• فهرس المقالات decryption

      • حرية الوصول المقاله

        1 - Increase the accuracy and optimization of crypto security systems cryptography using GQC method
        abolfazl mostafaee S.Hossein Hosseini Nejad
        Nowadays, walking is considered as an efficient biometric feature for user authentication. Although there are some studies that address the task of securing gait patterns in gait-based authentication systems, but they do not take into account the low discrimination and أکثر
        Nowadays, walking is considered as an efficient biometric feature for user authentication. Although there are some studies that address the task of securing gait patterns in gait-based authentication systems, but they do not take into account the low discrimination and high diversity of gait data, which significantly affects the security and practicality of the proposed systems. In this article, we focus on addressing the above shortcomings in the inertial sensor-based gait system. In particular, we use linear discrimination analysis to increase the discrimination of gait patterns, and use the amount of gray code to extract a high, differential, and stable binary pattern. Experimental results on 38 different users showed that our proposed method significantly improves the performance and security of the gait encryption system. Specifically, we obtained a false acceptance rate of 6 × 10−5 (for example, 1 failurein 16983 experiments) and a false rejection rate of 9 2 with 148-bit security. تفاصيل المقالة
      • حرية الوصول المقاله

        2 - FPGA Can be Implemented Using Advanced Encryption Standard Algorithm
        Shahin Shafei
        This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make i أکثر
        This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and Inverse Mix columns module. As the S -box is implemented bylook-up-table in this design, the chip area and power can still be optimized. The new MixColumn transformation improves the performance of the inverse cipher and also reduces thecomplexity of the system that supports the inverse cipher. As a result this transformation hasrelatively low relevant diffusion power .This allows for scaling of the architecture towardsvulnerable portable and cost-sensitive communications devices in consumer and militaryapplications. تفاصيل المقالة
      • حرية الوصول المقاله

        3 - Audio Signal Encryption Based on Permutation Relations and Residue Number System
        Fereshteh Ghanbari Adivi Mohammad Mehrnia
        This paper presents a new audio encryption algorithm based on permutation and residue number system. In the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. Then, the audio signal is أکثر
        This paper presents a new audio encryption algorithm based on permutation and residue number system. In the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. Then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. For this purpose, the algorithm uses a predefined permutation format and a modular set in the form of {2n-1, 2n, 2n+1} to encrypt the main signal. Consequently, the proposed algorithm converts the input signal into a silence signal and increases its security. The signal-to-noise ratio (SNR) was used to evaluate the algorithm. The results indicated very low values of SNR pertaining to audio signals in the proposed method. تفاصيل المقالة
      • حرية الوصول المقاله

        4 - A Framework for Privacy and Security on Social Networks using Encryption Algorithms
        Hamideh Jashn Behnaz Mahipour Elaheh Moharamkhani Behrouz Zadmehr
        One of the most important technologies that has affected our lives today is cyberspace. On the other hand, one of the most important problems of social networks is the disclosure of users' information, i.e. the violation of their privacy. Therefore, protecting the priva أکثر
        One of the most important technologies that has affected our lives today is cyberspace. On the other hand, one of the most important problems of social networks is the disclosure of users' information, i.e. the violation of their privacy. Therefore, protecting the privacy of users is very important, so the use of encryption methods is an important tool in ensuring the privacy and security of shared data users. The proposed framework of this paper is based on AES and RSA algorithms. This framework is designed to be decentralized and takes advantage of the AES and RSA algorithms to provide a framework that prevents unauthorized entities from accessing users' data and messages. Any safe method must be designed in such a way that there is no escape route for attackers and unauthorized entities. Therefore, our focus is on two important parts of secure methods, namely key management and privacy, which the results of this article show, the security assessment proved that our proposed framework is designed to be completely safe and correct, and increased security and efficiency. تفاصيل المقالة