Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel
نویسندگان
چکیده
An instance of the framework for cryptographic security enhancement symmetric-key encryption employing a dedicated error correction encoding is addressed. The main components proposal are: (i) coding and (ii) use simulator noisy channel. proposed designed binary erasure channel where at most one bit erased in each codeword byte. has been evaluated traditional scenario we consider advantage an attacker to correctly decide which two known messages given ciphertext corresponds. evaluation shows that provides reduction considered attacker’s comparison with initial setting. implementation complexity considered, it implies suitable trade-off between increased complexity.
منابع مشابه
An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security
This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for p...
متن کاملInteger Reconstruction Public-Key Encryption
In [AJPS17], Aggarwal, Joux, Prakash & Santha described an elegant public-key cryptosystem (AJPS-1) mimicking NTRU over the integers. This algorithm relies on the properties of Mersenne primes instead of polynomial rings. A later ePrint [BCGN17] by Beunardeau et al. revised AJPS-1’s initial security estimates. While lower than initially thought, the best known attack on AJPS-1 still seems to le...
متن کاملEnhanced Security System Using Symmetric Encryption and Visual Cryptography
With the rapid development of internet, transfer of data reliably and securely has become one of the challenges. In this paper we have introduced a novel visual cryptographic technique. This method is applicable for both Bitmap Color and Grayscale images. This method uses the concept of Residual Number System (RNS) based on Chinese Remainder Theorem (CRT) for share creation and share stacking o...
متن کاملAn Enhanced Code Encryption Approach with HNT Transformations for Software Security
Security threats such as viruses, worms, trojans and spyware affects the security and authentication of software codes, forcing software developers to build security schemes for better software protection. These software threats exploit the authenticated data of the software and confidentiality, integrity and accessibility is greatly affected by these software threats. A number of code security...
متن کاملBig-Key Symmetric Encryption: Resisting Key Exfiltration
This paper aims to move research in the bounded retrieval model (BRM) from theory to practice by considering symmetric (rather than public-key) encryption, giving efficient schemes, and providing security analyses with sharp, concrete bounds. The threat addressed is malware that aims to exfiltrate a user’s key. Our schemes aim to thwart this by using an enormously long key, yet paying for this ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Symmetry
سال: 2022
ISSN: ['0865-4824', '2226-1877']
DOI: https://doi.org/10.3390/sym14081709