首页 > 最新文献

Indian Journal of Cryptography and Network Security最新文献

英文 中文
Cryptographic Security Approach for Biometric Verification System 生物识别验证系统的密码安全方法
Pub Date : 2023-12-30 DOI: 10.54105/ijcns.c7854.113223
Akinribido C.T, Olabode O.O, Adetunmbi O.A, Adewumi Moradeke Grace
This paper presents cryptography which is the science of encryption and decryption to protect fingerprint that can be transmitted from sender to receiver. This security approach (cryptography) can also be applicable to other biometric traits like face, iris, retina and palm print. The significant of this protective medium is to prevent intruders or attacker to easily perceive the presence of fingerprint images. The method that was utilized for implementation of this cryptographic security approach for fingerprint verification System was achieved through Elliptic Curve Cryptography and Hill Cipher Algorithm. An elliptic Curve Function was defined and its domain parameters were used to generate self invertible key matrix that was used for the encryption and decryption process of the biometric images (Fingerprint, Face and Ear ) The security approach was also improved by ensuring that the decryption can only be done through secret key. After decryption, fingerprint verification was done by extracting and matching distinct feature (ridges) from template fingerprint and distinct feature from input fingerprint. The result obtained from demonstration of the cryptographic approach allows end users to load fingerprint image, encrypt it at sending end. At receiver end, end user can decrypt the fingerprint image. Image enhancement was later done before authentication through extraction and matching of distinct features. This model will prevent destruction and manipulation of stored fingerprint image. Authentication can also be accomplished through biological traits instead of use of password that can be stolen or transferred to relative.
本文介绍的密码学是一门加密和解密的科学,用于保护可从发送方传输到接收方的指纹。这种安全方法(密码学)也适用于其他生物识别特征,如脸部、虹膜、视网膜和掌纹。这种保护介质的意义在于防止入侵者或攻击者轻易察觉指纹图像的存在。指纹验证系统的加密安全方法是通过椭圆曲线加密法和希尔密码算法实现的。定义了一个椭圆曲线函数,并利用其域参数生成自反密钥矩阵,用于生物识别图像(指纹、脸部和耳朵)的加密和解密过程,同时还通过确保只能通过秘钥进行解密来改进安全方法。解密后,通过提取和匹配模板指纹的明显特征(脊)和输入指纹的明显特征来进行指纹验证。加密方法的演示结果允许终端用户加载指纹图像,并在发送端进行加密。在接收端,终端用户可以解密指纹图像。随后,通过提取和匹配不同的特征,在认证前对图像进行增强。这种模式可以防止存储的指纹图像被破坏和篡改。身份验证还可以通过生物特征来完成,而不是使用密码,因为密码可能被盗或被转给他人。
{"title":"Cryptographic Security Approach for Biometric Verification System","authors":"Akinribido C.T, Olabode O.O, Adetunmbi O.A, Adewumi Moradeke Grace","doi":"10.54105/ijcns.c7854.113223","DOIUrl":"https://doi.org/10.54105/ijcns.c7854.113223","url":null,"abstract":"This paper presents cryptography which is the science of encryption and decryption to protect fingerprint that can be transmitted from sender to receiver. This security approach (cryptography) can also be applicable to other biometric traits like face, iris, retina and palm print. The significant of this protective medium is to prevent intruders or attacker to easily perceive the presence of fingerprint images. The method that was utilized for implementation of this cryptographic security approach for fingerprint verification System was achieved through Elliptic Curve Cryptography and Hill Cipher Algorithm. An elliptic Curve Function was defined and its domain parameters were used to generate self invertible key matrix that was used for the encryption and decryption process of the biometric images (Fingerprint, Face and Ear ) The security approach was also improved by ensuring that the decryption can only be done through secret key. After decryption, fingerprint verification was done by extracting and matching distinct feature (ridges) from template fingerprint and distinct feature from input fingerprint. The result obtained from demonstration of the cryptographic approach allows end users to load fingerprint image, encrypt it at sending end. At receiver end, end user can decrypt the fingerprint image. Image enhancement was later done before authentication through extraction and matching of distinct features. This model will prevent destruction and manipulation of stored fingerprint image. Authentication can also be accomplished through biological traits instead of use of password that can be stolen or transferred to relative.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":" 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139140018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Support for Arbitrary Precision Arithmetic in Programming Languages 为编程语言中的任意精度算术提供软件支持
Pub Date : 2023-11-30 DOI: 10.54105/ijcns.a1425.113223
Dr. Kannan Balasubramanian
Arbitrary precision arithmetic, also known as bignum arithmetic, is a computational technique that allows programmers to perform arithmetic operations on numbers with significantly higher precision and magnitude than what is typically supported by the built-in numerical data types in programming languages. This technique is especially useful when working with extremely large or extremely precise numbers, such as in cryptography or scientific computations. Arbitrary precision arithmetic has many applications in the areas of Cryptography, Numerical Computation, Statistical Analysis, and High Precision measurements. For example, the calculation of the modulus in the RSA algorithm involves numbers with 1024-bit numbers and higher. An arithmetic calculation involving Multiplication and exponentiation of such numbers using Modulo arithmetic cannot be easily carried out in the existing programming Languages unless special software is provided. We can calculate the mathematical constant Pi to many thousand decimal places using the support provided in Programming Languages. Many programming languages provide built-in support for libraries for arbitrary precision arithmetic. We discuss the support provided in C/C++, Java and Python Languages with examples. Besides Programming Languages, Toolkits like Matlab and Sagemath also are used for scientific computation and special software support provided in these toolkits can enable arbitrary precision arithmetic. Most Programming Languages have support for floating-point arithmetic. We also discuss how arbitrary precision floating point arithmetic. can be supported in C/C++, Java, and Python. In addition, we discuss support for arbitrary precision integer arithmetic in Ruby, Javascript and Matlab and support for arbitrary precision floating point arithmetic in the Perl Language. Finally, we provide an example of computing the constant Pi to many decimal places using the sagemath tool.
任意精度算术,又称双精度算术,是一种计算技术,允许程序员对精度和量级明显高于编程语言内置数字数据类型通常支持的数字进行算术运算。这种技术在处理超大或超精确数字时特别有用,例如在密码学或科学计算中。任意精度算术在密码学、数值计算、统计分析和高精度测量领域有很多应用。例如,RSA 算法中的模数计算涉及 1024 位及以上的数字。使用模数运算法对这些数字进行乘法和指数运算,除非提供特殊软件,否则现有编程语言无法轻松完成。利用编程语言提供的支持,我们可以将数学常数 Pi 计算到小数点后数千位。许多编程语言都为任意精度算术库提供内置支持。我们将结合实例讨论 C/C++、Java 和 Python 语言提供的支持。除编程语言外,Matlab 和 Sagemath 等工具包也用于科学计算,这些工具包提供的特殊软件支持可实现任意精度运算。大多数编程语言都支持浮点运算。我们还将讨论如何在 C/C++、Java 和 Python 中支持任意精度浮点运算。此外,我们还讨论了 Ruby、Javascript 和 Matlab 对任意精度整数运算的支持,以及 Perl 语言对任意精度浮点运算的支持。最后,我们提供了一个使用 sagemath 工具计算 Pi 常数到小数点后多位的示例。
{"title":"Software Support for Arbitrary Precision Arithmetic in Programming Languages","authors":"Dr. Kannan Balasubramanian","doi":"10.54105/ijcns.a1425.113223","DOIUrl":"https://doi.org/10.54105/ijcns.a1425.113223","url":null,"abstract":"Arbitrary precision arithmetic, also known as bignum arithmetic, is a computational technique that allows programmers to perform arithmetic operations on numbers with significantly higher precision and magnitude than what is typically supported by the built-in numerical data types in programming languages. This technique is especially useful when working with extremely large or extremely precise numbers, such as in cryptography or scientific computations. Arbitrary precision arithmetic has many applications in the areas of Cryptography, Numerical Computation, Statistical Analysis, and High Precision measurements. For example, the calculation of the modulus in the RSA algorithm involves numbers with 1024-bit numbers and higher. An arithmetic calculation involving Multiplication and exponentiation of such numbers using Modulo arithmetic cannot be easily carried out in the existing programming Languages unless special software is provided. We can calculate the mathematical constant Pi to many thousand decimal places using the support provided in Programming Languages. Many programming languages provide built-in support for libraries for arbitrary precision arithmetic. We discuss the support provided in C/C++, Java and Python Languages with examples. Besides Programming Languages, Toolkits like Matlab and Sagemath also are used for scientific computation and special software support provided in these toolkits can enable arbitrary precision arithmetic. Most Programming Languages have support for floating-point arithmetic. We also discuss how arbitrary precision floating point arithmetic. can be supported in C/C++, Java, and Python. In addition, we discuss support for arbitrary precision integer arithmetic in Ruby, Javascript and Matlab and support for arbitrary precision floating point arithmetic in the Perl Language. Finally, we provide an example of computing the constant Pi to many decimal places using the sagemath tool.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"10 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139196699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Technology In Healthcare Services 医疗服务中的区块链技术
Pub Date : 2023-05-30 DOI: 10.54105/ijcns.d4090.053123
Adesh Mukati
The recent ransomware attack on AIIMS (All India Institute of Medical Sciences) has highlighted internal system weaknesses in the healthcare sector, and blockchain technology has emerged as a potential solution to improve security and reduce the risk of future attacks. The decentralized blockchain technology makes it much more difficult for ransomware attackers to focus on a single point of failure. Additionally, blockchain technology provides recipients and data providers with the reassurance that their data has not been changed, enabling enterprises to have confidence and assurance in the integrity of their sensitive data. The sharing of data also restores control of data to its owners. The information is dispersed so that no one company can control it, yet it is still organized around the owner. Thamrin and Xu's research paper proposes a framework for healthcare data storage that includes hospital, city, and state blockchain networks. The proposed system uses a private cloud, but the researchers recommend a hybrid cloud for improved efficiency and adaptability. This innovative approach has the potential to enhance healthcare systems' data security, privacy, and accountability. However, a comprehensive analysis of the problem and an assessment of the potential effectiveness of blockchain technology is necessary before implementing any solutions.
最近针对AIIMS(全印度医学科学研究所)的勒索软件攻击凸显了医疗保健部门的内部系统弱点,区块链技术已成为提高安全性和降低未来攻击风险的潜在解决方案。去中心化的区块链技术使得勒索软件攻击者更难以将注意力集中在单点故障上。此外,区块链技术为接收方和数据提供者提供了数据未被更改的保证,使企业能够对其敏感数据的完整性有信心和保证。数据的共享还将数据的控制权恢复到其所有者手中。信息是分散的,因此没有一家公司可以控制它,但它仍然是围绕所有者组织的。Thamrin和Xu的研究论文提出了一个医疗保健数据存储框架,该框架包括医院、城市和州区块链网络。该系统使用私有云,但研究人员建议使用混合云来提高效率和适应性。这种创新方法有可能增强医疗保健系统的数据安全性、隐私性和问责性。然而,在实施任何解决方案之前,有必要对问题进行全面分析并评估区块链技术的潜在有效性。
{"title":"Blockchain Technology In Healthcare Services","authors":"Adesh Mukati","doi":"10.54105/ijcns.d4090.053123","DOIUrl":"https://doi.org/10.54105/ijcns.d4090.053123","url":null,"abstract":"The recent ransomware attack on AIIMS (All India Institute of Medical Sciences) has highlighted internal system weaknesses in the healthcare sector, and blockchain technology has emerged as a potential solution to improve security and reduce the risk of future attacks. The decentralized blockchain technology makes it much more difficult for ransomware attackers to focus on a single point of failure. Additionally, blockchain technology provides recipients and data providers with the reassurance that their data has not been changed, enabling enterprises to have confidence and assurance in the integrity of their sensitive data. The sharing of data also restores control of data to its owners. The information is dispersed so that no one company can control it, yet it is still organized around the owner. Thamrin and Xu's research paper proposes a framework for healthcare data storage that includes hospital, city, and state blockchain networks. The proposed system uses a private cloud, but the researchers recommend a hybrid cloud for improved efficiency and adaptability. This innovative approach has the potential to enhance healthcare systems' data security, privacy, and accountability. However, a comprehensive analysis of the problem and an assessment of the potential effectiveness of blockchain technology is necessary before implementing any solutions.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129142253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Methodologies for Predicting Cybersecurity Incidents 预测网络安全事件的方法
Pub Date : 2023-05-30 DOI: 10.54105/ijcns.f3677.053123
Yaser M.A. Abualkas, D. Bhaskari
Data science may be used to detect, prevent, and address ever-evolving cybersecurity risks. CSDS is a fast developing field. When it comes to cybersecurity, CSDS emphasises the use of data, concentrates on generating warnings that are specific to a particular threat and uses inferential methods to categorise user behaviour in the process of attempting to enhance cybersecurity operations. Data science is at the heart of recent developments in cybersecurity technology and operations. Automation and intelligence in security systems are only possible through the extraction of patterns and insights from cybersecurity data, as well as the creation of data-driven models that reflect those patterns and insights An attempt is made in this work to describe the various data-driven research approaches with a focus on security. In accordance with the phases of the technique, each work that anticipates cyber-incidents is thoroughly investigated to create an automated and intelligent security system.
数据科学可用于检测、预防和解决不断变化的网络安全风险。CSDS是一个快速发展的领域。在网络安全方面,CSDS强调数据的使用,专注于生成针对特定威胁的警告,并在试图增强网络安全运营的过程中使用推理方法对用户行为进行分类。数据科学是网络安全技术和运营最新发展的核心。只有通过从网络安全数据中提取模式和见解,以及创建反映这些模式和见解的数据驱动模型,安全系统中的自动化和智能才有可能实现。本工作试图描述以安全为重点的各种数据驱动研究方法。按照技术的各个阶段,每一项预测网络事件的工作都被彻底调查,以创建一个自动化和智能的安全系统。
{"title":"Methodologies for Predicting Cybersecurity Incidents","authors":"Yaser M.A. Abualkas, D. Bhaskari","doi":"10.54105/ijcns.f3677.053123","DOIUrl":"https://doi.org/10.54105/ijcns.f3677.053123","url":null,"abstract":"Data science may be used to detect, prevent, and address ever-evolving cybersecurity risks. CSDS is a fast developing field. When it comes to cybersecurity, CSDS emphasises the use of data, concentrates on generating warnings that are specific to a particular threat and uses inferential methods to categorise user behaviour in the process of attempting to enhance cybersecurity operations. Data science is at the heart of recent developments in cybersecurity technology and operations. Automation and intelligence in security systems are only possible through the extraction of patterns and insights from cybersecurity data, as well as the creation of data-driven models that reflect those patterns and insights An attempt is made in this work to describe the various data-driven research approaches with a focus on security. In accordance with the phases of the technique, each work that anticipates cyber-incidents is thoroughly investigated to create an automated and intelligent security system.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127645866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved RSA Algorithm for Enhanced Security 一种提高安全性的改进RSA算法
Pub Date : 2022-11-30 DOI: 10.54105/ijcns.b1421.112222
Dr. Kannan Balasubramanian, M. Arun, Dr. K. R. Sekar
The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the difficulty of factoring the modulus calculated by multiplying two large prime numbers. The usefulness of the RSA public key algorithm lies in using one key for encryption and another key for decryption. However, a poor choice of the keys used in encryption and decryption can affect the security of the RSA cryptosystem. Many proposals have been made to modify the RSA cryptosystem in such a way that the attacks on the RSA cryptosystem can be overcome. In this article, we propose concealing the publicly disclosed parameters, the encryption key and the common modulus of the RSA cryptosystem by altering the values sent publicly. The values sent publicly are different from the one used in the algorithm which conceals the actual parameters to others. The implementation of this idea uses two different algorithms and randomly choosing between the algorithms. The choice of the algorithm is done using a random number generator and this choice of the algorithm has to be communicated so the decryptor uses the correct algorithm to decrypt the encrypted data. Finally we explore a faster way to implement the modular exponentiation algorithm used in the RSA encryption and decryption.
RSA (Rivest-Shamir-Adelman)公钥算法的安全性取决于两个大素数相乘计算出的模的因式分解的难度。RSA公钥算法的有用之处在于使用一个密钥进行加密,另一个密钥进行解密。但是,在加密和解密中使用的密钥选择不当会影响RSA密码系统的安全性。已经提出了许多修改RSA密码系统的建议,以便能够克服对RSA密码系统的攻击。在本文中,我们提出通过改变公开发送的值来隐藏公开披露的参数、加密密钥和RSA密码系统的公共模量。公开发送的值与算法中使用的值不同,算法将实际参数隐藏给其他人。这个想法的实现使用了两种不同的算法,并在算法之间随机选择。算法的选择是使用随机数生成器完成的,并且必须传达这种算法的选择,以便解密者使用正确的算法来解密加密的数据。最后,我们探索了一种更快的方法来实现RSA加密和解密中使用的模幂算法。
{"title":"An Improved RSA Algorithm for Enhanced Security","authors":"Dr. Kannan Balasubramanian, M. Arun, Dr. K. R. Sekar","doi":"10.54105/ijcns.b1421.112222","DOIUrl":"https://doi.org/10.54105/ijcns.b1421.112222","url":null,"abstract":"The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the difficulty of factoring the modulus calculated by multiplying two large prime numbers. The usefulness of the RSA public key algorithm lies in using one key for encryption and another key for decryption. However, a poor choice of the keys used in encryption and decryption can affect the security of the RSA cryptosystem. Many proposals have been made to modify the RSA cryptosystem in such a way that the attacks on the RSA cryptosystem can be overcome. In this article, we propose concealing the publicly disclosed parameters, the encryption key and the common modulus of the RSA cryptosystem by altering the values sent publicly. The values sent publicly are different from the one used in the algorithm which conceals the actual parameters to others. The implementation of this idea uses two different algorithms and randomly choosing between the algorithms. The choice of the algorithm is done using a random number generator and this choice of the algorithm has to be communicated so the decryptor uses the correct algorithm to decrypt the encrypted data. Finally we explore a faster way to implement the modular exponentiation algorithm used in the RSA encryption and decryption.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Data Leakage Prevention System in CBDC 数据泄漏防护系统在CBDC中的作用
Pub Date : 2022-11-30 DOI: 10.54105/ijcns.b3604.112222
Adesh Mukati, D. Prakash
centralized database-based Central Bank Digital Currency (CBDC) system's vulnerability to cyberattacks and data leakage is a major concern. Any data leak can lead to large financial losses, irreversible reputational harm, and a decline in user confidence. To protect user information, the Reserve Bank of India has underlined the significance of a strong Data Leakage Prevention (DLP) system. While current incidents have demonstrated that the measures were insufficient to meet the standards, DLP may not be enough to defend CBDCs on its own. Incorporating Zero-Knowledge Proofs (ZKPs) and differential privacy tools into DLP solutions can improve their robustness and effectiveness. There is no one-size-fits-all solution for preventing data leakage, different solutions may be more effective in different scenarios. It's always a good idea to assess an organization's or system's specific needs and requirements before deciding on the best solution. It is also important to remember that there is no such thing as absolute security, and the possibility of zero-day attacks is always there. It is essential to continuously monitor and enhance security measures to stay ahead of new threats. To preserve their Central Bank Digital Currency systems and data, financial institutions and central banks must continue to be proactive and vigilant.
基于集中式数据库的中央银行数字货币(CBDC)系统容易受到网络攻击和数据泄露是一个主要问题。任何数据泄露都可能导致巨大的财务损失、不可逆转的声誉损害和用户信心的下降。为了保护用户信息,印度储备银行强调了强大的数据泄漏预防(DLP)系统的重要性。虽然目前的事件表明,这些措施不足以达到标准,但DLP本身可能不足以捍卫cbdc。将零知识证明(ZKPs)和差分隐私工具纳入DLP解决方案可以提高其鲁棒性和有效性。防止数据泄漏没有放之四海而皆准的解决方案,不同的解决方案可能在不同的场景下更有效。在决定最佳解决方案之前,评估组织或系统的特定需求总是一个好主意。同样重要的是要记住,没有绝对的安全,零日攻击的可能性总是存在的。必须不断监测和加强安全措施,以领先于新的威胁。为了保护其中央银行数字货币系统和数据,金融机构和中央银行必须继续保持积极主动和警惕。
{"title":"The Role of Data Leakage Prevention System in CBDC","authors":"Adesh Mukati, D. Prakash","doi":"10.54105/ijcns.b3604.112222","DOIUrl":"https://doi.org/10.54105/ijcns.b3604.112222","url":null,"abstract":"centralized database-based Central Bank Digital Currency (CBDC) system's vulnerability to cyberattacks and data leakage is a major concern. Any data leak can lead to large financial losses, irreversible reputational harm, and a decline in user confidence. To protect user information, the Reserve Bank of India has underlined the significance of a strong Data Leakage Prevention (DLP) system. While current incidents have demonstrated that the measures were insufficient to meet the standards, DLP may not be enough to defend CBDCs on its own. Incorporating Zero-Knowledge Proofs (ZKPs) and differential privacy tools into DLP solutions can improve their robustness and effectiveness. There is no one-size-fits-all solution for preventing data leakage, different solutions may be more effective in different scenarios. It's always a good idea to assess an organization's or system's specific needs and requirements before deciding on the best solution. It is also important to remember that there is no such thing as absolute security, and the possibility of zero-day attacks is always there. It is essential to continuously monitor and enhance security measures to stay ahead of new threats. To preserve their Central Bank Digital Currency systems and data, financial institutions and central banks must continue to be proactive and vigilant.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130912226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Network Intrusion Detection System Based on Categorical Boosting Technique using NSL-KDD 基于NSL-KDD分类增强技术的网络入侵检测系统
Pub Date : 2021-11-10 DOI: 10.35940/IJCNS.B1411.111221
S. Raj, Megha Jain, P. Chouksey
Massive volumes of network traffic & data are generated by common technology including the Internet of Things, cloud computing & social networking. Intrusion Detection Systems are therefore required to track the network which dynamically analyses incoming traffic. The purpose of the IDS is to carry out attacks inspection or provide security management with desirable help along with intrusion data. To date, several approaches to intrusion detection have been suggested to anticipate network malicious traffic. The NSL-KDD dataset is being applied in the paper to test intrusion detection machine learning algorithms. We research the potential viability of ELM by evaluating the advantages and disadvantages of ELM. In the preceding part on this issue, we noted that ELM does not degrade the generalisation potential in the expectation sense by selecting the activation function correctly. In this paper, we initiate a separate analysis & demonstrate that the randomness of ELM often contributes to some negative effects. For this reason, we have employed a new technique of machine learning for overcoming the problems of ELM by using the Categorical Boosting technique (CATBoost).
包括物联网、云计算和社交网络在内的通用技术产生了大量的网络流量和数据。因此,入侵检测系统需要跟踪网络,动态分析传入的流量。IDS的目的是与入侵数据一起进行攻击检测或为安全管理提供所需的帮助。迄今为止,已经提出了几种入侵检测方法来预测网络恶意流量。本文将NSL-KDD数据集用于测试入侵检测机器学习算法。我们通过评估ELM的优缺点来研究ELM的潜在可行性。在前面关于这个问题的部分中,我们注意到,通过正确选择激活函数,ELM不会降低期望意义上的泛化潜力。在本文中,我们进行了单独的分析,并证明了ELM的随机性往往会导致一些负面影响。因此,我们采用了一种新的机器学习技术,通过使用分类提升技术(CATBoost)来克服ELM的问题。
{"title":"A Network Intrusion Detection System Based on Categorical Boosting Technique using NSL-KDD","authors":"S. Raj, Megha Jain, P. Chouksey","doi":"10.35940/IJCNS.B1411.111221","DOIUrl":"https://doi.org/10.35940/IJCNS.B1411.111221","url":null,"abstract":"Massive volumes of network traffic & data are generated by common technology including the Internet of Things, cloud computing & social networking. Intrusion Detection Systems are therefore required to track the network which dynamically analyses incoming traffic. The purpose of the IDS is to carry out attacks inspection or provide security management with desirable help along with intrusion data. To date, several approaches to intrusion detection have been suggested to anticipate network malicious traffic. The NSL-KDD dataset is being applied in the paper to test intrusion detection machine learning algorithms. We research the potential viability of ELM by evaluating the advantages and disadvantages of ELM. In the preceding part on this issue, we noted that ELM does not degrade the generalisation potential in the expectation sense by selecting the activation function correctly. In this paper, we initiate a separate analysis & demonstrate that the randomness of ELM often contributes to some negative effects. For this reason, we have employed a new technique of machine learning for overcoming the problems of ELM by using the Categorical Boosting technique (CATBoost).","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121249428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Online Transaction using Iris 使用虹膜进行安全网上交易
Pub Date : 2021-11-10 DOI: 10.35940/ijcns.a1408.111221
Abhishek Balamurugan, S. R, S. J, S. K
In this project, we are planning to create a strong robust calculation for executing cash in higher level security reason with high acknowledgment rates in a shifting environment. To begin with, Haar cascade based calculation has been connected for quick and basic confront location from the input picture. The confront picture is at that point being changed over into grayscale picture. After that, the iris, eyebrows, nose, mouth of candidates are extricated from the escalated valleys from the recognized confront.
在这个项目中,我们计划创建一个强大的鲁棒计算,用于在不断变化的环境中以高确认率在更高级别的安全原因中执行现金。首先,连接了基于Haar级联的计算,以便从输入图像中快速和基本地定位对抗。在这一点上,对抗图像被转换成灰度图像。然后,从人脸识别的升级谷中提取候选人的虹膜、眉毛、鼻子和嘴巴。
{"title":"Secure Online Transaction using Iris","authors":"Abhishek Balamurugan, S. R, S. J, S. K","doi":"10.35940/ijcns.a1408.111221","DOIUrl":"https://doi.org/10.35940/ijcns.a1408.111221","url":null,"abstract":"In this project, we are planning to create a strong robust calculation for executing cash in higher level security reason with high acknowledgment rates in a shifting environment. To begin with, Haar cascade based calculation has been connected for quick and basic confront location from the input picture. The confront picture is at that point being changed over into grayscale picture. After that, the iris, eyebrows, nose, mouth of candidates are extricated from the escalated valleys from the recognized confront.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130060518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptography in Cloud Computing 云计算中的密码学
Pub Date : 2021-05-10 DOI: 10.35940/IJCNS.A1402.051121
H. Kaur, Amandeep Kaur Prof.
Cryptography is a key element in establishing trust and enabling services in the digital world. It is represented in a ways that are not accessible to human users. Hence, humans are left out the trust and security in the digital world. Cryptography is necessary in modern communication protocols and to many digital services. A primitive or protocol should be defined to reach the security goal. Beside the introduction part this paper represents the types of cryptography, algorithm of cryptography and techniques of cryptography and the interaction between Government and cryptography.
密码学是在数字世界中建立信任和启用服务的关键因素。它以一种人类用户无法访问的方式表示。因此,在数字世界中,人类被排除在信任和安全之外。密码学在现代通信协议和许多数字业务中是必要的。应该定义一个原语或协议来达到安全目标。本文在引言部分介绍了密码学的类型、算法和技术,以及政府与密码学的相互作用。
{"title":"Cryptography in Cloud Computing","authors":"H. Kaur, Amandeep Kaur Prof.","doi":"10.35940/IJCNS.A1402.051121","DOIUrl":"https://doi.org/10.35940/IJCNS.A1402.051121","url":null,"abstract":"Cryptography is a key element in establishing trust and enabling services in the digital world. It is represented in a ways that are not accessible to human users. Hence, humans are left out the trust and security in the digital world. Cryptography is necessary in modern communication protocols and to many digital services. A primitive or protocol should be defined to reach the security goal. Beside the introduction part this paper represents the types of cryptography, algorithm of cryptography and techniques of cryptography and the interaction between Government and cryptography.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129930562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Indian Journal of Cryptography and Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1