Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm

    Yazeed Yasin Ghadi1, Mohammed S. Alshehri2, Sultan Almakdi2, Oumaima Saidani3,*, Nazik Alturki3, Fawad Masood4, Muhammad Shahbaz Khan5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 781-797, 2023, DOI:10.32604/cmc.2023.042777

    Abstract Securing digital image data is a key concern in today’s information-driven society. Effective encryption techniques are required to protect sensitive image data, with the Substitution-box (S-box) often playing a pivotal role in many symmetric encryption systems. This study introduces an innovative approach to creating S-boxes for encryption algorithms. The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme. The nonlinearity measure of the proposed S-boxes is 112. These qualities significantly enhance its resistance to common cryptographic attacks, ensuring high image data security. Furthermore, to assess the robustness of the S-boxes, an encryption system… More >

  • Open Access

    ARTICLE

    Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

    Musheer Ahmad1, Reem Ibrahim Alkanhel2,*, Naglaa F. Soliman2, Abeer D. Algarni2, Fathi E. Abd El-Samie3, Walid El-Shafai3,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2361-2380, 2023, DOI:10.32604/csse.2023.038439

    Abstract Patient privacy and data protection have been crucial concerns in E-healthcare systems for many years. In modern-day applications, patient data usually holds clinical imagery, records, and other medical details. Lately, the Internet of Medical Things (IoMT), equipped with cloud computing, has come out to be a beneficial paradigm in the healthcare field. However, the openness of networks and systems leads to security threats and illegal access. Therefore, reliable, fast, and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network. This paper… More >

  • Open Access

    ARTICLE

    A Novel Approach for Security Enhancement of Data Encryption Standard

    Dawood Shah1,*, Tariq Shah1, Sajjad Shaukat Jamal2, Mohammad Mazyad Hazzazi2, Amer Aljaedi3, Adel R. Alharbi3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5073-5086, 2023, DOI:10.32604/cmc.2023.020513

    Abstract Data Encryption Standard (DES) is a symmetric key cryptosystem that is applied in different cryptosystems of recent times. However, researchers found defects in the main assembling of the DES and declared it insecure against linear and differential cryptanalysis. In this paper, we have studied the faults and made improvements in their internal structure and get the new algorithm for Improved DES. The improvement is being made in the substitution step, which is the only nonlinear component of the algorithm. This alteration provided us with great outcomes and increase the strength of DES. Accordingly, a novel good quality S-box construction scheme… More >

  • Open Access

    ARTICLE

    Improved Video Steganography with Dual Cover Medium, DNA and Complex Frames

    Asma Sajjad1, Humaira Ashraf1, NZ Jhanjhi2,3,*, Mamoona Humayun4, Mehedi Masud5, Mohammed A. AlZain6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3881-3898, 2023, DOI:10.32604/cmc.2023.030197

    Abstract The most valuable resource on the planet is no longer oil, but data. The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value. In order to transmit sensitive information securely, researchers are combining robust cryptography and steganographic approaches. The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid (DNA) for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility. In the previous approach, DNA was used only for frame selection. If this DNA is compromised, then our frames with… More >

  • Open Access

    ARTICLE

    Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms

    Muhammad Fahad Khan1,2,*, Khalid Saleem1, Mohammed Alotaibi3, Mohammad Mazyad Hazzazi4, Eid Rehman2, Aaqif Afzaal Abbasi2, Muhammad Asif Gondal5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2679-2696, 2022, DOI:10.32604/cmc.2022.027655

    Abstract Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes. For the… More >

  • Open Access

    ARTICLE

    Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data

    Taek-Young Youn1, Nam-Su Jho2,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 151-164, 2022, DOI:10.32604/cmc.2022.026653

    Abstract

    Due to the development of 5G communication, many aspects of information technology (IT) services are changing. With the development of communication technologies such as 5G, it has become possible to provide IT services that were difficult to provide in the past. One of the services made possible through this change is cloud-based collaboration. In order to support secure collaboration over cloud, encryption technology to securely manage dynamic data is essential. However, since the existing encryption technology is not suitable for encryption of dynamic data, a new technology that can provide encryption for dynamic data is required for secure cloud-based collaboration.… More >

  • Open Access

    ARTICLE

    Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

    J. Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3,*, B. D. Parameshachari4, Celestine Iwendi5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 519-534, 2022, DOI:10.32604/cmc.2022.021269

    Abstract Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily… More >

  • Open Access

    ARTICLE

    IOTA-Based Data Encryption Storage and Retrieval Method

    Hongchao Ma1,*, Yi Man1, Xiao Xing2, Zihan Zhuo2, Mo Chen3

    Journal of Quantum Computing, Vol.3, No.3, pp. 97-105, 2021, DOI:10.32604/jqc.2021.016775

    Abstract At present, the traditional blockchain for data storage and retrieval reflects the characteristics of slow data uploading speed, high cost, and transparency, and there are a lot of corresponding problems, such as not supporting private data storage, large data operation costs, and not supporting Data field query. This paper proposes a method of data encryption storage and retrieval based on the IOTA distributed ledger, combined with the fast transaction processing speed and zero-value transactions of the IOTA blockchain, through the Masked Authenticated Messaging technology, so that the data is encrypted in the data stream. The form is stored in the… More >

  • Open Access

    ARTICLE

    Intelligent Chimp Metaheuristics Optimization with Data Encryption Protocol for WSN

    P. Manjula1,*, Dr. S. Baghavathi Priya2

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 573-587, 2022, DOI:10.32604/iasc.2022.020969

    Abstract Recent developments in low power electronic devices integrated into wireless communication technologies resulted in the domain of wireless sensor networks (WSN), which finds in applications in diverse data gathering and tracking applications. Since WSN is mostly deployed in harsh and inaccessible environments, it is necessary to design energy efficient and security solutions. The clustering technique is an effective way to lengthen the lifetime of WSN. But most of the clustering techniques elect cluster heads (CHs) irrespective of clusters. To resolve this issue, this paper presents a new intelligent metaheuristics based energy aware clustering with data encryption protocol (IMEAC-DEP) for WSN.… More >

  • Open Access

    ARTICLE

    Repeated Attribute Optimization for Big Data Encryption

    Abdalla Alameen*

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 53-64, 2022, DOI:10.32604/csse.2022.017597

    Abstract Big data denotes the variety, velocity, and massive volume of data. Existing databases are unsuitable to store big data owing to its high volume. Cloud computing is an optimal solution to process and store big data. However, the significant issue lies in handling access control and privacy, wherein the data should be encrypted and unauthorized user access must be restricted through efficient access control. Attribute-based encryption (ABE) permits users to encrypt and decrypt data. However, for the policy to work in practical scenarios, the attributes must be repeated. In the case of specific policies, it is not possible to avoid… More >

Displaying 1-10 on page 1 of 12. Per Page