scholarly journals Developing an Application for Researching the RSA Algorithm Behavior on a Multithread Platform

TEM Journal ◽  
2020 ◽  
pp. 1364-1371
Author(s):  
Nina Sinyagina ◽  
Gergana Kalpachka ◽  
Velko Todorov ◽  
Ventsislav Kalpachki

The article is focused on issues concerning the design of all needed software for researching the speed of the RSA encryption algorithm executed on a multithreaded platform. The base structure of the application is described in detail as well as the testing plan and algorithm. Shown is a method to handle and control all threads during the processes of encryption and description. The final results are visualized graphically though diagrams.

2018 ◽  
Vol 7 (2) ◽  
pp. 260-265 ◽  
Author(s):  
Yulia Fatma ◽  
Harun Mukhtar ◽  
Muhammad Taufik

The internet network is growing rapidly and has a great impact on human life. The development of the internet network has enabled many people to exchange information or messages,one of tham by using email media. Apparently the internet is a path that in ni not too safe because it is a common communication media that can be used by everyone so prone to tapping information or messages. Therefore, security and confidentiality are needed in data communications. One may to keep messages safe is to use steganography technique. The steganography method used is the method of message insertion using BPCS (Bit Plane Complexity Segmentation). Before the message is inserted, the message is first encrypted using cryptography techniques. The cryptographic algorithm used is RSA algorithm. RSA algorithm consists of encryption algorithm and decryption algorithm. The confidential message is encrypted using RSA encryption algorithm and inserted using the insertion method of BPCS. With the technique of steganography on the image media then the delivery of a secret message will have a good level of security because it can not be detected directly by the senses of human vision. Keywords: cryptography, steganography, RSA, method BPCS   Abstrak Jaringan internet berkembang dengan pesat dan memberikan pengaruh besar bagi kehidupan manusia. Perkembangan jaringan Internet telah memungkinkan banyak orang untuk saling bertukar informasi atau pesan salah satunya dengan media email. Ternyata, internet merupakan jalur yang tidak terlalu aman karna merupakan media komunikasi umum yang dapat digunakan semua orang sehingga rawan penyadapan informasi atau pesan. Oleh karena itu, keamanan dan kerahasiaan sangat dibutuhkan dalam komunikasi data. Salah satu cara untuk menjaga keamanan pesan adalah menggunakan teknik steganografi. Metode steganografi yang digunakan adalah metode penyisipan pesan, dengan menggunakan metode BPCS (Bit Plane Complexity Segmentation). Sebelum pesan disisipkan terlebih dahulu pesan tersebut dienkripsi dengan menggunakan teknik kriptografi. Algoritma kriptografi yang digunakan adalah algoritma RSA. Algoritma RSA terdiri dari algoritma enkripsi dan algoritma dekripsi. Pesan rahasia disandikan menggunakan algoritma enkripsi RSA dan disisipkan menggunakan metode penyisipan BPCS. Dengan adanya teknik steganografi pada media citra maka pengiriman suatu pesan yang bersifat rahasia akan memiliki tingkat keamanan yang baik karena tidak dapat dideteksi langsung oleh indera penglihatan manusia. Keywords: Kriptografi, Steganogari, RSA, Metode BPCS


2020 ◽  
Vol 30 (15) ◽  
pp. 2050233
Author(s):  
Guodong Ye ◽  
Kaixin Jiao ◽  
Huishan Wu ◽  
Chen Pan ◽  
Xiaoling Huang

Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends on RSA algorithm. First, a pair of public and private keys is generated by RSA algorithm. Subsequently, a random message shown as plaintext key information is encrypted by the public key and RSA to achieve ciphertext key information. Next, a new transformation map is established to generate the initial key according to the ciphertext key information. Subsequently, the initial key is substituted into a fractional hyperchaotic system equation to calculate the keystream. Finally, permutation and diffusion operations are employed to encrypt a plain image to obtain the final cipher image. In the proposed algorithm, different keys for encryption and decryption are designed under an asymmetric architecture. The RSA algorithm and fractional chaotic system are combined to encrypt images; in particular, a fast algorithm for computing power multiplication is employed, which significantly improves the encryption effect and enhances the security. Simulation results show that the proposed algorithm is effective and applicable to image protection.


Cloud computing (CC) is the expertise over which every person is capable of sharing the reserves, amenities, and evidence amongst the individuals as a result of harnessing the internet in link. Subsequently, protection is a key concern on the facts pooled by means of the internet. In CC a numerous security issues prone to occur that includes confidentiality, integrity, authentication and/or thin well-honed edit control (TWHEC). In this research an innovative security replica has been aforethought. The design stipulates an approach across which secure communication besides data hiding from unauthorized punters can be got hold of. The security resolved with all categories of CC aspects similar to Platform as a Service (aaS), and Process aaS (PaaS), Software aaS, Storage aaS and Security aaS (SaaS), Network aaS (NaaS), Functions aaS (FaaS), Infrastructure aaS, Information aaS, and Integration aaS (IaaS), Database aaS (DBaaS), Application as a Service aaS and API aaS (AaaS), Management aaS (MaaS), Testing aaS (TaaS), etc., This anticipated system yield thin well-honed, mutable and ascendable statistics editing control by means of the manipulation of complex traits of Hierarchical (Ranked/Ordered) attribute-set-based encryption (HASBE). This multifarious qualities of blend of HASBE and Rivest–Shamir–Adleman (RSA) algorithm too. For instance, cyber individual healthiness record (IHR) aids sick persons to deal with his/her personal medicinal archives into a unified means that is to a great extent vital in storing, editing and partaking of the individual healthiness data. Further down encryption, it is impeding in accomplishing the TWHEC to CIHR data in an ascendable and effectual technique by using HASBE. Prevailing RSA encryption does not endow the data with high security in health. To fulfill ascendable, elastic, and thin well-honed edit control of subcontracted statistics in cloud. In this archetypal instigated a mish-mash RSA encryption with HASBE. Cyber IHR dispenses with patients to get along medical archives in a secure way, in which very significant concerns are the storing, access and distribution of individual wellness information. This composite process is responsible for three mode precautions, i.e. data precautions, certification and corroboration. In this report, the HASBE encryption algorithm has been put forward in realizing TWHEC to IHR data in an ascendable and effectual way


2021 ◽  
Vol 15 (03) ◽  
pp. 359-379
Author(s):  
Richa Varma ◽  
Chris Melville ◽  
Claudio Pinello ◽  
Tuhin Sahai

The secure command & control (C&C) of mobile agents arises in various settings including unmanned aerial vehicles, single pilot operations in commercial settings, and mobile robots to name a few. As more and more of these applications get integrated into aerospace and defense use cases, the security of the communication channel between the ground station and the mobile agent is of increasing importance. The development of quantum computing devices poses a unique threat to secure communications due to the vulnerability of asymmetric ciphers to Shor’s algorithm. Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with robotic operating system (ROS) and C&C of mobile agents, in general. We integrate these schemes in the application and network layers and study the performance of these methods by comparing them to present-day security schemes such as the widely used RSA algorithm.


2013 ◽  
Vol 683 ◽  
pp. 815-819
Author(s):  
Quan Su ◽  
Yi Yong Hu ◽  
Jun Yao

According to the characteristics and working environment of the unit and based on the result of the fault tree analysis made on a detection and control unit, it easily to reach the prime failure mode of the unit. Failure mode of the main environmental factors of the detection and control unit were analyzed, then the main synthesis stress which may affect the unit were ensured, so that the unit’s potential weak link as the main concern of the RET can be identified. A testing plan of the unit based on the theory of RET was designed.


2014 ◽  
pp. 119-122
Author(s):  
Mykola Karpinskyy ◽  
Yaroslav Kinakh

This article deals with the RSA encryption algorithm. Its safety is analyzed using the number field sieve method. The algorithm work results allow to define a define a secret key in a simple way.


Author(s):  
Zhang Zehui ◽  
Yao Fu ◽  
Tiegang Gao

Image encryption algorithms usually have two processes: permutation and diffusion. In order to enhance the performance of the permutation process, this study proposes a dynamic permutation method based on XOR operation and sorting. Combined with the hyper-chaotic system, SHA-256, the proposed permutation method and the simplified advanced encryption system (S-AES), a novel image encryption algorithm is presented in this paper. Firstly, the SHA-256 is used to generate initial condition values of the chaotic system and control parameters of the permutation method. Then, the chaotic system generates pseudo-random numbers, which are used in the permutation method and S-AES. Finally, the proposed permutation method and S-AES are used to encrypt the plain-image. In particular, parallel computing is used in this study to accelerate encryption speed. The results and analysis indicate that the proposed algorithm has excellent security to resist various typical attacks and fast encryption speed.


Author(s):  
R. R. Dils ◽  
P. S. Follansbee

Electric fields have been applied across oxides growing on a high temperature alloy and control of the oxidation of the material has been demonstrated. At present, three-fold increases in the oxidation rate have been measured in accelerating fields and the oxidation process has been completely stopped in a retarding field.The experiments have been conducted with an iron-base alloy, Pe 25Cr 5A1 0.1Y, although, in principle, any alloy capable of forming an adherent aluminum oxide layer during oxidation can be used. A specimen is polished and oxidized to produce a thin, uniform insulating layer on one surface. Three platinum electrodes are sputtered on the oxide surface and the specimen is reoxidized.


Sign in / Sign up

Export Citation Format

Share Document