Nay Aung Aung - Academia.edu (original) (raw)

Nay Aung Aung

Uploads

Papers by Nay Aung Aung

Research paper thumbnail of Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems

Computer and network security system are needed to protect data during their transmissions and to... more Computer and network security system are needed to protect data during their transmissions and to guarantee that data are authentic. Cryptography is useful not only for proving data to be secure but also for ensuring that data have not altered. So, it is needed to implement the public key cryptosystem in computer and network security system. In cryptography, symmetric key cryptosystems are faster than public key asymmetric cryptosystems. But public key cryptosystems are more secure than symmetric key cryptosystems and widely used in computer and network security system. This describes the comparison of RSA Rivest, Shame, Adelman public key cryptosystem and ElGamal public key cryptosystem. RSA public key cryptosystem is faster than ElGamal in encryption and decryption. This paper also describes the encryption decryption time comparison of RSA and ElGamal. Kyaw Myo Thu | Kyaw Swar Hlaing | Nay Aung Aung "Time Performance Analysis of RSA and Elgamal Public-Key Cryptosystems" ...

Research paper thumbnail of Secure One Time Password OTP Generation for user Authentication in Cloud Environment

Cloud computing is one of today's most exciting technologies due to its ability to reduce cos... more Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. The major threat that the cloud is facing now is security. So, the user authentication is very important step in cloud environment. The traditional authentication user name and static password or PIN code can be easily broken by the skillful attacker. An Unauthorized user can easily enter into the system if he knows the user credentials. Encryption algorithms play a main role in information security systems. Efficient password generation for user authentication is an important problem in secure Cloud communications. In the paper, the One Time Password OTP approach is used to authenticate the cloud users. The generated OPT is encrypted by RSA public key encryption to be more secure for the cloud user authentication. So the third party is not required to generate OPT in the p...

Research paper thumbnail of Cloud Forensic Investigation using Digital Provenance Scheme

International Conference on Advances in Engineering and Technology (ICAET'2014) March 29-30, 2014 Singapore, Mar 29, 2014

In recent year, Cloud computing has become popular as a cost-effective and efficient computing pa... more In recent year, Cloud computing has become popular as a cost-effective and efficient computing paradigm. Many customers remain reluctant to move their business IT infrastructure completely to the Cloud. Cloud storage is increasingly being used by consumers, businesses, and government users to store growing amounts of data. One of the main concerns of customers is Cloud security and the threat of the unknown. However, criminals are embracing the opportunity to store illicit data in Cloud. There is a need for a sound digital forensic framework relating to the forensic analysis of client devices to identify potential data holdings. A key task of digital forensics is to prove the presence of a particular file in a given storage system and to track who is the past data possession. We propose the digital provenance based Cloud forensic framework in this paper. In this system, the evidences are created and collected according to the Cloud users and Service Provider actions using digital provenance scheme. The cryptographic and hash algorithms are used to be the reliable and trusted provenances at the evidence generation and verification. The aims of this are to help forensic examiners and to solve criminal cases in the Cloud environment.

Research paper thumbnail of Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems

Computer and network security system are needed to protect data during their transmissions and to... more Computer and network security system are needed to protect data during their transmissions and to guarantee that data are authentic. Cryptography is useful not only for proving data to be secure but also for ensuring that data have not altered. So, it is needed to implement the public key cryptosystem in computer and network security system. In cryptography, symmetric key cryptosystems are faster than public key asymmetric cryptosystems. But public key cryptosystems are more secure than symmetric key cryptosystems and widely used in computer and network security system. This describes the comparison of RSA Rivest, Shame, Adelman public key cryptosystem and ElGamal public key cryptosystem. RSA public key cryptosystem is faster than ElGamal in encryption and decryption. This paper also describes the encryption decryption time comparison of RSA and ElGamal. Kyaw Myo Thu | Kyaw Swar Hlaing | Nay Aung Aung "Time Performance Analysis of RSA and Elgamal Public-Key Cryptosystems" ...

Research paper thumbnail of Secure One Time Password OTP Generation for user Authentication in Cloud Environment

Cloud computing is one of today's most exciting technologies due to its ability to reduce cos... more Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. The major threat that the cloud is facing now is security. So, the user authentication is very important step in cloud environment. The traditional authentication user name and static password or PIN code can be easily broken by the skillful attacker. An Unauthorized user can easily enter into the system if he knows the user credentials. Encryption algorithms play a main role in information security systems. Efficient password generation for user authentication is an important problem in secure Cloud communications. In the paper, the One Time Password OTP approach is used to authenticate the cloud users. The generated OPT is encrypted by RSA public key encryption to be more secure for the cloud user authentication. So the third party is not required to generate OPT in the p...

Research paper thumbnail of Cloud Forensic Investigation using Digital Provenance Scheme

International Conference on Advances in Engineering and Technology (ICAET'2014) March 29-30, 2014 Singapore, Mar 29, 2014

In recent year, Cloud computing has become popular as a cost-effective and efficient computing pa... more In recent year, Cloud computing has become popular as a cost-effective and efficient computing paradigm. Many customers remain reluctant to move their business IT infrastructure completely to the Cloud. Cloud storage is increasingly being used by consumers, businesses, and government users to store growing amounts of data. One of the main concerns of customers is Cloud security and the threat of the unknown. However, criminals are embracing the opportunity to store illicit data in Cloud. There is a need for a sound digital forensic framework relating to the forensic analysis of client devices to identify potential data holdings. A key task of digital forensics is to prove the presence of a particular file in a given storage system and to track who is the past data possession. We propose the digital provenance based Cloud forensic framework in this paper. In this system, the evidences are created and collected according to the Cloud users and Service Provider actions using digital provenance scheme. The cryptographic and hash algorithms are used to be the reliable and trusted provenances at the evidence generation and verification. The aims of this are to help forensic examiners and to solve criminal cases in the Cloud environment.

Log In