2016 (415)
2015 (402)
2014 (223)
2013 (190)
2012 (106)
2011 (29)
2010 (20)
2009 (25)
2008 (40)
2007 (18)
Coherent Caesar Cipher for Resource Constrained Devices
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.327-336
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Today, cryptography is a cornerstone in the resource constrained networks and devices. Many modern cryptosystems make it very difficult but not impossible for an attacker to determine the decoding key. Even though the key might be eventually determined by a skilled decoder, given enough time and effort, cryptosystems can still provides ample security to protect valuable information. Among various encryption techniques, Caesar cipher is one of the oldest technique to encrypt the valuable information. But it gets easily cracked due to its simplicity of operation. In this paper, a new algorithm is proposed i.e. Coherent Caesar Cipher (CCC), which is found to be more consistent and reliable as compared to other existing caesar cipher algorithms. Performance of CCC and conventional techniques are tested using various NIST suggested randomness evaluation tests along with brute force attack analysis. The results were promising as the proposed technique produced more random results for various inputs and has the capability to withstand brute force attack for a longer duration.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.337-346
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study explores the differences of narcissistic customer financial investment in the bank's risk propensity and decision-making satisfaction. Studies have shown that overt narcissism customers have the higher degree of risk propensity. Investment professionals in overt narcissism and risk propensity between positive regulation effect is obvious, and overt narcissism and the degree of satisfaction with decision making is related; covert narcissism customer and risk propensity and decision-making satisfaction relationship is not significant and investment professionals in covert narcissism and risk propensity among regulatory role is not obvious. Covert narcissism and overt narcissism tendency and differences in risk decision satisfaction provide new ideas for the design and marketing of financial products.
A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.5 2016.05 pp.347-360
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Green and Ateniese introduced the notion of identity-based proxy re-encryption (IBPRE), whereby the proxy can covert a ciphertext encrypted under the delegator's identity to an encryption under the delegatee's identity of the same message. In some situations, biometric, such as dactylogram, was used as identities. However, these biometric identities will inherently have some noise when they are sampled each time. To make identity-based proxy re-encryption flexible on identities, we introduced a new primitive called fuzzy identity-based proxy re-encryption (FIB-PRE), in which an identity is viewed as a set of descriptive attributes. In a fuzzy identity-based proxy re-encryption scheme, an identity Wll can decrypt a ciphertext re-encrypted under another identity W, if and only if W and W l are close to each other as measured by the “set overlap” distance metric. In this work, we first formulate the security model of a FIB-PRE scheme. Finally, we present a construction of FIB-PRE and prove its CCA security under the decisional bilinear Diffie-Hellman (DBDH) assumption in the random model.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.