colour Image using 3D Lorenz Chaotic Map and 3D Chen System." International Journal of Computational Thinking and Data Science 1, no. 1 (April 15, 2024): 10–24. http://dx.doi.org/10.37934/ctds.1.1.1024.

Full text
Abstract:
Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. Chaos theory exhibits some distinctive characteristics, which include butterfly-like patterns, unpredictable behavior, and sensitive dependence to initial conditions. . In the past few decades, image encryption based on a single chaotic map has been a common technique in encrypting images. However, there are still unauthorized interceptors who illegally access and obtain the private information of the image. With that being the case, an encryption method that applies more than one chaotic system will contribute to creating a more complex relationship between the original and encrypted images, making it challenging for unauthorized individuals to decipher or extract the original content of the image without the appropriate decryption key. In this study, two chaotic maps, 3D Lorenz Map and 3D Chen system, are applied to generate random cryptographic keys for encrypting color images using permutation and diffusion mechanisms. The proposed algorithm that employs two chaotic maps is proven to be an effective system that achieves excellent results in security.
APA, Harvard, Vancouver, ISO, and other styles
25

Irene Lim Jin Ying and Arif Mandangan. "Chaotic Encryption Scheme for Colour Image using 3D Lorenz Chaotic Map and 3D Chen System." International Journal of Advanced Research in Computational Thinking and Data Science 1, no. 1 (April 15, 2025): 10–24. https://doi.org/10.37934/ctds.1.1.1024a.

Full text
Abstract:
Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. Chaos theory exhibits some distinctive characteristics, which include butterfly-like patterns, unpredictable behavior, and sensitive dependence to initial conditions. . In the past few decades, image encryption based on a single chaotic map has been a common technique in encrypting images. However, there are still unauthorized interceptors who illegally access and obtain the private information of the image. With that being the case, an encryption method that applies more than one chaotic system will contribute to creating a more complex relationship between the original and encrypted images, making it challenging for unauthorized individuals to decipher or extract the original content of the image without the appropriate decryption key. In this study, two chaotic maps, 3D Lorenz Map and 3D Chen system, are applied to generate random cryptographic keys for encrypting color images using permutation and diffusion mechanisms. The proposed algorithm that employs two chaotic maps is proven to be an effective system that achieves excellent results in security.
APA, Harvard, Vancouver, ISO, and other styles
26

Qizi, Toshboyeva Feruza To'lqin, and Bebutova Zulayxo Hamidovna. "MODERN METHODS AND ESSENCE OF ENSURING INFORMATION SECURITY IN THE INFORMATION SOCIETY." European Journal of Contemporary Business Law & Technology: Cyber Law, Blockchain, and Legal Innovations 1, no. 7 (August 27, 2024): 106–11. https://doi.org/10.61796/ejcblt.v1i7.872.

Full text
Abstract:
In today's information society, the problem of information security is extremely important. In this article, the concept of information security and its tasks, threats to information security, the concept of encryption and types of encryptions, encryption standards, cryptography goals are given in-depth information. Issues of reliable protection of information were studied
APA, Harvard, Vancouver, ISO, and other styles
27

Parenreng‬, Jumadi Mabe, Sahraeni Maulida Mustari, and Abdul Wahid. "E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm." Internet of Things and Artificial Intelligence Journal 2, no. 1 (February 16, 2022): 1–9. http://dx.doi.org/10.31763/iota.v2i1.510.

Full text
Abstract:
E-mail is a medium of long-distance communication via the internet, which is currently often used for message exchange needs. But the use of e-mail has security problems, especially regarding data leakage when sending messages via e-mail. One of the efforts to improve the security of data and information is the application of cryptographic techniques and methods, namely end-to-end encryption. Cryptography is the science of reducing the risk of security threats by encrypting and decrypting data and information. In the implementation of the e-mail system, at least 2 (two) suitable encryption techniques are needed, namely symmetric encryption techniques to encrypt messages and data to be sent via e-mail effectively and efficiently, and asymmetric encryption techniques used to distribute keys used by symmetric encryption. Therefore, in this study, we use the El-Gamal encryption model to distribute the symmetric key, and the AES encryption model is a fairly secure algorithm to protect message data or confidential information.
APA, Harvard, Vancouver, ISO, and other styles
28

Ramanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Full text
Abstract:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms are popular in enhancing security for image encryption. The main computational intelligence algorithms used in image encryption are neural network, fuzzy logic and genetic algorithm. In this paper, a review is done on computational intelligence-based image encryption methods that have been proposed in the recent years and the comparison is made on those methods based on their performance on image encryption.
APA, Harvard, Vancouver, ISO, and other styles
29

Thirumalaimuthu, T. Ramanathan, Hossen J., Sayeed S., and Emerson Raja J. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1428–35. https://doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.

Full text
Abstract:
Image encryption is an important area in visual cryptography that helps in protecting images when shared through internet. There is lot of cryptography algorithms applied for many years in encrypting images. In the recent years, artificial intelligence techniques are combined with cryptography algorithms to support image encryption. Some of the benefits that artificial intelligence techniques can provide are prediction of possible attacks on cryptosystem using machine learning algorithms, generation of cryptographic keys using optimization algorithms, etc. Computational intelligence algorithms are popular in enhancing security for image encryption. The main computational intelligence algorithms used in image encryption are neural network, fuzzy logic and genetic algorithm. In this paper, a review is done on computational intelligence-based image encryption methods that have been proposed in the recent years and the comparison is made on those methods based on their performance on image encryption
APA, Harvard, Vancouver, ISO, and other styles
30

Yeow, Sin-Qian, and Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (November 30, 2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.

Full text
Abstract:
With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches. The approach consists of training a neural network to simulate a model of machine learning and then encrypting it using Data Encryption Standard (DES), Advanced Encryption Standard (AES), and Homomorphic Encryption (HE) techniques, respectively. Its performance is evaluated based on the encryption/decryption accuracy and computational efficiency. The results indicate that combining DES with Blowfish offers moderate encryption and decryption speeds but is less secure than AES and HE. AES provides a practical solution, balancing security and performance, offering a relatively swift encryption and decryption process while maintaining high security. However, Fernet and HE present a viable alternative if data privacy is a top priority. Encryption and decryption times increase with file size and require sufficient computational resources. Future research should explore image encryption techniques to balance security and accurate image retrieval during decryption. Advanced privacy-preserving approaches, such as differential privacy and secure multi-party computation, may enhance security and confidentiality in digital encryption and decryption processes.
APA, Harvard, Vancouver, ISO, and other styles
31

SHIBU BAI, Mr SHANE. "Recovering and Analysing Data from Encrypted Devices." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (April 23, 2025): 1–9. https://doi.org/10.55041/ijsrem45625.

Full text
Abstract:
Abstract - This paper presents a secure and efficient data protection approach using hybrid encryption, combining symmetric and asymmetric cryptographic methods to enhance both speed and security. Symmetric encryption, specifically the AES algorithm, isutilized for encrypting large volumes of data quickly, while RSA is employed to securely exchange the encryption keys. Alongside this, the work also introduces a data recovery and analysis component designed to retrieve and verify encrypted data, ensuring its integrity and accessibility when needed. The system is developed in Java and tested for performance, demonstrating low latency and reliable encryption-decryption cycles. This dual-focus solution addresses essential concerns in safeguarding data for applications such as cloud services and secure communications.. Key Words: RSA, AES, Recovery, Confidentiality, Integrity, Hybrid encryption.
APA, Harvard, Vancouver, ISO, and other styles
32

Huda Anwar and Zill e Shams. "Algorithms of Encryption Using Graph Theory." Mathematical Sciences and Applications 2, no. 2 (December 31, 2023): 73–85. http://dx.doi.org/10.52700/msa.v2i2.16.

Full text
Abstract:
Encryption plays a vital role in securing sensitive information in various domains from communication networks to financial transactions. Graph theory, with its vast mathematical framework and powerful algorithms, presents a potential method for creating encryption methods. This abstract introduces an algorithm that leveragesgraph theory concepts to provide a symmetric encryption method. Encryption is the process of hiding the original plain-text message by producing a cipher text; decryption is the process of resolving the cipher text to reveal the original plain-text message. In this research, an encryption method based on an idea from graph theory is suggested for encrypting the message. This method stores the original data (plain text) as a complete graph. An encryption table is used for labeling. Some matrix has been modified by using an alphabet encoding table. Ashared key, K, is used which increases the complexity of the cipher text and we provide the decryption process.
APA, Harvard, Vancouver, ISO, and other styles
33

Abeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (January 17, 2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.

Full text
Abstract:
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions on bits are applied to create a key used for encrypting the edge image. Four randomness tests are passed through NIST randomness tests to ensure whether the generated key is accepted as true. This process is reversible in the state of decryption to retrieve the original image. The encryption image that will be gained can be used in any cyber security field such as healthcare organization. The comparative experiments prove that the proposed algorithm improves the encryption efficiency has a good security performance, and the encryption algorithm has a higher information entropy 7.42 as well as a lower correlation coefficient 0.653.
APA, Harvard, Vancouver, ISO, and other styles
34

Aitkhozhayeva, Y. Zh, and D. S. Akhmetsharipov. "Technology for using special encryption functions in PostgreSQL." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 91, no. 1 (March 15, 2024): 21–29. http://dx.doi.org/10.47533/2024.1606-146x.02.

Full text
Abstract:
Cryptographic encryption mechanisms in the open source PostgreSQL server DBMS are discussed. Special high-level and low-level functions of symmetric encryption of the Pgcrypto module for ensuring information security of data are analyzed. The analysis of special functions of the third-party GPG program is performed, which allow performing asymmetric encryption in the PostgreSQL database server. A combined data encryption technology in database tables is proposed, using a hierarchy of keys (asymmetric and symmetric encryption) with a passphrase, which is also encrypted to ensure better protection of encrypted data. This technology is being tested on the example of developing a function for encrypting data, which is triggered by a trigger when inserting rows into a database table, and a data decryption function when reading encrypted data from a table.
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Pengfei, Yixu Wang, Jiafu Xiang, and Xiaoling Xiao. "Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping." Sensors 22, no. 24 (December 16, 2022): 9929. http://dx.doi.org/10.3390/s22249929.

Full text
Abstract:
Because images are vulnerable to external attacks in the process of network transmission and traditional image encryption algorithms have limitations such as long encryption time, insufficient entropy or poor diffusion of cipher image information when encrypting color images, a fast image encryption algorithm based on logistics-sine-cosine mapping is proposed. The algorithm first generates five sets of encrypted sequences from the logistics-sine-cosine mapping, then uses the order of the encryption sequence to scramble the image pixels and designs a new pixel diffusion network to further improve the key sensitivity and plain-image sensitivity of the encryption algorithm. Finally, in a series of security analysis experiments, the experimental image Lena was tested 100 times, and the average encryption time was 0.479 s. The average value of the information entropy, pixel change rate and uniform average change intensity of the cipher image reached 7.9994, 99.62% and 33.48%, respectively. The experimental results show that the fast image encryption algorithm based on logistics-sine-cosine mapping takes less time to encrypt, and the cipher image has good information entropy and diffusivity. It is a safe and effective fast image encryption algorithm.
APA, Harvard, Vancouver, ISO, and other styles
36

Huang, Xing Li, and Huan Chun Yang. "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk." Applied Mechanics and Materials 58-60 (June 2011): 573–78. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.573.

Full text
Abstract:
The design of the "two-way ID authentication and hardware encryption-based secure mobile hard disk" adopts the smart card-based technology of two way ID authentication, thus enables higher authentication strength than ordinary password authentication and USB-KEY one way certification; adoption of dedicated hardware encryption chip on encrypting the hard disk data enhances the encryption speed; since this encryption is a hardware level encryption, it is completely transparent to users, and do not rely on the operating system or other applications, with almost no impact on system performance; that the key of the encryption system will be loaded before the system initialization (system boot) prevents malicious code attacks from hard drive, and even when the mobile hard disk was stolen, the thief cannot read out any encrypted data from it on any other computer as long as the thief has no access to the encryption key. Therefore, this "encrypted mobile hard disk" is more secure with better reading and writing performance, and thus can effectively protect sensitive data on the mobile hard disk.
APA, Harvard, Vancouver, ISO, and other styles
37

Vaishnavi Agrawal. "Enhancing Privacy on Online Social Networs: A comparative study of encryption techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 5 (September 3, 2024): 25–32. http://dx.doi.org/10.29070/cqryaz86.

Full text
Abstract:
The ability to connect with people all over the world and share private information has made online social networks (OSNs) indispensable to contemporary communication. Because of the serious privacy and security concerns that come with their fast growth, protecting user data is of the utmost importance. In order to improve OSN privacy, this study examines several encryption techniques. It discusses symmetric encryption (ECC and RSA) and synthetic encryption (AES) as well as hybrid methods that combine the two types of encryption. Using examples from well-known sites such as LinkedIn, Facebook, and Twitter, the research assesses the efficacy and practicality of various strategies. Key management, performance implications, and user experience maintenance are some of the challenges that are addressed while adopting comprehensive encryption. To further improve privacy protection in OSNs, the paper delves into upcoming developments in encryption technology, such as decentralized encryption approaches and algorithms that are resistant to quantum computing. In order to better understand how to improve OSN security, this article will provide a thorough examination of encryption's function in protecting user privacy.
APA, Harvard, Vancouver, ISO, and other styles
38

Agarwal, Sohit, and Gagan Joshi. "Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 6 (July 10, 2023): 21–27. http://dx.doi.org/10.17762/ijritcc.v11i6.6767.

Full text
Abstract:
The research paper titled "Hybrid Data Encryption as well as Decryption Using Hybrid RSA and DNA" develops a hybrid cryptosystem by combining the usefulness of such an asymmetric-key (public-key) cryptosystem with the efficacy of a symmetric-key (private-key) cryptosystem. These two types of cryptosystems use different types of keys. The method addresses concerns regarding the users' right to privacy, authentication, and accuracy by utilizing a data encryption process that is secure in both directions. Both the process of encrypting data and the process of decrypting data, which are both utilized by the system, are two different encryption methods. It has been suggested that a hybrid encryption algorithm, which combines DNA and RSA, be used for file encryption in order to address the issues with efficiency and security. The results of the testing show that the RSA and DNA hybrid encryption algorithm is suitable for use. In this particular research project's hybrid encryption and decoding for cloud processing with IOT devices, the DNA and RSA algorithms were used.
APA, Harvard, Vancouver, ISO, and other styles
39

Li, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (March 25, 2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.

Full text
Abstract:
Data encryption technology is a key method to secure sensitive data. The privacy and confidentiality of data is protected by encrypting the data, i.e., transforming the original data into a form that cannot be understood without authorization. However, the security of traditional encryption algorithms is gradually challenged with the increase in computing power. Therefore, studying how to apply more advanced encryption techniques has become a current research hotspot. This study aims to analyze the application of data encryption techniques and explore the advantages and applicability of emerging encryption algorithms. This paper presents a variety of methods for preventing users' privacy breaches, with a primary focus on the principles of homomorphic encryption and how data can be accessed by users without decryption. Additionally, the working principles of secure multiparty computation are discussed, allowing multiple users to perform calculations on shared data while preserving data privacy. Furthermore, the paper explores data encryption techniques that employ specific algorithms to convert plaintext into ciphertext, ensuring both data consistency and privacy. Finally, a summary and future prospects are provided.
APA, Harvard, Vancouver, ISO, and other styles
40

Limbachia, Dipen. "Encryption of Card Details Using AES with a 128-bit Key a Secure Approach to Data Protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (March 25, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29484.

Full text
Abstract:
Data security is a critical concern in today's digital age, particularly regarding the protection of sensitive information such as cardholder data. This research paper explores the implementation of Advanced Encryption Standard (AES) encryption with a 128-bit key as a means of safeguarding card details. The project demonstrates the encryption and decryption process, ensuring data confidentiality and integrity. Utilizing the pycryptodome library in Python, the AES encryption technique is applied to encrypt card details, offering a secure approach to data protection. The methodology section outlines the AES encryption process, emphasizing key generation, encryption, and decryption. A detailed explanation of the Python implementation highlights the importance of key length and randomness in the encryption process. The results section presents the outcomes of encrypting and decrypting card details using AES encryption, analyzing the efficiency and security of the encryption process. Additionally, potential vulnerabilities and challenges encountered during implementation are discussed, along with their resolutions. In the discussion section, the research findings are interpreted in the context of data security and encryption standards. A comparison between AES encryption and other encryption algorithms is provided, evaluating performance and security aspects. Consideration is given to future research directions in the field of data encryption and security. Overall, this research paper underscores the significance of AES encryption with a 128-bit key for protecting cardholder information. By implementing AES encryption, organizations can enhance data security measures, ensuring the confidentiality and integrity of sensitive data in digital transactions. This abstract provides a concise overview of the research paper, summarizing the objectives, methodology, results, and implications of implementing AES encryption for card data protection. It highlights the importance of data security and encryption techniques in safeguarding sensitive information in digital transactions. Tokenizing cards enhances security, ensures regulatory compliance, boosts customer trust, and streamlines payment processes while reducing liability for organizations. Future developments may involve tokenizing cards even without customer consent. Keywords: Tokenization, Payment systems, Encryption, Fraud prevention
APA, Harvard, Vancouver, ISO, and other styles
41

Alsalam Ali, Nashwan, Abdul Monem S. Rahma, and Shaimaa H. Shaker. "Survey on 3D Content Encryption." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 15 (August 11, 2021): 115. http://dx.doi.org/10.3991/ijim.v15i15.24179.

Full text
Abstract:
&lt;p class="0abstract"&gt;The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
42

Michael, N. John, Ozioma Ogoegbulem, Victor Obukohwo, and Etaroghene Egbogho Henry. "NUMBER THEORY IN RSA ENCRYPTION SYSTEMS." GPH - International Journal of Mathematics 06, no. 11 (November 26, 2023): 07–16. https://doi.org/10.5281/zenodo.10209900.

Full text
Abstract:
<strong>RSA encryption is a widely employed cryptographic system based on the principles of number theory. Number theory is the branch of pure mathematics that studies positive whole numbers, called natural numbers and integers. Number theory seeks to discover relationships existing between numbers. Cryptography is the study of encryption and decryption of information. By encrypting information, data can be transmitted to the intended recipient securely across the internet. In this paper, we propose an RSA encryption scheme based on number theory, showing its applications to cryptography.</strong>
APA, Harvard, Vancouver, ISO, and other styles
43

Sinha, Mr Anurag, and Mr Amrit Kumar Bhadani. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table." Indian Journal of Data Communication and Networking 1, no. 2 (April 10, 2021): 21–30. http://dx.doi.org/10.35940/ijdcn.b5008.041221.

Full text
Abstract:
According to the present communication system one of the main concerns is secured transformation of data. In this paper we be inclined to propose a two-level encryption in this paper in the first level encryption we use the multiplicative ciphers and Cesar cipher in this level the plain text letters, we shall multiply the key numbers in this level and the second layer encryption we use periodic table exploitation the properties if the quality table, and thus use it for encrypting and decrypting in the same manners. For the information of network security in the second level encryption we will differently types of periodic table properties like atomic no, mass no, IUPAC name, chemical formula, and their properties.
APA, Harvard, Vancouver, ISO, and other styles
44

Sinha, Mr Anurag, and Mr Amrit Kumar Bhadani. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table." Indian Journal of Data Communication and Networking 1, no. 2 (April 10, 2021): 21–30. http://dx.doi.org/10.54105/ijdcn.b5008.041221.

Full text
Abstract:
According to the present communication system one of the main concerns is secured transformation of data. In this paper we be inclined to propose a two-level encryption in this paper in the first level encryption we use the multiplicative ciphers and Cesar cipher in this level the plain text letters, we shall multiply the key numbers in this level and the second layer encryption we use periodic table exploitation the properties if the quality table, and thus use it for encrypting and decrypting in the same manners. For the information of network security in the second level encryption we will differently types of periodic table properties like atomic no, mass no, IUPAC name, chemical formula, and their properties.
APA, Harvard, Vancouver, ISO, and other styles
45

Pushpendra, Tiwari. "A study and comparison of the various cryptography technique standards within fifteen factors." i-manager's Journal on Digital Forensics & Cyber Security 1, no. 1 (2023): 21. http://dx.doi.org/10.26634/jdf.1.1.19134.

Full text
Abstract:
This paper focuses on analyzing the performance of various encryption algorithms, namely RSA, ECC, and DSA, in terms of encrypting and decrypting sensitive data. Encryption is crucial for ensuring the security of data, and there are two types of encryption algorithms: Symmetric key and Asymmetric-key encryption. RSA is highly secure but has high computation time, whereas ECC provides equivalent security with lower computing power and battery usage. The study compares the implementation and analysis of DES, 3DES, AES, RSA, ECC, and DSA, highlighting their strengths and weaknesses. The paper aims to provide a comprehensive comparison of these cryptographic techniques, including their performances, to assist in selecting the most appropriate algorithm for specific applications.
APA, Harvard, Vancouver, ISO, and other styles
46

Irzayzah, Mr Samyrah M. Abu. "A New Application for Encryption and Decryption Using the TAS Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (November 30, 2023): 2428–44. http://dx.doi.org/10.22214/ijraset.2023.56928.

Full text
Abstract:
Abstract: Encryption is based on precise algorithms and specific mathematical operations it is indispensable for the security and safety of information and files that are of great importance in our lives. This paper discusses a new encryption and decryption technique, we used very powerful and complex encryption and decryption algorithms. Our study relies on encrypting the blocks according to the code writing style by making the encryption process for each individual block individually and does not depend on all the blocks that precede it in the message. We focus on sending several messages with different keys. These algorithms will have a high ability to maintain confidentiality and increase the security of information.
APA, Harvard, Vancouver, ISO, and other styles
47

Anurag, Sinha, and Kumar Bhadani Amrit. "Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table." Indian Journal of Data Communication and Networking (IJDCN) 1, no. 2 (April 10, 2021): 21–30. https://doi.org/10.54105/ijdcn.B5008.041221.

Full text
Abstract:
According to the present communication system one of the main concerns is secured transformation of data. In this paper we be inclined to propose a two-level encryption in this paper in the first level encryption we use the multiplicative ciphers and Cesar cipher in this level the plain text letters, we shall multiply the key numbers in this level and the second layer encryption we use periodic table exploitation the properties if the quality table, and thus use it for encrypting and decrypting in the same manners. For the information of network security in the second level encryption we will differently types of periodic table properties like atomic no, mass no, IUPAC name, chemical formula, and their properties.
APA, Harvard, Vancouver, ISO, and other styles
48

Kovalchuk, A. M., Yuriy Peleckh, and Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES." Measuring Equipment and Metrology 83, no. 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.

Full text
Abstract:
An image as a stochastic signal is one of the most common forms of information. Protecting images from unauthorized access and applying is a correspondingly urgent task. This causes the use of well-known classical encryption methods in the case of image encryption. But the image is a signal that possesses, in addition to typical informativeness, also visual informativeness. Informativeness for modern image processing methods makes it possible to ensure unauthorized access. Creating an attack on an encrypted image is possible in two ways: by traditional hacking of encryption methods, or by classical methods of visual image processing (filtering, highlighting contours, etc.). In this regard, one more requirement is put forward to encryption methods in the case of their application concerning images - this is the complete noise of the encrypted image. This is necessary so that the use of visual image processing methods becomes impossible. The RSA algorithm is one of the most widely known industrial standards for encrypting signals. Unlike symmetric encryption, in an open-key encryption scheme, it is impossible to calculate the decryption procedure, knowing the encryption procedure. Namely, the working time of the algorithm for calculating the decryption procedure is so great that it cannot be implemented on any modern computers, as well as on computers of the future. Such coding schemes are called asymmetric. Therefore, the urgent task is to implement the application of the RSA algorithm so that when encrypting an image: – the cryptographic stability of the RSA algorithm has not become worse; – the full image noise was achieved to prevent the use of visual image processing techniques. The algorithm of elements of the RSA algorithm, as the most resistant to unauthorized decryption of signals, and bitwise operations for a compatible combination during encryption and decryption of images is proposed by the authors. Encryption - decryption is performed without additional noise. The proposed algorithm is applied to images in which there are strictly extracted contours. Elements of the RSA algorithm are assigned to perform bitwise operations on the intensity values of pixels of a color image. The developed algorithm has higher cryptographic stability compared to the traditional RSA algorithm. The authors described the possibilities of using elements of the RSA algorithm in bitwise transformations when encrypting and decrypting images. The results of encryption simulation for cryptographic transformations of color images of a given dimension are presented. Modified models and algorithmic procedures of key formation processes of direct and inverse cryptographic transformations have been developed. They are reduced to elemental mathematical operations.
APA, Harvard, Vancouver, ISO, and other styles
49

Yu, Wanbo, and Hao Wang. "Analysis of trigonometric chaotic sequence by proposing an index-based bit level scrambling image encryption." Modern Physics Letters B 35, no. 24 (July 8, 2021): 2150406. http://dx.doi.org/10.1142/s0217984921504066.

Full text
Abstract:
Chaotic map is applied to numerous research fields, such as encryption of data and information. In this paper, a novel bit-level scrambling encryption based on three-dimensional trigonometric chaotic sequence is proposed. This encryption is operated on grayscale images because pixel value of which is between 0 and 255, which can be converted into 8-bit binary number, then each image can be converted into eight binary images. Combine binary images a three-dimensional matrix as input, which have three index values width, height, and page. Generate three numbers by the chaotic sequence to locate the value of the matrix need to be changed. After the value is located, change its value 0 to 1 or 1 to 0, this is the basic encryption scheme. This paper makes a three-dimensional binary matrix with 32 images to test the encryption scheme, and get average value of images’ number of pixel change rate at 0.9603, unified averaged change intensity at 31.27%, information entropy at 7.9891, also the histograms. And correlation coefficients of each pixel from three directions are small. There are comparisons with other encryptions too. The key space of this encryption is more than 10[Formula: see text].
APA, Harvard, Vancouver, ISO, and other styles
50

Li, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (February 21, 2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.

Full text
Abstract:
In the current era with the rapid development of the Internet, although a variety of technologies have offered convenience to people's lives, numerous problems have arisen regarding the security of individual and collective data, Problems such as data privacy leakage occur continuously. The content of this review is data privacy protection based on homomorphic encryption. Firstly, the basic principle and formula of homomorphic encryption are briefly introduced. Then, the homomorphic encryption-based data privacy protection approach is developed in response to the importance of safeguarding data privacy. In the case of partially homomorphic encryption, the article refers to such homomorphic encryptions as PPDM, STHE, and ECC. In fully homomorphic encryption, such as DBMS, HTM-FHE, and MKFHE, are mentioned. Under the current homomorphic encryption technology, the performance of data protection has witnessed a remarkable improvement; however, there exist numerous deficiencies. The majority of algorithms are relatively complex and consume a considerable number of resources. The aim of this review lies in facilitating readers' prompt comprehension of the existing technologies and development status in this domain, as well as the merits and demerits of current technologies.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography