Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-Time Multimedia Transmission

    Osama S. Younes1,2,*, Abdulmohsen Alharbi1, Ali Yasseen1, Faisal Alshareef1, Faisal Albalawi1, Umar A. Albalawi1,3

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2895-2920, 2023, DOI:10.32604/csse.2023.040162

    Abstract Due to their significant correlation and redundancy, conventional block cipher cryptosystems are not efficient in encrypting multimedia data. Stream ciphers based on Cellular Automata (CA) can provide a more effective solution. The CA have recently gained recognition as a robust cryptographic primitive, being used as pseudorandom number generators in hash functions, block ciphers and stream ciphers. CA have the ability to perform parallel transformations, resulting in high throughput performance. Additionally, they exhibit a natural tendency to resist fault attacks. Few stream cipher schemes based on CA have been proposed in the literature. Though, their encryption/decryption throughput is relatively low, which… More >

  • Open Access

    ARTICLE

    Enhanced Parallelized DNA-Coded Stream Cipher Based on Multiplayer Prisoners’ Dilemma

    Khaled M. Suwais*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2685-2704, 2023, DOI:10.32604/cmc.2023.036161

    Abstract Data encryption is essential in securing exchanged data between connected parties. Encryption is the process of transforming readable text into scrambled, unreadable text using secure keys. Stream ciphers are one type of an encryption algorithm that relies on only one key for decryption and as well as encryption. Many existing encryption algorithms are developed based on either a mathematical foundation or on other biological, social or physical behaviours. One technique is to utilise the behavioural aspects of game theory in a stream cipher. In this paper, we introduce an enhanced Deoxyribonucleic acid (DNA)-coded stream cipher based on an iterated n-player… More >

  • Open Access

    ARTICLE

    Graph-Based Replication and Two Factor Authentication in Cloud Computing

    S. Lavanya1,*, N. M. Saravanakumar2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2869-2883, 2023, DOI:10.32604/csse.2023.029040

    Abstract Many cutting-edge methods are now possible in real-time commercial settings and are growing in popularity on cloud platforms. By incorporating new, cutting-edge technologies to a larger extent without using more infrastructures, the information technology platform is anticipating a completely new level of development. The following concepts are proposed in this research paper: 1) A reliable authentication method Data replication that is optimised; graph-based data encryption and packing colouring in Redundant Array of Independent Disks (RAID) storage. At the data centre, data is encrypted using crypto keys called Key Streams. These keys are produced using the packing colouring method in the… More >

  • Open Access

    ARTICLE

    Stream Cipher Based on Game Theory and DNA Coding

    Khaled Suwais*

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1815-1834, 2022, DOI:10.32604/iasc.2022.025076

    Abstract Securing communication over public communication channels is one of the challenging issues in the field of cryptography and information security. A stream cipher is presented as an approach for securing exchanged data between different parties through encryption. The core of stream cipher relies on its keystream generator, that is responsible for generating random and secure keystream of encrypting streaming data. Thus, the security of the keystream is measured by its randomness and its resistance to statistical and cryptanalytic attacks. As there is always a trade-off between the security and performance while designing new cryptographic primitives, we introduce a game theory-based… More >

  • Open Access

    ARTICLE

    Design of Feedback Shift Register of Against Power Analysis Attack

    Yongbin Zhao1,*, XuYang1, RanranLi1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 517-527, 2019, DOI:10.32604/cmc.2019.03680

    Abstract Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks.… More >

Displaying 1-10 on page 1 of 5. Per Page