IMPROVING SECURITY AND EFFICIENCY IN ATTRIBUTE BASED DATA SHARING NURUL SYAFIQAH BINTI JOHARI

Size: px
Start display at page:

Download "IMPROVING SECURITY AND EFFICIENCY IN ATTRIBUTE BASED DATA SHARING NURUL SYAFIQAH BINTI JOHARI"

Transcription

1 IMPROVING SECURITY AND EFFICIENCY IN ATTRIBUTE BASED DATA SHARING NURUL SYAFIQAH BINTI JOHARI BACHELOR OF COMPUTER SCIENCE (NETWORK SECURITY) UNIVERSITI SULTAN ZAINAL ABIDIN 2017

2 IMPROVING SECURITY AND EFFICIENCY IN ATTRIBUTE BASED DATA SHARING NURUL SYAFIQAH BINTI JOHARI Bachelor of Computer Science (Network Security) Faculty of Informatics and Computing Universiti Sultan Zainal Abidin, Terengganu, Malaysia MAY 2017

3 DECLARATION I hereby declare that this report is based on my original work except for quotations and citations, which have been duly acknowledged. I also declare that it has not been previously or concurrently submitted for any other degree at Universiti Sultan Zainal Abidin or other institutions. Name : Nurul Syafiqah Binti Johari Date :... i

4 CONFIRMATION This is to confirm that: The research conducted and the writing of this report was under my supervisor. Name : Dr Ahmad Nazari Bin Mohd Rose Date :... ii

5 DEDICATION Firstly and foremost praised to Allah, the most Merciful for giving bless and opportunity to undergo the final year project, Improving Security and Efficiency in Attribute Based Data Sharing. Besides, I would like to express my gratitude to my supervisor, Dr Ahmad Nazari Bin Mohd Rose for his full support, expert guidance, ideas, understanding, motivation and encouragement towards research of this project. I feel so proudly to be supervised by Dr Ahmad Nazari Bin Mohd Rose with his guidance and invaluable advices. Next, I would to thank to the Faculty of Informatics and Computing for giving me an opportunity to discover and explore new things as my final year project. Last but not least, I would to thank my family, all others lecturers and my fellow friends for helping me a lot of moral support in order to complete this final year project. I am very pleasure for their kindness and encouragement that make me able to endure all the hardship that I have face to complete this project. iii

6 ABSTRACT Nowadays, many people easily sharing data through network and computing technology using online external storages. The key generation center (KGC) can decrypt all cipher text addressed to specific users by generating their attribute keys. This can be a potential threat to the data privacy in the data sharing system. To overcome this problem, we improve the security in data sharing by attribute-based encryption (ABE) which is a cryptographic approach that achieves fine-grained data access control. Then, cipher text-policy attribute-based encryption (CP-ABE) scheme can encrypt the attribute and secure data sharing system. The advantage of (CP-ABE) is a major drawback which is known as a key escrow problem that can be solved by escrow-free key issuing protocol. The key issuing protocol can generate user secret key by use a secure two-party computation (2PC) protocol between the KGC and data storing center with their own master secrets. In conclusion, we can more secure and fine-grained data access control in the data sharing system by using (CP-ABE) scheme. The data confidentiality can be cryptographically applied against any KGC or data storing center in the scheme.. iv

7 ABSTRAK Pada masa kini, ramai orang dengan mudah berkongsi data melalui rangkaian dan teknologi pengkomputeran menggunakan penyimpanan luar talian. Key Generation Center (KGC) boleh menyahsulit semua cipher text yang ditujukan kepada pengguna tertentu dengan menjana kunci atribut mereka. Ini boleh menjadi satu ancaman kepada privasi data dalam sistem perkongsian data. Untuk mengatasi masalah ini, kita meningkatkan keselamatan dalam perkongsian data dengan Attribute-Based Encrypton (ABE) yang merupakan pendekatan kriptografi yang mencapai kawalan akses data halus. Kemudian, Cipher text Policy Attribute-Based Encryption (CP-ABE) boleh menyulitkan sifat dan sistem perkongsian data yang selamat. Kelebihan (CP-ABE) merupakan kelemahan utama yang dikenali sebagai masalah escrow utama yang boleh diselesaikan dengan protokol pengeluaran utama escrow bebas. Protokol pengeluaran utama boleh menjana pengguna kunci rahsia dengan menggunakan secure two-party computation (2PC) antara KGC dan data menyimpan pusat dengan rahsia tuan mereka sendiri. Kesimpulannya, kita boleh mengawal akses data lebih selamat dan halus dalam sistem perkongsian data dengan menggunakan (CP-ABE) skim. Kerahsiaan data boleh secara kriptografi digunakan terhadap mana-mana KGC atau data menyimpan pusat dalam skim ini. v

8 CONTENTS DECLARATION CONFIRMATION DEDICATION ABSTRACT ABSTRAK CONTENTS PAGE i ii iii iv v vi CHAPTER I INTRODUCTION 1.1 Background Problem statement Objectives Project Scopes Limitation of work 3 3 CHAPTER II LITERATURE REVIEW 2.1 Introduction Overview of Cipher text Policy Attribute-Based 4 Encryption 2.3 Elements of Cipher text Policy Attribute-Based 5 Encryption 2.4 RSA Cryptography 5 vi

9 2.5 Analysis of Existing Research Paper Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSN Cipher text-policy Attribute Based Data- Sharing with Enhanced Productivity and Security A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments Applied Attribute-based Encryption Scheme Cipher text Policy Attribute Based Encryption Using 2Party Computation Protocol Data Sharing Summary CHAPTER III METHODOLOGY Introduction Waterfall Model Requirement Gathering and Analysis System Design Implementation Testing Deployment of System Maintenance 3.3 Technique Used Why RSA Algorithm vii

10 How RSA Algorithm works How to Determine Suitable Value of e, d and n Diagram of Integration Data sharing with RSA Algorithm Framework of Project Process Model of Data Sharing Data Model of Data Sharing REFERENCES 23 viii

11 CHAPTER I INTRODUCTION 1.1 Background The data sharing model in distributed system such as online network have been increasing request for distributed data security. The problems that have been arising are the data by the storage server by outside users could be possible dangers to their data with using the key generation center (KGC). The KGC is defined the process of generating keys in cryptography. Furthermore, KGC can decrypt all messages or data with using their private keys. Thus, KGC is not suitable for data sharing because the owner want to make their private data that only can available to designated users key. [6] By using technique Cipher text Policy Attribute-Based Encryption (CP-ABE), the encrypted data can be kept private even if the storage server is untrusted but our techniques are secure against conspiracy attacks. The CP-ABE is enabling to encrypt the attribute set over a universe of attributes that a decrypt to possess in order to decrypt the cipher text and apply it. [9] 1

12 1.2 Problem Statement Security is an important thing in the data sharing. While the data are was sharing on the network because there are several problem where the data is not secure. The leakage of data may occur and intruders or attackers will steal or change the data. To prevent the leakage of the data owner s from intruders, attackers or unauthorized user; the data owner should provide access to large amount of consumer while also being able to efficiently cancel consumers from data access at any time. This project intends to solve the problem when data sharing occur and to prevent leakage of data happened through using Cipher text Policy Attribute-Based Encryption technique. 1.3 Objectives a) To design a system using CP-ABE b) To implement the encryption technique for data sharing using RSA algorithm c) To test and evaluate the successfulness of RSA algorithm in CP-ABE for data sharing 2

13 1.4 Project Scope This project is using JAVA language programming as a platform to develop this application. A user friendly Graphic User Interface (GUI) will be developed by using JAVA programming in NetBeans application. This interface will interact with user throughout the process. The data that want to share will be encrypted by using RSA algorithm. This project is mainly focused to protect data from other person in the network by encrypting it and will send it in the social networks. The authorized user that received the message will send the key request to the data owner. After receiving the key from sender only the message will be decrypted 1.5 Limitation of Work This project is about data sharing between two users in Attribute-Based Data Sharing using CP-ABE technique and RSA algorithm. This project cannot be applied on many users at the same time. As example, when User 1 want to share data to User 2 they can use the one public key and one private key at that time. Thus, when came new User 3 they need to request the new public key to share the data. 3

14 CHAPTER 2 LITERATURE REVIEW 2.1 Introduction The main objective of this project is to improve the security and efficiency in attribute-based data sharing. This chapter describes the previous research that related to on-going project. Furthermore, this chapter also describes the technique or method to be taken in the implementation of projects. There are similar published studies concerning about Cipher text-policy Attribute Based Encryption (CP-ABE) and Attribute Based Encryption. For this chapter, there are some reference such as journal article, internet and thesis. However, there are less likely of this study to be related to secure data sharing using RSA algorithm. 2.2 Overview of Cipher text Policy Attribute-Based Encryption Cipher text Policy Attribute-Based Encryption is a type of identity-based encryption that has one public key and master private key used to make more limited private keys. Moreover, the attributes in the CP-ABE are attached to the user secret key and access policy is attached to the cipher text. Thus, CP-ABE enables an encryption to define the attribute set over a universe of attributes that a decryption needs to possess in order to decrypt the cipher text and enforce it on the contents.[1] 4

15 2.3 Elements of Cipher text Policy Attribute-Based Encryption There are four fundamental algorithms to be executed in CP-ABE which are Setup, Keygen, Encrypt and Decrypt. Firstly, Setup algorithm takes no input other than implicit security parameter and the output is the public parameters PK and a master key MK. Secondly, Keygen algorithm. It is takes input as the master key MK and a set of attributes S as key. Then, it outputs is private key SK. Next, Encrypt (PK, M, A) takes the public parameters PK as input, M is a message and A is an access structure over the universe of attributes. Lastly, Decrypt algorithm (PK, CT, SK) is as an input in the public parameters PK, a CT cipher text which contain an access policy A and private key for a set S of attributes.[8] 2.4 RSA Cryptography The RSA Algorithm is named after Ron Rivest, Adi Shamir and Len Adleman that who designed it in The RSA is the most widely-used public key cryptography algorithm in the world. It can be used to encrypt message without need to exchange a secret key separately. Furthermore, the RSA algorithm can be used for both public key encryption and digital signatures. The public key cryptography is also known as an asymmetric cryptography that used two different but it is mathematically linked keys that contain one public and one private. Moreover, the RSA has provides a method the confidentiality, integrity, authenticity and non-reputability of data storage. [2] 5

16 2.5 Analysis of Existing Research Paper Secure Data Sharing and Retrieval Using Attribute Based Encryption in Cloud Based OSNs The outcome of this project is to allow data owners to outsource encrypted data to the OSNs (Online Social Networks) service provider for sharing and enables data disseminators to disseminate the data owner s by converting new access policy that based on using Cipher text Policy Attribute-Based Encryption (CP-ABE). Furthermore, the most access control in OSNs is achieved by requiring the users to manually maintain the Access Control List (ACL) which is inflexible and coarsegrained. This means the users can only choose that either publish their data to all users or grant authorities merely to their approved friends by manually maintaining ACL. Based on Attribute-Based Encryption (ABE), the users can get a set of attributes and the data owner can encrypt data with access policy. This will protect data from unauthorized users or malicious OSNs service provider. Data security is very important when sharing data thus the solution is encrypt data before sending it to OSNs service provider. Then, users in OSNs can share their private data based on Proxy re-encryption (PRE).[3] 6

17 2.5.2 Cipher text-policy Attribute based Data Sharing with Enhanced Productivity and Security Attribute Based Encryption (ABE) is a technique that is suitable for storing data with encryption. In this paper, the main objective is to improve the security data integrity. The benefits of using ABE are reduces the communicational overhead of the Internet. Furthermore, it is a fine grained access control. Thus, the major drawback is the Key Escrow problem that s means that can resolved by escrow free key issuing protocol which is constructed by using the secure two-party computation between the data centre and key generation centre. The proposed system in this project for system data becomes more secure when applied CP-ABE in data sharing system. Furthermore, in CP-ABE for users Key Generation Centre (KGC) will generates private keys by applying the KGC s master secret keys to users corresponding set of attributes. The benefits are it is much secured data transfer with advanced encryption technique so that other person cannot decrypt it easily. Then, the receiver can send multiple key requests to the data owner for the single data.[1] 7

18 2.5.3 A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments In Attribute-based Encryption schemes, the attributes play a very important role. The attribute is to generate a public key for encrypting data and used as an access policy to control user s access. The access policy can be categorized as either key-policy or cipher text-policy. The advantages of ABE schemes are to reduce the communication overhead the Internet and also to provide a fine-grained access control. In this project, the authors had survey a basic attribute-based encryption scheme, two various access policy attribute based encryption-based encryption schemes and two various access structures that are analyzed for cloud environments. Firstly, the Key-Policy Attributebased Encryption (KP-ABE) is proposed by Goyal in This scheme uses as set attributes to describe the encrypted data and builds an access policy in user s private key. Secondly, the Cipher text-policy Attribute-Based Encryption scheme by Bethencourt et al. in 2007 and the access policy in the encrypted data cipher text. The access control method is same as key-policy attributed-based encryption. In KP-ABE, the access policy is in user s private key while the access policy is switched to the encrypted data in CP-ABE. Thus, a set of descriptive attributes are related with the user private key and the access policy is built in the encrypted data. [7] 8

19 2.5.4 Applied Attribute-based Data Encryption Schemes The schemes of Attribute-based Encryption (ABE) became most popular including cipher text-policy and key-policy ABE. This article gives an overview about the existing implementations and elaborates on value in specific cloud computing and IoT application situations. There are many existing of cryptographic schemes that depend on the idea of a secret key which is a private key within symmetric or asymmetric cryptography. ABE is an asymmetric encryption schemes that means keys come in pairs such as one key encrypts and the other one is decrypt. It is also called as public key that use different keys for encryption and decryption. The important characteristic of ABE is the prevention of collusion attacks. There are two main options of ABE. Firstly, Cipher text-policy ABE (CP-ABE) that is Boolean formula is saved in the cipher text. The attributes that are needed is to satisfy policies are saved in a private key. Secondly, Key-Policy ABE (KP-ABE) which is the private keys that holds the formula and the cipher text saves attributes. In the IoT world, securing the data transfer is sometimes difficult. By applying ABE schemes, it will prove the security can be increase and have advantages such as grouping sensors that share a certain characteristics and can apply attributes to them for end-to-end encryption method are achievable. [6] 9

20 2.5.5 Cipher text Policy Attribute Based Encryption Using 2 Party Computation Protocol in Data Sharing Data sharing in distributed system such as in online social network that demands for distributed data security. In this paper, it is proposed a Cipher text Policy Attribute Based Encryption (CP-ABE) scheme for overcoming the key escrow problem by solved it with using the secure two-party computation protocol between key generation centre and data storing centre. Furthermore, the performance and security analyses show that this scheme is efficient to securely manage the data distributed in the data sharing system. The CP-ABE scheme is the most powerful cryptographic solution to the issue of updates access policy in a distributed data sharing system. In this paper, the author had proposed a 2 Party Computation Protocol that are completely removes the problem of key escrow. The key escrow was removed by 2 PC Protocol that are establishes two secret key components where is one from the KGC SK and another is from the data storing centre SK. [5] 10

21 2.6 Summary In a nutshell, the security for data sharing is very important to secure our data from being stolen from unauthorized user. A scheme to achieve more secure and fine grained data access control in the data sharing system, it is should to demonstrate the efficient and scalable to securely manage user data in the data sharing system.[4] 11

22 CHAPTER 3 METHODOLOGY 3.1 Introduction This chapter reports the model development of a comprehensive framework taken in a development system, application or implementation of study. The waterfall model has been used in this project because it is simple, suitable and easy to understand and use. In a waterfall model, each phase must be fully completed before the next phase can begin. This model phase does not overlap. Requirement gathering and analysis System design Implementation Testing Deployment of System Maintenance Figure 1: Waterfall Model 12

23 3.2 Waterfall Model This project used a sequential order and move to next step of development and testing if the previous steps is successfully which a waterfall model is shown in Figure 1. The waterfall model concept carried out in downward mechanism like water falls towards down. In waterfall model, when the first step is complete and next step has to start in development process. Thus, the waterfall model cannot revert back to the previous step to perform any change Requirement Gathering and Analysis In this phase, detailed requirement of the system to be developed are gathered. Then, analysed all the gather requirements whether the requirements are valid or invalid System Design In this phase, all the system design is analysed and specified such as system configuration and architecture of the system. Furthermore, it is contain framework and use case diagram Implementation In this phase, all the development works are achieved and development components are handed over to testing team Testing For testing phase, the testing team will test each component and make sure the developed components are working as expected. All the testing activities are performed in this phase. 13

24 3.2.5 Deployment of System Once the testing phase is completed and make sure there is no any kind of issue, then the project is ready to be deployed. Once the product is deployed to production the end users can start using the product Maintenance For keep the maintenance in a good condition, we must always keep eye on the product and provide all the necessary issues fix if occurs in production and get report by end users.. 14

25 3.3 Technique Used In this project, tools that have been used are latest NetBeans application to develop data sharing system using JAVA programming language. Furthermore, RSA algorithm is improved and integrate with the system that have been developed to make encryption and decryption process. RSA is an asymmetric cryptographic algorithm that means have two different keys. The asymmetric algorithms use different keys for encryption and decryption. Thus, it is important because they can used for transmitting encryption keys or other data securely even when the parties have no opportunity to agree on a secret key in private. The most important, RSA implements a public-key cryptosystem. Moreover, Cipher text Policy Attribute-Based Encryption much more flexible than plain identity-based encryption, it is allows complex rules specifying which private keys can decrypt which is cipher texts. Specifically, the private keys are associated with sets of attributes or labels, and when encrypt an access policy which specifies which keys will be able to decrypt. 15

26 3.4 Why RSA algorithms: RSA stands for Ron Rivest, Adi Shamir and Len Adleman, who first publicly described it in In this project, using RSA algorithm to encrypt the data to provide security so that only the concerned user can access it. By securing the data, we are not allowing unauthorized access to it. User data is encrypted first and then it is stored in the cloud. When it is required, user places a request for the data for the cloud provider. Then, cloud provider will authenticate the user and delivers the data. Furthermore, RSA is a block cipher in which every message is mapped to an integer. RSA consists of public key and private key. [5] In cloud environment, public key is recognized to all, whereas private key is recognized only to the user who originally has the data. Thus, encryption is done by the cloud service provider and decryption is done by the cloud user. Once the data is encrypted with the public key, it can be decrypted with the private key only. Moreover, the RSA algorithm has involves three operation where are key generation, encryption and decryption. [10] 1) Key Generation - The key generation algorithm takes the master key MK and a set of attributes S that describe the key as input. It delivers a private key SK as the output. 2) Encryption - The encryption algorithm consumes the public parameters PK, a message M, and an access structure A as input. The algorithm will encrypt M and produce a cipher text CT such that only a user that keeps a set of attributes that fulfills the access structure will be able to decrypt the message. 3) Decryption - The decryption algorithm takes the public parameters PK, a cipher text CT, and a private key SK, as input. Then, the algorithm will decrypt the cipher text and return a message M as output. 16

27 Key Generation Select p, q p, q both prime, p q Calculate n = p x q Calculate ɸ (n) = (p-1) x (q-1) Select integer e gcd (ɸ(n),e) = 1; 1 < e < ɸ (n) Calculate d Public key KU = {e, n} Private key KR = {d, n} Encryption Plaintext : M < n Cipher text : C = M e (mod n) Decryption Cipher text : C Plaintext : M = C d (mod n) Table 1 : Operation of RSA Algorithm 17

28 3.5 How RSA Algorithm works RSA is one of the first applied public-key cryptosystems and is widely used for secure data transmission. In a cryptosystem, the encryption key is public and varies from the decryption key which is kept secret. The RSA algorithm take advantage of on the fact that there is no efficient way to factor very large ( digit) numbers. Using an encryption key (e, n), the algorithm is as follows: 1. Represent the message as an integer between 0 and (n-1). Large messages can be broken up into a number of blocks. Each block would then be represented by an integer in the same range. 2. Encrypt the message by raising it to the e th power modulo n. The result is a cipher text message C. 3. To decrypt cipher text message C, raise it to another power d modulo n The encryption key (e, n) is made public. The decryption key (d, n) is kept private by the user How to Determine Suitable Values for e, d, and n 1. Choose two very large (100+ digit) prime numbers. Denote these numbers as p and q. 2. Set n equal to p * q. 3. Choose any large integer, d, such that GCD(d, ((p-1) * (q-1))) = 1 4. Find e such that e * d = 1 (mod ((p-1) * (q-1))) 18

29 3.6 Diagram of Integration Data Sharing with RSA Algorithm Figure 2: Integration of Data Sharing of RSA 19

30 3.7 Framework of project Data Cipher text Attribute Encryption using RSA algorithm Encrypted USER 1 Attribute Attribute Encryption Cipher text Encrypted Verification Attribute Access USER 2 Structure Decrypt using RSA algorithm Plaintext Figure 3: Framework 20

31 3.8 Process Model of Data Sharing Register Log In Share Data Upload View Data USER 1 USER 2 Encrypt Decrypt Download data Log Out Figure 4: Use Case Diagram Figure 4: Use Case Diagram 21

32 3.9 Data Model of Data Sharing user1 user2 +username +password +register () +log in () +share data () +encrypt data () +upload data () +view data () +log out () +username +password +register () +log in () +view data () +decrypt data () +download data () +log out () Figure 5: Class Diagram 22

33 REFERENCES [1] K. Patil and V. Chitre, Ciphertext-Policy Attribute based Data-Sharing with Enhanced Productivity and Security, vol. 4, no. 11, pp , [2] J. Jones, The RSA algorithm, ACM Commun. Comput. Algebr., no. June, pp. 1 11, [3] Q. Huang, Z. Ma, Y. Yang, J. Fu, and X. Niu, Secure data sharing and retrieval using attribute-based encryption in cloud-based OSNs, Chinese J. Electron., vol. 23, no. 3, pp , [4] M. Pratheepa and R. Bharathi, Improving Security and Efficiency in Attribute Based Data Sharing, vol. 3, no. 1, pp , [5] N. Y. Goshwe, Data Encryption and Decryption Using RSA Algorithm in a Network Environment, vol. 13, no. 7, pp. 9 13, [6] Junbeom Hur, "Improving Security and Efficiency in Attribute-Based Data Sharing," vol. 25, no. 10, [7] Cheng-Chi Lee, Pei Shan Chung and Min-Shiang Hwang, "A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments," vol. 15, no. 4, pp , [8] John Bethencourt, Amit Sahai and Brent Waters," Ciphertext-Policy Attribute- Based Encryption,"pp , [9] K.Gonnade and F.Zama, "Design Secure Sharing Protocol," vol. 4, no. 6, pp , [10] Matthew Pirretti, Pattrick Traynor, Pattrick Mcdaniel and Brent Waters, "Secure Attribute-Based System,"

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI A thesis submitted in partial fulfillment of the requirements for the award

More information

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Computer

More information

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN A thesis submitted in partial fulfillment of the requirements for the award of the degree of Master of Science

More information

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER UNIVERSITI TEKNOLOGI MALAYSIA i LOGICAL OPERATORS

More information

A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI

A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI A dissertation submitted in partial fulfillment of the requirements for the award of the degree of Master of Science (Information

More information

PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI

PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI i PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI A project report submitted in partial fulfillment of the Requirements for the award of

More information

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS

More information

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN A project report submitted in partial fulfilment of the requirements for the award of the degree of Master of Engineering (Civil-Structure)

More information

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle Noura Alomar November 7th, 2018 1 AoT The AoT paper is one of the earliest and most cited papers on IoT defense and it considers

More information

HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT

HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT UNIVERSITI TEKNOLOGI MALAYSIA HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM

More information

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED i SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED A project submitted in partial fulfillment of the requirements for the award of the degree of Master of

More information

A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA

A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA 1 A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA 4 A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER

More information

ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA

ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Engineering

More information

Lecture 6: Overview of Public-Key Cryptography and RSA

Lecture 6: Overview of Public-Key Cryptography and RSA 1 Lecture 6: Overview of Public-Key Cryptography and RSA Yuan Xue In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE A thesis submitted in fulfilment of the requirements for the award of the degree

More information

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM CHEONG WEI WEI UNIVERSITI TEKNOLOGI MALAYSIA IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT

More information

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH 4 IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH A thesis submitted in fulfilment of the requirements for the award of

More information

This item is protected by original copyright

This item is protected by original copyright A-PDF Merger DEMO : Purchase from www.a-pdf.com to remove the watermark MEDICAL FACILITIES DATABASE MANAGEMENT SYSTEM By MUHAMMAD FAIZAL BIN OSMAN Report submitted in partial fulfillment of the requirements

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Efficient Auditable Access Control Systems for Public Shared Cloud Storage Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,

More information

FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)

FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING) FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING) FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2015 i

More information

A Survey on Secure Sharing In Cloud Computing

A Survey on Secure Sharing In Cloud Computing A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing

More information

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG A project report submitted

More information

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions. SECTION B : 55 MARKS BAHAGIAN B : 55 MARKAH INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan berstruktur. Jawab

More information

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Introduction to Cryptography and Security Mechanisms. Abdul Hameed Introduction to Cryptography and Security Mechanisms Abdul Hameed http://informationtechnology.pk Before we start 3 Quiz 1 From a security perspective, rather than an efficiency perspective, which of the

More information

Public Key Encryption. Modified by: Dr. Ramzi Saifan

Public Key Encryption. Modified by: Dr. Ramzi Saifan Public Key Encryption Modified by: Dr. Ramzi Saifan Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime numbers are central to number

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Misconceptions Concerning Public-Key Encryption Public-key encryption is more secure from

More information

Public Key Cryptography

Public Key Cryptography graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,

More information

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE ABSTRACT We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority

More information

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK MOHD HUSAINI BIN MOHD FAUZI UNIVERSITI TEKNOLOGI MALAYSIA AUTOMATIC APPLICATION PROGRAMMING INTERFACE

More information

THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE

THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE SHAMSHIYATULBAQIYAH BINTI ABDUL WAHAB UNIVERSITI TEKNOLOGI MALAYSIA THE COMPARISON OF IMAGE MANIFOLD

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA

More information

Attribute-based encryption with encryption and decryption outsourcing

Attribute-based encryption with encryption and decryption outsourcing Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing

More information

Channel Coding and Cryptography Part II: Introduction to Cryptography

Channel Coding and Cryptography Part II: Introduction to Cryptography Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de

More information

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI A thesis submitted in fulfilment of the requirements for the award of the degree of Master ofengineering (Mechanical)

More information

MODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING

MODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING MODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor

More information

A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA

A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES

More information

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI A project report submitted in partial fulfillment of the requirements for the award of the degree of Master

More information

STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA

STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH)

More information

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI A project report submitted in partial fulfillment of the requirements

More information

MAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR

MAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR MAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR This report is submitted in partial fulfillment of the requirements for the award of Bachelor of Electronic Engineering (Computer Engineering)

More information

VHDL for RSA Public Key System

VHDL for RSA Public Key System VHDL for RSA Public Key System Rui He, Jie Gu, Liang Zhang, Cheng Li Engineering and Applied Science Memorial University of Newfoundland St. John s, NL, Canada, A1B3X5 E-mail: {ruihe, jiegu, lzhang, licheng}@engr.mun.ca

More information

MICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI

MICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI MICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI A project report submitted in partial fulfillment of the requirement for the award of the degree of Master of Engineering

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing ISSN No: 2454-9614 Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing *Corresponding Author: D. Vaduganathan E-mail:vaduganathan.kce@gmail.com D. Vaduganathan a a)

More information

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP A project report submitted in partial fulfilment of the requirements

More information

Public Key Cryptography and RSA

Public Key Cryptography and RSA Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange

More information

Public Key Algorithms

Public Key Algorithms Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular

More information

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United

More information

ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA

ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING

More information

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that

More information

COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI

COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI A dissertation submitted in partial fulfillment of the requirements for the award of

More information

Universiti Teknologi MARA. An Analysis on The Uses of Data Modeling in Database Application Development

Universiti Teknologi MARA. An Analysis on The Uses of Data Modeling in Database Application Development CAJ (yo&ao 3 ĕr^?^ Universiti Teknologi MARA An Analysis on The Uses of Data Modeling in Database Application Development Hafiza Binti Ahmad Thesis submitted in fulfillment of the requirements for Bachelor

More information

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

The Application of Elliptic Curves Cryptography in Embedded Systems

The Application of Elliptic Curves Cryptography in Embedded Systems The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography

More information

CAMERA CALIBRATION FOR UNMANNED AERIAL VEHICLE MAPPING AHMAD RAZALI BIN YUSOFF

CAMERA CALIBRATION FOR UNMANNED AERIAL VEHICLE MAPPING AHMAD RAZALI BIN YUSOFF CAMERA CALIBRATION FOR UNMANNED AERIAL VEHICLE MAPPING AHMAD RAZALI BIN YUSOFF A thesis submitted in fulfilment of the requirement for the award of the degree of Master of Science (Geomatic Engineering)

More information

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System) Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM Ms. S. P. Vidhya Priya 1, Dharani.N.R 2, Gokilavani.M 3, Jeevitha.R 4 1,2,3,4 Department of Information Technology, Kathir College

More information

Key Exchange. Secure Software Systems

Key Exchange. Secure Software Systems 1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?

More information

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,

More information

ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT

ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT ARDA YUNIANTA UNIVERSITI TEKNOLOGI MALAYSIA iii This thesis is dedicated to My Wife, who always give me full of

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm

Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm Princess Arleen S Zamora Gaduate Programs, Technological Institute of the Philippines Quezon City 1901, Philippines

More information

INFORM DEPARTURE AND ARRIVING OF BUSSES USING BLUETOOTH MOHD SUHKRI BIN YASRI

INFORM DEPARTURE AND ARRIVING OF BUSSES USING BLUETOOTH MOHD SUHKRI BIN YASRI INFORM DEPARTURE AND ARRIVING OF BUSSES USING BLUETOOTH By MOHD SUHKRI BIN YASRI Report submitted in partial fulfilment of the requirements for the degree of Bachelor of Engineering MARCH 2007 ACKNOWLEDGMENT

More information

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in

More information

AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE UNIVERSITI TEKNOLOGI MALAYSIA

AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE UNIVERSITI TEKNOLOGI MALAYSIA AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE UNIVERSITI TEKNOLOGI MALAYSIA AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE A project report submitted in partial fulfilment of the requirements

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of

More information

Signature :.~... Name of supervisor :.. ~NA.lf... l.?.~mk.. :... 4./qD F. Universiti Teknikal Malaysia Melaka

Signature :.~... Name of supervisor :.. ~NA.lf... l.?.~mk.. :... 4./qD F. Universiti Teknikal Malaysia Melaka "I hereby declare that I have read this thesis and in my opinion this thesis is sufficient in term of scope and quality for the reward of the Bachelor' s degree of Mechanical Engineering (Structure and

More information

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science) i SERVICE QUALITY OPTIMISATION SCHEME OF MOBILE VIDEO STREAM SERVICE HERMAN A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science) Faculty

More information

1.264 Lecture 28. Cryptography: Asymmetric keys

1.264 Lecture 28. Cryptography: Asymmetric keys 1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver

More information

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems

More information

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks The material in these slides mainly comes from the paper CloudSky: A Controllable Data Self-Destruction System

More information

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health

More information

Cloud Computing: Security Issues & Solution

Cloud Computing: Security Issues & Solution International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 6 (2017), pp. 1419-1429 Research India Publications http://www.ripublication.com Cloud Computing: Security

More information

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent

More information

IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD

IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD [1] [1] ISSN: 0976-3104 SPECIAL ISSUE: Emerging Technologies in Networking and Security (ETNS) Chandravathi et al. ARTICLE OPEN ACCESS IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL

More information

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,

More information

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4 EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review

More information

RSA (material drawn from Avi Kak Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto.

RSA (material drawn from Avi Kak Lecture 12, Lecture Notes on Computer and Network Security Used in asymmetric crypto. RSA (material drawn from Avi Kak (kak@purdue.edu) Lecture 12, Lecture Notes on "Computer and Network Security" Used in asymmetric crypto. protocols The RSA algorithm is based on the following property

More information

Secure Data Sharing in Cloud Computing: Challenges and Research Directions

Secure Data Sharing in Cloud Computing: Challenges and Research Directions Cyber Summer School Melbourne, 12-13 Feb 2018 Secure Data Sharing in Cloud Computing: Challenges and Research Directions Willy Susilo Institute of Cybersecurity and Cryptology School of Computing and Information

More information

RGB COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM DWT TECHNIQUE AND 4-BITS PLAN BY HISTOGRAM STRETCHING KARRAR ABDUL AMEER KADHIM

RGB COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM DWT TECHNIQUE AND 4-BITS PLAN BY HISTOGRAM STRETCHING KARRAR ABDUL AMEER KADHIM RGB COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM DWT TECHNIQUE AND 4-BITS PLAN BY HISTOGRAM STRETCHING KARRAR ABDUL AMEER KADHIM A dissertation submitted in partial fulfilment of the requirements

More information

A nice outline of the RSA algorithm and implementation can be found at:

A nice outline of the RSA algorithm and implementation can be found at: Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

BOARDING SCHOOL OUTING MANAGEMENT SYSTEM SITI NAZIRAH BINTI ABD HALIM

BOARDING SCHOOL OUTING MANAGEMENT SYSTEM SITI NAZIRAH BINTI ABD HALIM BOARDING SCHOOL OUTING MANAGEMENT SYSTEM SITI NAZIRAH BINTI ABD HALIM BACHELOR OF COMPUTER SCIENCE (SOFTWARE DEVELOPMENT) UNIVERSITI SULTAN ZAINAL ABIDIN 2018 DECLARATION I hereby declare that this report

More information

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography

More information

Applied Cryptography and Computer Security CSE 664 Spring 2018

Applied Cryptography and Computer Security CSE 664 Spring 2018 Applied Cryptography and Computer Security Lecture 13: Public-Key Cryptography and RSA Department of Computer Science and Engineering University at Buffalo 1 Public-Key Cryptography What we already know

More information

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography Ashok Kumar J 1, and Gopinath Ganapathy 2 1,2 School of Computer Science, Engineering and Applications

More information

SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN

SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN iii SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN A dissertation submitted in partial fulfillment of the requirements for the award

More information

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,

More information