Hash Functions:
The hash functions are used to convert messages of variable length into fixed length. Two messages are identical only if the hash values are same.
Basic functioning of the ECC:
Two very large primes are selected first and multiplied to obtain the maximum value limit. Public key is selected as a random number between zero and maximum value. Using extended Euclidian algorithm a private key is generated for the public key.
Multiplying the selected number by itself (pub times) and rounding of the value based on maximum encrypts the message.To decrypt, the encrypted message is multiplied by itself priv key times (priv times).
IV. IBE-LITE SOLUTION
The examples discussed earlier make use of standard IBE which is not compatible with the sensor in a BSN. Solution for this is an IBE-Lite; a lightweight IBE that has the properties of standard IBE, and compatible with a BSN sensor is devised. The ability to use an arbitrary string to generate a public key, and the ability to create a public key separately from the corresponding secret key are few useful properties. IBE-Lite makes use of elliptic curve cryptography (ECC), a public key encryption system suitable for BSN [2].
To execute ECC, we need to derive a secret key x, and public parameters (P, y, p, q, h(.)). Table I shows the size of these parameters in bits. In this paper, we consider encrypting a message m using public key y as ECCEncrypt(m, y), and decrypting the cipher-text c generated by the ECCEncrypt using the secret key x using ECCDecrypt(c, x). Details for generating the parameters as well as ECCEncrypt and ECCDecrypt are described in the following text.
Fig. 1 IBE System
A. IBE-Lite
We derive the following IBE-Lite primitives, setup, keygen, en...
... middle of paper ...
... protected from the storage site since the storage site knows nothing important from the hints given.
V.SECURITY ANALYSIS
The basic primitives are initially analyzed, followed by an analysis of all the protocols.
Analysis of Basic Primitives
In the first we pick n secret and n corresponding public keys. Using one secret key andhashing output of the string function, the doctor is unable to determine the master secret X because there is a lot of x. When the doctor has access to n different secret keys, only then can he determine X.
The discrete logarithm property is not violated by usingxstr and ystr as the private key and public key derived from string str. It is difficult to determine x given y and P ,because they are a result of addition of points. Both Encrypt and Decrypt are well secure since both dependupon well-known ECC encryption and decryption methods.
Generally, the Pretty Good Privacy (PGP) program is all about cryptography, whereby the basic of it is encryption and decryption. Encryption is a process of encoding message, to the extent that the meaning of the message is not obvious or cannot be read ...
The RSA encryption is related to the cipher of Julius Caesar (1300s) that shifts three letters to encode messages. The cipher of Julius Caesar was used in war to send messages securely. Here is how Caesar encodes his message using the cipher. First Caesar assigned A through Z to 0 through 25. For instance A is zero. Second, add three to each numbers.
Biometric and encryption sounds are not too fresh, for most users, any of each technology alone is not enough to make you feel excitement. However, If we develop a new study or a new technology, which combine the biometrics and encryption. We can find that the technology combining these two techniques are very amazing.
..., Nicholas G. 2010. “Past, Present, and Future Methods of Cryptography and Data Encryption.” Department of Electrical and Computer Engineering
Asymmetric Encryption is used to protect the data while in movement. Asymmetric Encryption is also known as Public Key Encryption. It uses two related keys, a public key and a private key which is not shared with anyone. This pair of keys are developed by mathematical methods which can be solved in one direction. So anyone can encode a data using the public key but only the user with a private key can decode that specific data. The length of Asymmetric Key Encryption is normally 1024 or 2048 bits. However, in Asymmetric framework the keys with smaller than 2048bits are considered as not safe to use.
Lv, X., Li, H., Wang, B. (2012) Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks ISSN: 19390114
[5] Darrel Hankerson, Julio Lopez Hernandez and Alfred Menezes, “Software Implementation of Elliptic Curve Cryptography Over Binary Fields”, Cryptographic Hardware and Embedded Systems, 2000.
Decryption: Receiver collects all the interpolation points, retrieves the original message using the algorithm in fig2. Step 2 is used for constructing polynomial function is achieved by
Recent advances in wireless technology provide the security of blocking the attackers and also need to eliminate the attackers in the network. But in this paper providing the new technique to handle the attacker using an duplicated data as an backbone and also using dynamic key management in this system to providing the more security of the data’s in the wireless sensor network (WSN). So attackers are get confused to finds the original data’s. They don’t know the original data’s are safely send to the base station.
The length of the key for the encryption can vary from being very short to extremely long, and the length of the message being encrypted. The protection of data being transferred between ATMs and the bank, and the use of cell phones, is the most common everyday encounter with encryption. To encrypt and decrypt information, a cipher is used. In a cipher, there is a set of well-defined steps that can be followed to encrypt and decrypt messages.
As we mentioned before in this paper, electronic voting is a new way of voting, which brings many benefits to democratic sicieties. This procces exists in two ways: online and offline. In both cases election data are stored elecronically. With all the advantages that this way of voting offers, it still has many problems. The most importent problem that challenges this process is its security. Security of data, privacy of the voters and the accuracy of the vote are main aspects that have to be taken into consideration while building secure e-voting system.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
In simple terms, it's just a storage located remotely which you can access anywhere. It's like storing your files online and accessing it anywhere while using your laptop, mobile device or another PC.
The main MD5 message digest is represented as 16-byte (128-bits) Hexadecimal number ( written as 32 characters using the digits 0-9 and A-F or a-f ). This value can be found all over the internet. The checksum is a type of redundancy check that will verify the data in a number of ways. MD5 allows a string of unique letters and numbers to stand for data. MD5 can be used across all platforms making it universal. You can use it with windows, or any other operating system that you wish. I myself used it on Windows XP and it worked flawlessly.
In Today’s world, with the increasing popularity of several types of internet and communication technologies more information is transmitted over the network, due to which the security of the content being transmitted becomes one of the important issue which should be taken into consideration. The content being transmitted may be digital data, images, text, etc. So to prevent this digital data to be interfered and forged by unauthorized parties is one of the most critical demands in computer’ era. The sender on the network should have to take the security issues into consideration specially when transmitting the secret information before enjoying the services provided by the interne. So in order to provide security mechanism, the technique used is the cryptography. Cryptography is a art of protecting information by encrypting it into the unreadable format i.e. the cipher text. It is the technique of secure transmission in the presence of third parties and is employed in protecting integrity or secrecy of electronic messages by converting them into unreadable (cipher text) form More g...