The development of applications that can crack passwords or data that has been secured by cryptographic algorithms has made researchers try various ways to further secure the data they have. Even ...though the method used is quite modern, the algorithm for breaking ciphertext in cryptography can still be created. For this reason, in this study the authors develop cryptographic security by combining it with data compression. In this study, the algorithm used is the classic cryptographic algorithm, namely Caesar Cipher, combined with the Stout Codes compression algorithm. The results of the Caesar Cipher ciphertext are then compressed by applying the Stout Codes algorithm. From the test results using the Brute Force Atack model, the results are quite good, that the security of the encrypted data is quite good and not easily broken.
Abstrak- Penyeleksian calon mahasiswa baru dapat dilakukan dengan aplikasi Computer Based Test (CBT). Metode yang digunakan meliputi teknik pengumpulan data, analisis sistem, model perancangan, ...implementasi dan pengujian. Penelitian ini menghasilkan aplikasi CBT dimana soal yang dimunculkan dari bank soal melalui proses pengacakan dengan tidak akan memunculkan soal yang sama dengan menggunakan metoda Fisher-Yates Shuffle. Dalam proses pengamanan informasi soal saat terhubung ke jaringan maka diperlukan teknik untuk penyandian pesan agar soal tersebut sebeum dimunculkan melewati proses enkripsi dan deskripsi data terlebih dahulu maka digunakan algoritma kriptografi RSA. Metode perancangan perangkat lunak menggunakan model waterfall, perancangan database menggunakan entity relationship diagram, perancangan antarmuka menggunakan hypertext markup language (HTML) Cascading Style Sheet (CSS) dan jQuery serta diimplementasikan berbasis web dengan menggunakan bahasa pemrograman PHP dan database MySQL, Arsitektur jaringan yang digunakan aplikasi Computer Based Test adalah model jaringan client-server dengan jaringan Local Area Network (LAN). Kata kunci: Computer Based Test, Fisher-Yates Shuffle, Criptography, Local Area Network Abstract- Selection of new student candidates can be done with Computer Based Test (CBT) application. The methods used include data collection techniques, system analysis, design model, implementation and testing. This study produces a CBT application where the questions raised from the question bank through randomization process will not bring up the same problem using the Fisher-Yates Shuffle method. In the process of securing information about the problem when connected to the network it is necessary techniques for encoding the message so that the problem before appear through the process of encryption and description of data first then used RSA cryptography algorithm. Software design method using waterfall model, database design using entity relationship diagram, interface design using hypertext markup language (HTML) Cascading Style Sheet (CSS) and jQuery and implemented web-based using PHP programming language and MySQL database, Network architecture used application Computer Based Test is a client-server network model with a Local Area Network (LAN) network. Keywords: Computer Based Test, Fisher-Yates Shuffle, Criptography, Local Area Network
Chained Compressed Sensing for Iot Node Security Mangia, Mauro; Marchioni, Alex; Pareschi, Fabio ...
ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Conference Proceeding
Compressed sensing can be used to yield both compression and a limited form of security to the readings of sensors. This can be most useful when designing the low-resources sensor nodes that are the ...backbone of IoT applications. Here, we propose to use chaining of subsequent plaintexts to improve the robustness of CS-based encryption against ciphertext-only attacks, known-plaintext attacks and man-in-the-middle attacks.
El género epistolar constituye una fuente de información histórica de extraordinaria importancia tanto para la reconstrucción del complejo mundo de las mentalidades, como de la vida cotidiana y de la ...historia social en general. Analizamos aquí algunas de las «cartas mensajeras» redactadas en Panamá entre 1524-1525 por los propios conquistadores. Del mismo modo, damos a conocer la carta cifrada del tesorero de Honduras, Rodrigo del Castillo, (León (Nicaragua, 1527), denunciando los excesos de Diego López de Salcedo, gobernador de las Higueras y cabo de Honduras, al tiempo que reflexionamos sobre la importancia que el género criptográfico tuvo en la historia epistolar de las Indias.
The Admission selection of Politeknik Negeri Bengkalis through interest and talent search (PMDK), Joint Selection of admission test for state Polytechnics (SB-UMPN) and Independent (UM-Polbeng) were ...conducted by using paper-based Test (PBT). Paper Based Test model has some weaknesses. They are wasting too much paper, the leaking of the questios to the public, and data manipulation of the test result. This reasearch was Aimed to create a Computer-based Test (CBT) models by using Unified Modeling Language (UML) the which consists of Use Case diagrams, Activity diagram and sequence diagrams. During the designing process of the application, it is important to pay attention on the process of giving the password for the test questions before they were shown through encryption and description process. RSA cryptography algorithm was used in this process. Then, the questions shown in the questions banks were randomized by using the Fisher-Yates Shuffle method. The network architecture used in Computer Based test application was a client-server network models and Local Area Network (LAN). The result of the design was the Computer Based Test application for admission to the selection of Politeknik Negeri Bengkalis.
In this paper we present an “Electronic Identification Card” (EIC). This EIC is designed to provide a high degree of security for user authentication using biometrics, cryptography and steganography. ...The EIC encrypts the user's personal information as well as his fingerprint and then embed it in a photograph of the user's face. Two factors of authentication are used in the process: “something the user knows” and “something the user has”, in order to provide layers of security to shield the card. The EIC gives the flexibility to operate in database systems, storage media like chips for smart cards or digital passports. We also developed schemes to authenticate users through the EIC, like remote authentication by a Web interface and the authentication in a local machine.
Qubit authentication Curty, Marcos; Santos, David J.; Pérez, Esther ...
Physica A,
11/2002, Letnik:
314, Številka:
1
Journal Article
Recenzirano
Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties. ...Specifically, our objective is to determine whether one elementary quantum message (a qubit) can be authenticated with a quantum key of minimum length (another qubit). We show that this is not possible.
Innovative Authentication Method for IoT Devices Vasile, Daniel C.; Svasta, Paul M.
2019 22nd European Microelectronics and Packaging Conference & Exhibition (EMPC),
2019-Sept.
Conference Proceeding
This work provides an innovative method for a very important cryptographic function used in securing the communications in an IoT network: authenticating a device based on the identity obtained from ...a unique physical characteristic. An authentication procedure requires a secret key that is usually protected by an anti-tamper mechanism. IoT devices can use tamper detection circuits to protect secret data involved in cryptographic functions as: encryption, decryption, authentication, key exchange, etc. These functions are implemented in electronic security circuits. The tamper detection circuit is independently powered by a battery in order to permanently protect the secret data, even if the equipment is not supplied with power. This paper presents a solution to obtain a unique key from the probing process of the conductive mesh that protects the electronic security circuit.
blic Keys Schemes usually generate two pairs of keys that bear some mathematical relation-usually, a relation of the field known as Number Theory. Identifying a key from another that is given is a ...problem of great difficulty. This paper presents a public key scheme in wich such key identification is also a great difficulty problem-however, the mathematical problem does not fall under Number Theory; rather, it is one of Differential equations, the rules of Lie groups being the best solution. Even using Lie groups, a problem of great difficulty still remains. The first few examples use Maple 5.0, a symbolic processing program, and are available in an Internet site.
Differential power analysis (DPA) is a low cost method to extract secret information from supposedly secure cryptographic systems. DPA correlates the data processed with power consumption of the ...device through statistical analyses to unveil the secret key of the system. A common approach to counteract DPA is randomizing the data processing in order to misalign power consumption traces in time and amplitude domains using strategies such as random delay insertion and random clock frequency. The combination of strategies requires more computational effort for a successful DPA attack. This paper introduces the first steps toward a framework to compromise cryptographic systems that combine misalignment strategies to hide leakage information. The steps of the proposed framework are discussed in terms of computational efforts and successful attacks rate. The results obtained in an architecture prototyped on FPGA show that noise filtering can significantly improve the DPA success rate. Furthermore, clustering traces by frequency allow the improvement of the alignment step, thus increasing about 40 times the efficiency of the DPA attack to the cost of an increase of the computational efforts.