Private Key Research Papers - Academia.edu (original) (raw)

The IETF standard Mobile IP protocol is modified with IP security (IPSec) primitives, which control the packet flow from a mobile host through multiple security gateways. In addition, IPSec uses strong cryptographic authentication and... more

The IETF standard Mobile IP protocol is modified with IP security (IPSec) primitives, which control the packet flow from a mobile host through multiple security gateways. In addition, IPSec uses strong cryptographic authentication and encryption algorithms to protect the integrity and ...

Usage Based Insurance (UBI) consists of schemes such as Pay As You Drive (PAYD) and Pay How You Drive (PHYD). In this paper, we detail the application of Blockchain in Usage Based Insurance schemes-PAYD and PHYD. Using Blockchain, we... more

Usage Based Insurance (UBI) consists of schemes such as Pay As You Drive (PAYD) and Pay How You Drive (PHYD). In this paper, we detail the application of Blockchain in Usage Based Insurance schemes-PAYD and PHYD. Using Blockchain, we propose an effective mechanism to store transaction data and also the condition of the vehicles. We also detail measuring these parameters to calculate premium amounts, create new insurance schemes and also a new market for used vehicle sale.

In current scenario everything is being transferred on the web and other communication medium. So that we need to make our data secure from all other attacker and unauthorized person. So that we have to give lot of protection to the... more

In current scenario everything is being transferred on the web and other communication medium. So that we need to make our data secure from all other attacker and unauthorized person. So that we have to give lot of protection to the transmitting data. For that we have lots of cryptography algorithm .But all of then do not provide level best protection in today‟s world as there are lots of ways to make that algorithm cracked and the cryptanalyst can retrieve the plain text so easily. So that with reference to the RSA and other famous algorithms as Diffie Hellman and N-prime RSA we have tried to give one more level of security by the use of Magic Rectangle. And by the use of Magic Rectangle we can have different cipher text for the same character. So by these many reasons this approach give enhancement to the public key cryptosystem. And Magic Rectangle have different approach that can unable to get the plain text without the knowledge of generation of Magic Rectangle.

In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs... more

In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs to the category of PKCS. The efficiency of a public key cryptographic system is mainly measured in computational overheads, key size and bandwidth. In particular, the RSA algorithm is used in many applications. Although the security of RSA is beyond doubt, the evolution in computing power has caused a growth in the necessary key length. The fact that most chips on smart cards cannot process keys extending 1024 bit shows that there is a need for alternative. NTRU is such an alternative and it is a collection of mathematical algorithms based on manipulating lists of very small integers and polynomials. This allows NTRU to achieve high speeds with the use of minimal computing power. NTRU is the first secure public key cryptosystem not based on factoriza...

– Voting is usually recognized as one of the main characteristics of Democracy. Electronic election is a very recent idea regarding voting. Voter, once given his vote, has to rely upon the election system’s honesty and security. Free and... more

– Voting is usually recognized as one of the main characteristics of Democracy. Electronic election is a very recent idea regarding voting. Voter, once given his vote, has to rely upon the election system’s honesty and security. Free and fairness of an election is desired by almost everyone associated with it. Hence designing an election system needs special care. Furthermore, an electronic election should be more secure, transparent and trustworthy, as common people have less faith in computers due to system crashes and hacking threats. In this paper, we are going to describe our implementation of an efficient and secured electronic voting system based on the Fujioka- Okamoto-Ohta protocol which is the most practical and suitable protocol for large scale elections. Our implementation contains the automation of an online voting system providing some features which were absent in the previous implementations. We have made our system even more user friendly and secured but faster than...

This paper concentrates on how the era of Crypto currency works and how it may have drastic effect on Indian economy. Crypto currency is not only gaining the pace but it has also entered into the small loops of Marketing, Social Media,... more

This paper concentrates on how the era of Crypto currency works and how it may have drastic effect on Indian economy. Crypto currency is not only gaining the pace but it has also entered into the small loops of Marketing, Social Media, Gaming and Professional Business. The Block chain method followed by the Crypto currency is not very prolix but it has proved to be the next generation technology already. This paper includes the detailed technology of Crypto currency and also describes the effect of the technology on Indian society especially the middle and poor level of the mass. A crypto currency is digital asset which proves to be an exchange medium. The crypto currencies tend to be implemented using technology called block chain. This technology allows transactions that use the crypto currency to occur in decentralized and distributed manner

The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online... more

The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, self-installed, cross platform reader located on the digital content file header. The proposed system provides the content owners' options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.

In this paper we introduce an approach which is more secure than original RSA algorithm, which is used for digital signatures and encryption in public key cryptography. This approach eliminates the need to transfer n, the product of two... more

In this paper we introduce an approach which is more secure than original RSA algorithm, which is used for digital signatures and encryption in public key cryptography. This approach eliminates the need to transfer n, the product of two random but essentially big prime numbers, in the public key due to which it becomes difficult for the intruder to guess the factors of n and hence the encrypted message remains safe from the hackers. Thus this approach provides a more secure path for transmission and reception of messages through public key cryptography.

The proliferation of smartphones and use of reliable cloud technologies have given rise to various cloud-based applications. Remote disease prediction based on real-time medical data is one such application that has become very popular... more

The proliferation of smartphones and use of reliable cloud technologies have given rise to various cloud-based applications. Remote disease prediction based on real-time medical data is one such application that has become very popular among research communities. One of the challenges involved here is the privacy of medical data storage on the cloud. Encrypted data requires decryption before it can be used by machine learning algorithms for disease prediction. This paper presents an analysis of research methods proposed to provide privacy of medical data on the cloud and their limitations.

Abstract: Cryptography is derived from a Greek word which means the art of protecting information by converting it into an unreadable format. In order to prevent some unwanted users or people to get access to the data cryptography is... more

Abstract: Cryptography is derived from a Greek word which means the art of protecting information by converting it into an unreadable format. In order to prevent some unwanted users or people to get access to the data cryptography is needed. This paper surveys various modifications approaches applied on standard RSA algorithm in order to enhance it. RSA provide more security as compare to other algorithm but the main disadvantage of RSA is its computation time, so many researchers applied various techniques to enhance the speed of an RSA algorithm by applying various logic and also apply some techniques which can be used for data integrity. This paper does the detailed study about such techniques and represents the summarized results.

Cloud computing environment provides on-demand access to shared resources that can be managed with minimal interaction of cloud service provider and validated service to the user. Cloud storage can be either public or private. Data in the... more

Cloud computing environment provides on-demand access to shared resources that can be managed with minimal interaction of cloud service provider and validated service to the user. Cloud storage can be either public or private. Data in the public storage can be viewed by all cloud users. The private data can be viewed by the authorized user only. This paper enhance the security of the cloud data using Advanced Encryption Standard (AES) encryption algorithm. Data owners are motivated to outsource their data in cloud servers for great convenience. Private data should be encrypted before outsourcing by using keys. Encryption is an important concept in cloud computing to maintain the database. Existing system maintained the database by providing password for files and documents. The proposed system provides keys to access the file and keys are maintained as private and keys are provided by the data owner. The paper focused ostrovsky scheme (private information retrieval) that allows a user to retrieve file without any information leakage. Experimental result are presented to test the security of AES algorithm and information leakage.

This paper investigates interoperability problems arising from the use of dissimilar key recovery mechanisms in encrypted communications. The components that can cause interoperability problems are identified and a protocol is proposed... more

This paper investigates interoperability problems arising from the use of dissimilar key recovery mechanisms in encrypted communications. The components that can cause interoperability problems are identified and a protocol is proposed where two communicating entities can negotiate the key recovery mechanism(s) to be used. The ultimate goal is to provide the entities a means to agree either on a mutually acceptable KRM or on different, yet interoperable, mechanisms of their choice.

In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs... more

In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs to the category of PKCS. The efficiency of a public key cryptographic system is mainly measured in computational overheads, key size and bandwidth. In particular, the RSA algorithm is used in many applications. Although the security of RSA is beyond doubt, the evolution in computing power has caused a growth in the necessary key length. The fact that most chips on smart cards cannot process keys extending 1024 bit shows that there is a need for alternative. NTRU is such an alternative and it is a collection of mathematical algorithms based on manipulating lists of very small integers and polynomials. This allows NTRU to achieve high speeds with the use of minimal computing power. NTRU is the first secure public key cryptosystem not based on factoriza...

The Mobile IP network environment for users is very vulnerable to malicious attacks, such as denial-of-service, man-in-the-middle, and other types of attacks. For protection, the IETF standard Mobile IP protocol is modified with IP... more

The Mobile IP network environment for users is very vulnerable to malicious attacks, such as denial-of-service, man-in-the-middle, and other types of attacks. For protection, the IETF standard Mobile IP protocol is modified with IP security (IPSec) primitives, which control the packet flow from a mobile host through multiple security gateways. In addition, IPSec uses strong cryptographic authentication and encryption algorithms to protect the integrity and confidentiality of IP traffic. In this paper, we proposed a key management algorithm for Mobile IP networks based on IPSec. The proposed scheme includes two parts: a wired network and a wireless network. In the wired network part, the proposed scheme produce two keys in each security gateway, transfers a packet with an encrypted key and receives a packet with a decrypted key. In the wireless network part, we use AH to arrive at wireless segment packet security. By the proposed scheme, we can enhance the security of Mobile IP netwo...

An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer S i signed message M i , where the n signers and n messages may all be distinct. The main motivation of aggregate signatures is... more

An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer S i signed message M i , where the n signers and n messages may all be distinct. The main motivation of aggregate signatures is compactness. However, while the aggregate signature itself may be compact, aggregate signature verification might require potentially lengthy additional information – namely, the (at most) n distinct signer public keys and the (at most) n distinct messages being signed. If the verifier must obtain and/or store this additional information, the primary benefit of aggregate signatures is largely negated. This paper initiates a line of research whose ultimate objective is to find a signature scheme in which the total information needed to verify is minimized. In particular, the verification information should preferably be as close as possible to the theoretical minimum: the complexity of describing which signer(s) signed what message(s). We move toward this objective by developing identity-based aggregate signature schemes. In our schemes, the verifier does not need to obtain and/or store various signer public keys to verify; instead, the verifier only needs a description of who signed what, along with two constant-length “tags”: the short aggregate signature and the single public key of a Private Key Generator. Our scheme is secure in the random oracle model under the computational Diffie-Hellman assumption over pairing-friendly groups against an adversary that chooses its messages and its target identities adaptively.

In this paper, a method for digital image watermarking is described that is resistant to geometric transformations. A private key, which allows a very large number of watermarks, determines the watermark, which is embedded on a ring in... more

In this paper, a method for digital image watermarking is described that is resistant to geometric transformations. A private key, which allows a very large number of watermarks, determines the watermark, which is embedded on a ring in the DFT domain. The watermark possesses circular symmetry. Correlation is used for watermark detection. The original image is not required in detection. The proposed method is resistant to JPEG compression, filtering, noise addition, scaling, translation, cropping, rotation, printing and rescanning. Experimental results prove the robustness of this method against the aforementioned attacks

Abstract- With the globalization in the e-commerce, where everything is digital and is done online, may it be online shopping, money transfer, e-banking, e-voting, e- registration, sending email, security is the main priority. Reliance on... more

Abstract- With the globalization in the e-commerce, where everything is digital and is done online, may it be online shopping, money transfer, e-banking, e-voting, e- registration, sending email, security is the main priority. Reliance on electronic communications makes information vulnerable to unauthorized users. Hence the users need confidentiality, message integrity, sender non-repudiation and sender and authentication. Public Key Infrastructure provides these services. And it ensure that public keys are public keys are securely, conveniently and efficiently are distributed. There are many types of PKI implementations. A X.509 certificate binds a name to public key value. The role of certificate is to associate a public key with the identity contained in the X.509 certificate. In this paper we are discussing the implementation of certificate X.509, how it is generated and stored in database and retrieved when required.

The Rivest Shamir Adleman (RSA) cryptosystem, named after its creators, is one of the most popular public key cryptosystems. It is most widely used for its strong security feature and easy implementation. The RSA cryptosystem has been... more

The Rivest Shamir Adleman (RSA) cryptosystem, named after its creators, is one of the most popular public key cryptosystems. It is most widely used for its strong security feature and easy implementation. The RSA cryptosystem has been utilized for many e-commerce applications, various forms of authentication, and virtual private networks in any organizations. The importance of high security and faster implementations paved the way for hardware implementations of the RSA algorithm. This work consists of describing a new approach to enhance RSA security. In this paper we will enhance the security feature by introducing an advance model called Triple RSA. Although RSA has not been attacked yet, it is still prone to attacks. So to enhance its security we have implemented triple RSA just like triple DES which is extremely secure. This model provides along with confidentiality, a strong authentication, data integrity, tamper detection and non repudiation.

The proliferation of smartphones and use of reliable cloud technologies have given rise to various cloud-based applications. Remote disease prediction based on real-time medical data is one such application that has become very popular... more

The proliferation of smartphones and use of reliable cloud technologies have given rise to various cloud-based applications. Remote disease prediction based on real-time medical data is one such application that has become very popular among research communities. One of the challenges involved here is the privacy of medical data storage on the cloud. Encrypted data requires decryption before it can be used by machine learning algorithms for disease prediction. This paper presents an analysis of research methods proposed to provide privacy of medical data on the cloud and their limitations.

There are various remote sensor organization (WSN) applications being created day to day. These applications range from straightforward natural checking, for example, gathering temperatures in an agrarian ranch to complex applications,... more

There are various remote sensor organization (WSN) applications being created day to day. These applications range from straightforward natural checking, for example, gathering temperatures in an agrarian ranch to complex applications, for example, observing front lines. As the applications increment so are the assaults. Subsequently, a few security conventions have been acquainted with be utilized with the various applications which have changing security necessities; this infers that the decision for the WSNs application ought to be very much thought of. This paper talks about the remote sensor organization security prerequisites, the most well-known assaults and the most mainstream conventions utilized with WSNs. Center is likewise given to the qualities and restrictions of WSN security conventions to empower planners of the WSNs pick the correct convention for their applications.

Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that cryptographic keys are kept absolutely se-cret. In general... more

Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that cryptographic keys are kept absolutely se-cret. In general this assumption is very difficult to guarantee ...