40-bit encryption
View article
SIT: A Lightweight Encryption Algorithm for Secure Internet of Things Open
The Internet of Things (IoT) being a promising technology of the future is\nexpected to connect billions of devices. The increased number of communication\nis expected to generate mountains of data and the security of data can be a\nthreat…
View article
Order-Revealing Encryption Open
In the last few years, there has been significant interest in developing methods to search over encrypted data. In the case of range queries, a simple solution is to encrypt the contents of the database using an order-preserving encryption…
View article
A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices Open
Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT) revolution. Large amounts of data are captured, processed and transmitted through the ne…
View article
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments Open
Currently, Internet of Things (IoT) as an essential infrastructure proposed for industries and different applications has been popularly applied to different domains, such as healthcare and smart farming, for helping people to do something…
View article
IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security Open
Wireless sensor networks (WSN) have problems such as limited power, weak computing power, poor communication ability, and vulnerability to attack. However, the existing encryption methods cannot effectively solve the above problems when ap…
View article
Analytical Study of Hybrid Techniques for Image Encryption and Decryption Open
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm …
View article
A Survey on the Cryptographic Encryption Algorithms Open
Security is the major concern when the sensitive information is stored and transferred across the internet where the information is no longer protected by physical boundaries. Cryptography is an essential, effective and efficient component…
View article
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding Open
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathematical model of the new chaotic system combines a sine map …
View article
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review Open
In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. Data security, integrity, and verific…
View article
A Content-Adaptive Joint Image Compression and Encryption Scheme Open
For joint image compression and encryption schemes, the encryption power and compression efficiency are commonly two contradictory things. In this paper, we propose a new joint image compression and encryption scheme based on a lossy JPEG …
View article
Modified Advanced Encryption Standard Algorithm for Information Security Open
The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that were aimed at securing information while using AES i…
View article
How to build time-lock encryption Open
Time-lock encryption is a method to encrypt a message such that it can only be decrypted after a certain deadline has passed. We propose a novel time-lock encryption scheme, whose main advantage over prior constructions is that even receiv…
View article
Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz Open
In recent years, experts and scholars in the field of information security have attached great importance to the security of image information. They have proposed many image encryption algorithms with higher security. In order to further i…
View article
AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection Open
Data security has a major role in the development of communication system, where more randomization in the secret keys increases the security as well as the complexity of the cryptography algorithms. In the recent years network security ha…
View article
FPGA implementation of a chaos-based image encryption algorithm Open
With the rapid development of communication networks and the establishment of 5G networks, there is a growing demand for the transmission of images and videos with different sizes and formats. Since these can contain sensitive and personal…
View article
End-to-End Encryption in Resource-Constrained IoT Device Open
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities. Ensuring the security, communication, and privacy protection of end-users is a major c…
View article
Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography Open
In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and managem…
View article
Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption Open
With the explosion of the generation, transmission and sharing of image data over the Internet and other unsecured networks, the need for and significance of the development of novel image encryption algorithms are unprecedented. In this r…
View article
Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective Open
With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video. Therefore, a secure method is needed to modify them…
View article
Chaotic Lightweight Cryptosystem for Image Encryption Open
Data transmission over the Internet and the personal network has been risen day by day due to the advancement of multimedia technology. Hence, it is today’s prime concern to protect the data from unauthorized access and encrypt the multime…
View article
A Selective Video Encryption Scheme Based on Coding Characteristics Open
The protection of video data has become a hot topic of research. Researchers have proposed a series of coding algorithms to ensure the safe and efficient transmission of video information. We propose an encryption scheme that can protect v…
View article
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data Open
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new col…
View article
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos Open
The issues of identity authentication and privacy protection of individuals in body area network (BAN) systems have raised much concern in past few years. To address the challenges of privacy protection in wireless BAN, an image encryption…
View article
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution Open
There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems. This m…
View article
Entropy-Based Block Scrambling Image Encryption Using DES Structure and Chaotic Systems Open
Traditional encryption algorithms are inefficient when applied to image encryption because image data have the characteristics of large data sizes and strong correlations between adjacent pixels. The shortcomings of the traditional Data en…
View article
Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting Open
Data security and privacy concerns are important issues in cloud storage. In this paper, we propose a verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. By employing van Dijk, Gentry…
View article
A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense Open
Unlike prior efforts in cybersecurity research, a dynamic defense theory, called moving target defense, increases the complexity and costs for attacks by effectively restricting the vulnerability exposure and the attack opportunities throu…
View article
Comparative Study of Different Cryptographic Algorithms Open
With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of data user can be mainta…
View article
Efficient time-oriented latency-based secure data encryption for cloud storage Open
To ensure data security in the cloud, there exist several techniques proposed by various researchers. The most common method is the usage of data encryption techniques like profile, rule, and attribute-based encryption techniques. However,…
View article
DES encryption and decryption algorithm implementation based on FPGA Open
Nowadays there is a lot of importance given to data security on the internet. The DES is one of the most preferred block cipher encryption/decryption procedures used at present. This paper presents a high throughput reconfigurable hardware…