首页 > 最新文献

2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)最新文献

英文 中文
A novel chaotic color image encryption / decryption based on triangular confusion 一种基于三角混淆的混沌彩色图像加解密算法
Ranjith Kumar R, Saranraj B
In this paper image encryption algorithm based on confusion and diffusion using dynamic key space is proposed. Confusion of pixels is done by triangular confusion, method proposed in this work and diffusion is done by values obtained from logistic map iterations. An internal key generator is used to generate the initial seeds for the overall encryption scheme proposed, with these initial seeds, logistic map generates pseudo random numbers which are then converted into Confusion order (CO) for confusion. Confusion order is applied to the blocks which have undergone triangular confusion. The diffusion bits (DFB) are generated in parallel using the logistic map and manipulated with pixels confused according to confusion order. The image pixels are iteratively confused and diffused with CO and DFB respectively to produce cipher image in minimum number of rounds. This work focuses on key generation using logistic and tent maps with iterative reconstruction to secure the image. Chaos based method provides a dynamic changes for confusion and diffusion architecture in the image encryption. A single bit change in the key will dramatically change the result in the internal key generation structure proposed. The simulation results confirm that the satisfactory level security is achieved in three rounds and the overall encryption time is saved.
本文提出了一种基于混沌和扩散的动态密钥空间图像加密算法。像素的混淆是通过本文提出的三角混淆方法来实现的,扩散是通过逻辑映射迭代得到的值来实现的。内部密钥生成器用于生成所提出的整个加密方案的初始种子,使用这些初始种子,逻辑映射生成伪随机数,然后将伪随机数转换为混淆顺序(CO)以进行混淆。混淆顺序适用于经历三角混淆的块。扩散位(DFB)是利用逻辑映射并行生成的,并根据混淆顺序对混淆像素进行处理。将图像像素分别与CO和DFB进行迭代混淆和扩散,以最小的轮数生成密码图像。这项工作的重点是使用迭代重建的逻辑和帐篷地图来生成密钥,以确保图像的安全。基于混沌的方法为图像加密中的混乱和扩散体系结构提供了动态变化。密钥中一个比特的变化将极大地改变所提出的内部密钥生成结构的结果。仿真结果表明,三次加密均达到了满意的安全性,节省了整体加密时间。
{"title":"A novel chaotic color image encryption / decryption based on triangular confusion","authors":"Ranjith Kumar R, Saranraj B","doi":"10.1109/ICECCE.2014.7086641","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086641","url":null,"abstract":"In this paper image encryption algorithm based on confusion and diffusion using dynamic key space is proposed. Confusion of pixels is done by triangular confusion, method proposed in this work and diffusion is done by values obtained from logistic map iterations. An internal key generator is used to generate the initial seeds for the overall encryption scheme proposed, with these initial seeds, logistic map generates pseudo random numbers which are then converted into Confusion order (CO) for confusion. Confusion order is applied to the blocks which have undergone triangular confusion. The diffusion bits (DFB) are generated in parallel using the logistic map and manipulated with pixels confused according to confusion order. The image pixels are iteratively confused and diffused with CO and DFB respectively to produce cipher image in minimum number of rounds. This work focuses on key generation using logistic and tent maps with iterative reconstruction to secure the image. Chaos based method provides a dynamic changes for confusion and diffusion architecture in the image encryption. A single bit change in the key will dramatically change the result in the internal key generation structure proposed. The simulation results confirm that the satisfactory level security is achieved in three rounds and the overall encryption time is saved.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131146976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modified low power STUMPS architecture 改进的低功耗STUMPS架构
M. Nayana, S. Yellampalli, G. Harish
BIST is one of the DFT techniques in which the test circuitry will be present along with the CUT. Different BIST architectures are proposed in order to reduce the area overhead, power overhead, test time and test costs. The STUMPS architecture is best suited for BIST environment in terms of area and power, but it requires external TPG and Compactor. This paper presents the modified low power STUMPS architecture which eliminates the need for external TPG, by modifying one of the scan chains to operate in both scan and TPG mode. The proposed architecture is tested by considering 16×16 multiplier as CUT and results shows that area overhead is reduced by 4.4 % when compared to STUMPS architecture.
BIST是一种DFT技术,其中测试电路将与CUT一起出现。为了减少面积、功耗、测试时间和测试成本,提出了不同的BIST架构。就面积和功耗而言,STUMPS体系结构最适合于BIST环境,但它需要外部TPG和compator。本文提出了一种改进的低功耗STUMPS架构,通过修改其中一条扫描链,使其在扫描和TPG模式下同时工作,从而消除了对外部TPG的需求。将16×16乘法器作为CUT对该架构进行了测试,结果表明,与STUMPS架构相比,该架构的面积开销减少了4.4%。
{"title":"Modified low power STUMPS architecture","authors":"M. Nayana, S. Yellampalli, G. Harish","doi":"10.1109/ICECCE.2014.7086631","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086631","url":null,"abstract":"BIST is one of the DFT techniques in which the test circuitry will be present along with the CUT. Different BIST architectures are proposed in order to reduce the area overhead, power overhead, test time and test costs. The STUMPS architecture is best suited for BIST environment in terms of area and power, but it requires external TPG and Compactor. This paper presents the modified low power STUMPS architecture which eliminates the need for external TPG, by modifying one of the scan chains to operate in both scan and TPG mode. The proposed architecture is tested by considering 16×16 multiplier as CUT and results shows that area overhead is reduced by 4.4 % when compared to STUMPS architecture.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122129639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reversible image watermarking using interpolation technique 利用插值技术进行可逆图像水印
K. Parasuraman, G. Deeparani
In this paper presents a novel reversible watermarking scheme. The proposed scheme use an interpolation technique to generate residual values named as interpolation error. Additionally apply the additive expansion to these interpolation-errors, this project achieve a highly efficient reversible watermarking scheme which can guarantee high image quality without sacrificing embedding capacity. The experimental results show the proposed reversible scheme provides a higher capacity and achieves better image quality for watermarked images. The computational cost of the proposed scheme is small.
提出了一种新的可逆水印方案。该方案采用插值技术生成插值误差残差。此外,对这些插值误差进行加性扩展,实现了一种高效的可逆水印方案,在不牺牲嵌入容量的前提下保证了高图像质量。实验结果表明,所提出的可逆方案对水印图像提供了更高的容量和更好的图像质量。该方案的计算量很小。
{"title":"Reversible image watermarking using interpolation technique","authors":"K. Parasuraman, G. Deeparani","doi":"10.1109/ICECCE.2014.7086658","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086658","url":null,"abstract":"In this paper presents a novel reversible watermarking scheme. The proposed scheme use an interpolation technique to generate residual values named as interpolation error. Additionally apply the additive expansion to these interpolation-errors, this project achieve a highly efficient reversible watermarking scheme which can guarantee high image quality without sacrificing embedding capacity. The experimental results show the proposed reversible scheme provides a higher capacity and achieves better image quality for watermarked images. The computational cost of the proposed scheme is small.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
Battery charging using induction motor's Slip power 使用感应电机的滑动电源为电池充电
V. Sailaja, E. R. Harshan, A. Voleti, B. Reddy
Mankind is facing major issues, power shortages is one among them. Instead of going for installations of new power houses substantial use of wastage power can reduce the intensity of the issue. Industries contribute major part of the load in any grid. There will be huge power losses in industrial applications. So, efficient installations of power recovery systems as a part of demand side management will reduce these power shortages to some extent. Almost all industries run on three phase Induction motor which is widely used. In Slip ring Induction motor, rotor terminals are available. Many speed control techniques have been developed because of this facility. One among them is Slip power recovery scheme in which the slip power is recovered and given back to supply. However, when the machine ratings are small to permit such an expensive and complex converters, it is more practicable to recover the slip energy and charge a small battery bank and use it for UPS to feed lighting other low power loads. This proposed work presents a model to use this slip power to charge a battery instead of giving it back to the supply. In this model the motor's rotor winding is connected to a rectifier via slip rings. Power from the rotor winding flows through the three phase rectifier to a switch-mode step up DC to DC converter to re-charge a bank of batteries. A dynamic model of the complete system is presented along with simulation results and hardware implementation.
人类正面临着重大问题,电力短缺是其中之一。而不是去安装新的发电厂大量使用废弃的电力可以减少问题的严重性。在任何电网中,工业都贡献了大部分负荷。在工业应用中会有巨大的功率损耗。因此,作为需求侧管理的一部分,高效安装电力回收系统将在一定程度上减少这些电力短缺。三相异步电动机的应用非常广泛,几乎所有的工业都离不开它。在滑环感应电动机,转子端子是可用的。许多速度控制技术已经发展,因为这个设施。其中一种是滑差功率恢复方案,该方案将滑差功率恢复并返回给电源。然而,当机器额定值小到允许使用如此昂贵和复杂的转换器时,回收滑差能量并为小型电池组充电并将其用于UPS为其他低功率负载供电更为可行。这项工作提出了一个模型,使用这种滑动电源给电池充电,而不是把它还给电源。在这个模型中,电机的转子绕组通过滑环连接到整流器上。来自转子绕组的电力通过三相整流器流向开关模式升压DC到DC转换器,为一组电池充电。给出了整个系统的动态模型,并给出了仿真结果和硬件实现。
{"title":"Battery charging using induction motor's Slip power","authors":"V. Sailaja, E. R. Harshan, A. Voleti, B. Reddy","doi":"10.1109/ICECCE.2014.7086657","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086657","url":null,"abstract":"Mankind is facing major issues, power shortages is one among them. Instead of going for installations of new power houses substantial use of wastage power can reduce the intensity of the issue. Industries contribute major part of the load in any grid. There will be huge power losses in industrial applications. So, efficient installations of power recovery systems as a part of demand side management will reduce these power shortages to some extent. Almost all industries run on three phase Induction motor which is widely used. In Slip ring Induction motor, rotor terminals are available. Many speed control techniques have been developed because of this facility. One among them is Slip power recovery scheme in which the slip power is recovered and given back to supply. However, when the machine ratings are small to permit such an expensive and complex converters, it is more practicable to recover the slip energy and charge a small battery bank and use it for UPS to feed lighting other low power loads. This proposed work presents a model to use this slip power to charge a battery instead of giving it back to the supply. In this model the motor's rotor winding is connected to a rectifier via slip rings. Power from the rotor winding flows through the three phase rectifier to a switch-mode step up DC to DC converter to re-charge a bank of batteries. A dynamic model of the complete system is presented along with simulation results and hardware implementation.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134544075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance comparison of GTS mechanism enabled IEEE 802.15.4 based Wireless Sensor Networks using LAR and DYMO protocol 使用LAR和DYMO协议实现基于IEEE 802.15.4的无线传感器网络的GTS机制性能比较
P. Samundiswary, R. Surender
Wireless Sensor Networks (WSNs) are an emerging field of engineering with various applications. The motivation is due to the low power and small size sensor nodes used in the network. It has started to emerge as the next generation wireless standard for Low-Rate Wireless Personal Area Networks (LRWPAN). The IEEE 802.15.4 standard is adopted as a communication protocol for LR-WPAN which supports low data rate, less power consumption and short transmission distance. IEEE 802.15.4 is the basis for the Zigbee enabled WSNs. IEEE and ZigBee alliance have joined hands to develop a complete specification of protocol stack for 802.15.4. The Guaranteed Time Slot (GTS) mechanism provided by IEEE 802.15.4 standard allocates specific time slots to all nodes in the network and makes communication more consistent. This consistency makes the network to enhance their performance. In this paper, the performance analysis of GTS mechanism enabled IEEE 802.15.4 based wireless sensor networks using various routing protocols is done by using QualNet. Performance metrics such as packet delivery ratio, delay and packets dropped of IEEE 802.15.4 based wireless sensor networks are analysed using Location Aided Routing (LAR) protocol. Then the performance metrics are then compared with that of DYnamic MANET On-Demand (DYMO) routing protocol.
无线传感器网络(WSNs)是一个新兴的工程领域,有着广泛的应用。其动机是由于在网络中使用的低功耗和小尺寸传感器节点。它已经开始成为低速率无线个人区域网络(LRWPAN)的下一代无线标准。LR-WPAN采用IEEE 802.15.4标准作为通信协议,具有数据速率低、功耗小、传输距离短等优点。IEEE 802.15.4是支持Zigbee的wsn的基础。IEEE和ZigBee联盟将携手开发802.15.4协议栈的完整规范。IEEE 802.15.4标准提供的GTS (Guaranteed Time Slot)机制为网络中的所有节点分配特定的时隙,使通信更加一致。这种一致性使得网络的性能得到提升。本文利用QualNet对基于GTS机制的IEEE 802.15.4无线传感器网络在不同路由协议下的性能进行了分析。利用定位辅助路由(Location Aided Routing, LAR)协议,分析了基于IEEE 802.15.4的无线传感器网络的数据包传送率、延迟和丢包等性能指标。然后将其性能指标与DYMO (DYnamic MANET On-Demand)路由协议进行了比较。
{"title":"Performance comparison of GTS mechanism enabled IEEE 802.15.4 based Wireless Sensor Networks using LAR and DYMO protocol","authors":"P. Samundiswary, R. Surender","doi":"10.1109/ICECCE.2014.7086622","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086622","url":null,"abstract":"Wireless Sensor Networks (WSNs) are an emerging field of engineering with various applications. The motivation is due to the low power and small size sensor nodes used in the network. It has started to emerge as the next generation wireless standard for Low-Rate Wireless Personal Area Networks (LRWPAN). The IEEE 802.15.4 standard is adopted as a communication protocol for LR-WPAN which supports low data rate, less power consumption and short transmission distance. IEEE 802.15.4 is the basis for the Zigbee enabled WSNs. IEEE and ZigBee alliance have joined hands to develop a complete specification of protocol stack for 802.15.4. The Guaranteed Time Slot (GTS) mechanism provided by IEEE 802.15.4 standard allocates specific time slots to all nodes in the network and makes communication more consistent. This consistency makes the network to enhance their performance. In this paper, the performance analysis of GTS mechanism enabled IEEE 802.15.4 based wireless sensor networks using various routing protocols is done by using QualNet. Performance metrics such as packet delivery ratio, delay and packets dropped of IEEE 802.15.4 based wireless sensor networks are analysed using Location Aided Routing (LAR) protocol. Then the performance metrics are then compared with that of DYnamic MANET On-Demand (DYMO) routing protocol.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114065066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient VLSI architecture for FIR filter using DA-RNS 采用DA-RNS的FIR滤波器的高效VLSI结构
R. Kamal, P. Chandravanshi, N. Jain, Rajkumar
In this paper, an efficient multiplier less finite impulse response (FIR) filter architecture based on distributed arithmetic (DA) using high speed residue number system (RNS) is presented. The proposed architecture uses RNS and parallel DA to increase the speed of the system. The proposed architecture is coded in VHDL and synthesized using Synopsys Design Compiler using SAED 90nm CMOS library to calculate area and delay. Synthesis results show that, the proposed structure using DA-RNS has 77.93% less area-delay-product (ADP) than the design proposed by Chan Hua Vun.
提出了一种基于高速剩余数系统(RNS)的高效无乘法器有限脉冲响应(FIR)滤波器结构。该架构采用RNS和并行数据处理来提高系统的运行速度。该架构采用VHDL编码,并使用Synopsys设计编译器合成,采用SAED 90nm CMOS库计算面积和延迟。综合结果表明,采用DA-RNS设计的结构比陈华云设计的结构面积延迟积(ADP)降低77.93%。
{"title":"Efficient VLSI architecture for FIR filter using DA-RNS","authors":"R. Kamal, P. Chandravanshi, N. Jain, Rajkumar","doi":"10.1109/ICECCE.2014.7086656","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086656","url":null,"abstract":"In this paper, an efficient multiplier less finite impulse response (FIR) filter architecture based on distributed arithmetic (DA) using high speed residue number system (RNS) is presented. The proposed architecture uses RNS and parallel DA to increase the speed of the system. The proposed architecture is coded in VHDL and synthesized using Synopsys Design Compiler using SAED 90nm CMOS library to calculate area and delay. Synthesis results show that, the proposed structure using DA-RNS has 77.93% less area-delay-product (ADP) than the design proposed by Chan Hua Vun.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131645011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Investigations on Classification Algorithms for Intrusion Detection System in MANETS MANETS入侵检测系统分类算法研究
K. Anusha, D. Ezhilmaran
Intrusion Detection System is software based monitoring mechanism for a computer network that detects presence of malevolent activity in the network. Intrusion detection is an eminent upcoming area in relevance as more and more complex data is being stored and processed in networked systems. This paper focuses on investigations of well-known machine learning techniques to address the security issues in the MANET networks which are used for detection and classification of attacks: Intuitionistic fuzzy, genetic algorithm RVM (Relevance Vector Machine), and neural network algorithm. Machine Learning techniques can learn normal and anomalous patterns from training data and generate classifiers that then are used to detect attacks on computer systems. The selected attributes were applied to Data Mining Classification Algorithms which helps in bringing out the best and effective Algorithm by making use of the error rates, false positive and packet drop rates.
入侵检测系统是一种基于软件的计算机网络监控机制,用于检测网络中是否存在恶意活动。随着网络系统中存储和处理的数据越来越复杂,入侵检测是一个新兴的相关领域。本文重点研究了著名的机器学习技术,以解决用于检测和分类攻击的MANET网络中的安全问题:直觉模糊,遗传算法RVM(相关向量机)和神经网络算法。机器学习技术可以从训练数据中学习正常和异常模式,并生成分类器,然后用于检测对计算机系统的攻击。将选择的属性应用到数据挖掘分类算法中,利用错误率、误报率和丢包率,得出最优、最有效的算法。
{"title":"Investigations on Classification Algorithms for Intrusion Detection System in MANETS","authors":"K. Anusha, D. Ezhilmaran","doi":"10.1109/ICECCE.2014.7086615","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086615","url":null,"abstract":"Intrusion Detection System is software based monitoring mechanism for a computer network that detects presence of malevolent activity in the network. Intrusion detection is an eminent upcoming area in relevance as more and more complex data is being stored and processed in networked systems. This paper focuses on investigations of well-known machine learning techniques to address the security issues in the MANET networks which are used for detection and classification of attacks: Intuitionistic fuzzy, genetic algorithm RVM (Relevance Vector Machine), and neural network algorithm. Machine Learning techniques can learn normal and anomalous patterns from training data and generate classifiers that then are used to detect attacks on computer systems. The selected attributes were applied to Data Mining Classification Algorithms which helps in bringing out the best and effective Algorithm by making use of the error rates, false positive and packet drop rates.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":" 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132041794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comparative survey of Symmetric and Asymmetric Key Cryptography 对称与非对称密钥加密的比较研究
Sourabh Chandra, Smita Paira, S. S. Alam, G. Sanyal
Network security is an important aspect of information sharing. Attempts have been made to remove various insecurities over internet. For this, many technological implementations and security policies have been developed. The amount of data, transferred, is not a factor. The basic factor is, how much security, the channel provides while transmitting data. Cryptography is one such technique, which allows secure data transmission without losing its confidentiality and integrity. Based on the key distribution, cryptography is further classified into two major types-Symmetric Key Cryptography and Asymmetric Key Cryptography. In this paper, we have surveyed the traditional algorithms, along with the proposed algorithms based on their pros and cons, related to Symmetric and Asymmetric Key Cryptography. We have also compared the importance of both these cryptographic techniques. The proposed algorithms proved to be highly efficient in their respective grounds but there are certain areas that remained open, related to these algorithms, and have not yet been thoroughly discussed. This paper also presents an appropriate future scope related to these open fields.
网络安全是信息共享的一个重要方面。人们试图消除对互联网的各种不安全感。为此,开发了许多技术实现和安全策略。传输的数据量不是一个因素。最基本的因素是,信道在传输数据时提供了多少安全性。密码学就是这样一种技术,它允许安全的数据传输而不会失去其机密性和完整性。根据密钥的分布,密码学可以进一步分为对称密钥密码学和非对称密钥密码学两大类。在本文中,我们调查了与对称和非对称密钥加密相关的传统算法,以及基于它们的优缺点提出的算法。我们还比较了这两种加密技术的重要性。所提出的算法在各自的基础上被证明是高效的,但与这些算法相关的某些领域仍然是开放的,并且尚未得到彻底的讨论。本文还提出了与这些开放领域相关的适当的未来范围。
{"title":"A comparative survey of Symmetric and Asymmetric Key Cryptography","authors":"Sourabh Chandra, Smita Paira, S. S. Alam, G. Sanyal","doi":"10.1109/ICECCE.2014.7086640","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086640","url":null,"abstract":"Network security is an important aspect of information sharing. Attempts have been made to remove various insecurities over internet. For this, many technological implementations and security policies have been developed. The amount of data, transferred, is not a factor. The basic factor is, how much security, the channel provides while transmitting data. Cryptography is one such technique, which allows secure data transmission without losing its confidentiality and integrity. Based on the key distribution, cryptography is further classified into two major types-Symmetric Key Cryptography and Asymmetric Key Cryptography. In this paper, we have surveyed the traditional algorithms, along with the proposed algorithms based on their pros and cons, related to Symmetric and Asymmetric Key Cryptography. We have also compared the importance of both these cryptographic techniques. The proposed algorithms proved to be highly efficient in their respective grounds but there are certain areas that remained open, related to these algorithms, and have not yet been thoroughly discussed. This paper also presents an appropriate future scope related to these open fields.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 154
期刊
2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1