• 제목/요약/키워드: confidentiality

검색결과 694건 처리시간 0.031초

Rounds Reduction and Blocks Controlling to Enhance the Performance of Standard Method of Data Cryptography

  • Abu-Faraj, Mua'ad M.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.648-656
    • /
    • 2021
  • Color digital images are used in many multimedia applications and in many vital applications. Some of these applications require excellent protection for these images because they are confidential or may contain confidential data. In this paper, a new method of data cryptography is introduced, tested, and implemented. It will be shown how this method will increase the security level and the throughput of the data cryptography process. The proposed method will use a secret image_key to generate necessary private keys for each byte of the data block. The proposed method will be compared with other standard methods of data cryptography to show how it will meet the requirements of excellent cryptography, by achieving the objectives: Confidentiality, Integrity, Non-repudiation, and Authentication.

A Secure Cloud Computing System by Using Encryption and Access Control Model

  • Mahmood, Ghassan Sabeeh;Huang, Dong Jun;Jaleel, Baidaa Abdulrahman
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.538-549
    • /
    • 2019
  • Cloud computing is the concept of providing information technology services on the Internet, such as software, hardware, networking, and storage. These services can be accessed anywhere at any time on a pay-per-use basis. However, storing data on servers is a challenging aspect of cloud computing. This paper utilizes cryptography and access control to ensure the confidentiality, integrity, and proper control of access to sensitive data. We propose a model that can protect data in cloud computing. Our model is designed by using an enhanced RSA encryption algorithm and a combination of role-based access control model with extensible access control markup language (XACML) to facilitate security and allow data access. This paper proposes a model that uses cryptography concepts to store data in cloud computing and allows data access through the access control model with minimum time and cost for encryption and decryption.

Mobile Network Issues regarding 5G Security (초연결 지능화 인프라 보안기술 동향 -5G 시대의 이동통신 보안 중심)

  • Park, J.G.;Kim, J.H.;Kim, I.K.;Jin, S.H.
    • Electronics and Telecommunications Trends
    • /
    • 제34권1호
    • /
    • pp.36-48
    • /
    • 2019
  • Recently, competition among global mobile operators has focused on the commercialization of 5G for the first time. Apart from protecting the privacy of subscribers and the confidentiality and integrity of communication, protecting the network against various cyber attacks is also important to ensure that high-quality mobile services operate safely. In this study, we examine the security vulnerabilities with respect to mobile communication environments using previous and current LTEs. We also investigate whether existing vulnerabilities can be effectively protected and identify security issues that need to be considered in the approaching 5G environment.

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.

Definition of Security Requirement in Encryption (암호화에서 보안 요건 정의)

  • Shin, Seong-Yoon;Kim, Chang-Ho;Jang, Dai-Hyun;Lee, Hyun Chang;Rhee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.187-188
    • /
    • 2014
  • Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption doesn't prevent hacking but it reduces the likelihood that the hacker will be able to read the data that is encrypted. Important information (data) information during transmission or storage of the confidentiality, integrity should be guaranteed. Encryption is one-way and two-way encryption is applied. The encryption key must be guaranteed safety.

  • PDF

Delay Factors in Building Construction Projects in Rwanda

  • Umuhoza, Esperance;An, Sung-Hoon
    • Journal of the Korea Institute of Building Construction
    • /
    • 제19권5호
    • /
    • pp.467-475
    • /
    • 2019
  • Delay is one of the most critical issues for construction projects and leads to huge losses in both developing and industrialized countries. The construction sector in Rwanda, a rapidly-developing nation, is no exception. Delays can be mitigated only once we have identify their primary causes, and these may not be the same in each region. This study aims to ascertain the main critical factors responsible for delays in building construction in Rwanda through an intensive literature review and questionnaire survey. A total of 40 delay causative factors were obtained from a literature review and were further classified into nine major categories. The questionnaire survey was distributed to about 80 respondents from clients, contractors, and consultants. From the list of 40 different factors, the top twelve most critical causes were identified as stoppage of work due to cash flow constraints, delay in approving design documents, confidentiality of physical plan, price fluctuations and delay in approving significant change, change orders, delay in performing inspections, Ineffective project planning, inadequate drawing details, unqualified labor, lack of materials on the market and dishonesty.

Jointly Unsigncryptable Signcryption Schemes (공동으로만 Unsigncrypt할 수 있는 Signcryption 기법)

  • 구재형;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제13권2호
    • /
    • pp.63-68
    • /
    • 2003
  • Signcryption has been proposed to provide authentication md confidentiality of a message efficiently. In the existing schemes, any recipient can unsigncrypt the signcrypted message alone. In this paper, we propose a (t,n)-threshold signcryption scheme in which at least t recipients must participate in an unsigncryption process.

Key Management Scheme for Providing the Confidentiality in Mobile Multicast (이동 멀티캐스트에서 기밀성을 제공하기 위한 키관리 방법)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제16권1호
    • /
    • pp.97-104
    • /
    • 2006
  • For successfully deploying many multicast service in the mobile environment, security infrastructures must be developed that manage the keys needed to provide access control to content. In this paper, we propose two methods for designing the key management scheme for the mobile multicast environment. The proposed schemes match the key management tree to the mobile multicast environment for localizing the delivery of he rekeying messages, reducing the communication costs, and solving the handoff problem in wireless region.

An Efficient Signcryption Scheme for Multi-Sending (다자전송 효율성을 가진 Signcryption 방식)

  • 김성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제10권3호
    • /
    • pp.63-68
    • /
    • 2000
  • Y. Zheng suggested a new concept called signcryption that provides confidentiality with digital signature properties. The signcryption scheme is more efficient than general method what we call first-sign-then-encrypt of first-encrypt-then-sign in computational and communicational cost. But H. Petersen et al pointed out weakness to Y. Zheng' scheme and suggested new one. In this paper we survey three signcryption schemes suggested by Y, Zheng and H. Petersen et al respectively and cryptanalysis. M. Michel's revised scheme. And we suggest a new signcryption is more efficient when originator makes several signcryption on the same document.

Implementation of Efficient GPKI for E-Government (전자정부 구현을 위한 효율적인 GPKI 구축 방안)

  • 장홍종;박인재;이정현
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제10권4호
    • /
    • pp.113-127
    • /
    • 2000
  • It is an essential prior condition that information security of all sorts of administration-information on line for E-Government. Every country including United Slates has been constructing and managing Government PKI(Public Key Infrastructure) of information security of one\`s own authentication, confidentiality, integrity, non-repudiation in administration environment on line for information security base construction of E-Government. In this paper, we present an efficient GPKI(Government PKI) implementation suitable for Korea actual circumstance through study and analysis of superior case such as United State.