“潘多拉”:一种多重加密软件

Jayson J. Cruz, R. D. Fernandez, Carlo M. Palicpic, Dominick L. Uyehara, Ronina C. Tayuan
{"title":"“潘多拉”:一种多重加密软件","authors":"Jayson J. Cruz, R. D. Fernandez, Carlo M. Palicpic, Dominick L. Uyehara, Ronina C. Tayuan","doi":"10.1145/3209914.3209919","DOIUrl":null,"url":null,"abstract":"Privacy and security have never been more important. The need for these things are on the rise considering that more and more reports of digital theft and massive unsolicited government surveillance are surfacing. The project, Pandora, is a solution created by the proponents to provide an encryption scheme that is a combination of the new and the old. Pandora is an integration of AES-256 and modified ciphers. You can use it to encrypt and decrypt files, just like typical AES encryption, but with the added complexity offered by the ciphers. The system is primarily developed using Java programming language using NetBeans IDE. The program will ask for a file input which will then be processed through multi-level encryption. Running parallel with this, the system will ask for a key which will be used for decryption. The final output will be a \".pxt file\". All of these are presented to a user with a graphical user interface (GUI). Added security elements were also implemented to ensure the confidentiality of the files. The key is required to be between eight to thirty-two mixed alphanumeric characters which will then be processed through separate hashing algorithm. This scheme ensures that it would take at least 3 to 3.914349685892112e+43 years to brute force or to perform dictionary attack on the key.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"'Pandora': A multi-encryption software\",\"authors\":\"Jayson J. Cruz, R. D. Fernandez, Carlo M. Palicpic, Dominick L. Uyehara, Ronina C. Tayuan\",\"doi\":\"10.1145/3209914.3209919\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Privacy and security have never been more important. The need for these things are on the rise considering that more and more reports of digital theft and massive unsolicited government surveillance are surfacing. The project, Pandora, is a solution created by the proponents to provide an encryption scheme that is a combination of the new and the old. Pandora is an integration of AES-256 and modified ciphers. You can use it to encrypt and decrypt files, just like typical AES encryption, but with the added complexity offered by the ciphers. The system is primarily developed using Java programming language using NetBeans IDE. The program will ask for a file input which will then be processed through multi-level encryption. Running parallel with this, the system will ask for a key which will be used for decryption. The final output will be a \\\".pxt file\\\". All of these are presented to a user with a graphical user interface (GUI). Added security elements were also implemented to ensure the confidentiality of the files. The key is required to be between eight to thirty-two mixed alphanumeric characters which will then be processed through separate hashing algorithm. This scheme ensures that it would take at least 3 to 3.914349685892112e+43 years to brute force or to perform dictionary attack on the key.\",\"PeriodicalId\":174382,\"journal\":{\"name\":\"Proceedings of the 1st International Conference on Information Science and Systems\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 1st International Conference on Information Science and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3209914.3209919\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Information Science and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3209914.3209919","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

隐私和安全从未像现在这样重要。考虑到越来越多关于数字盗窃和大规模未经请求的政府监控的报道浮出水面,对这些东西的需求正在上升。这个项目,潘多拉,是一个由支持者创建的解决方案,提供了一个新的和旧的结合的加密方案。潘多拉是AES-256和修改密码的集成。您可以使用它来加密和解密文件,就像典型的AES加密一样,但是密码提供了额外的复杂性。本系统主要采用Java编程语言和NetBeans IDE进行开发。该程序将要求文件输入,然后通过多级加密进行处理。与此同时,系统将请求用于解密的密钥。最后的输出将是一个。pxt文件”。所有这些都通过图形用户界面(GUI)呈现给用户。此外,还增加了保安措施,以确保文件的机密性。密钥需要在8到32个混合字母数字字符之间,然后通过单独的散列算法进行处理。该方案确保对密钥进行暴力破解或字典攻击至少需要3到3.914349685892112e+43年。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
'Pandora': A multi-encryption software
Privacy and security have never been more important. The need for these things are on the rise considering that more and more reports of digital theft and massive unsolicited government surveillance are surfacing. The project, Pandora, is a solution created by the proponents to provide an encryption scheme that is a combination of the new and the old. Pandora is an integration of AES-256 and modified ciphers. You can use it to encrypt and decrypt files, just like typical AES encryption, but with the added complexity offered by the ciphers. The system is primarily developed using Java programming language using NetBeans IDE. The program will ask for a file input which will then be processed through multi-level encryption. Running parallel with this, the system will ask for a key which will be used for decryption. The final output will be a ".pxt file". All of these are presented to a user with a graphical user interface (GUI). Added security elements were also implemented to ensure the confidentiality of the files. The key is required to be between eight to thirty-two mixed alphanumeric characters which will then be processed through separate hashing algorithm. This scheme ensures that it would take at least 3 to 3.914349685892112e+43 years to brute force or to perform dictionary attack on the key.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design and Implementation of Student Information Management System Based On Java Improving RealSense by Fusing Color Stereo Vision and Infrared Stereo Vision for the Visually Impaired Expert Recommendation Based on Collaborative Filtering in Subject Research An Approach for Information Discovery Using Ontology In Semantic Web Content Detecting Phone Theft Using Machine Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1