Arama Sonuçları

Listeleniyor 1 - 5 / 5
  • Yayın
    Implementing lightweight, dynamic hierarchical key assignment scheme for cloud computing
    (IEEE, 2024-03-25) Çelikbilek, İbrahim; Çeliktaş, Barış; Özdemir, Enver
    In this paper, we propose the implementation and adaptation of a hierarchical key assignment scheme (HKAS) previously developed in our research to improve access control in cloud computing environments. The secret keys generated and managed by this scheme can be utilized for various purposes within the cloud computing, including data encryption, integrity checks, secure communications, and accessing critical infrastructures or services. Our implementation performs dynamic update operations with minimal computational cost and storage demands, as users within the hierarchical structure do not store any key components. Through security analysis, the scheme demonstrates strong key indistinguishability security (S-KI-security), effectively safeguarding keys against various cryptographic attacks. The scheme's flexibility allows it to be tailored to specific organizational needs, whether for securing sensitive data, ensuring compliance with regulatory standards, or facilitating secure data sharing and collaboration in cloud environments. Thus, we advocate for the practical implementation of the HKAS in transitioning to cloud environments.
  • Yayın
    Kaotik kriptografinin çilesi
    (IEEE, 2013-06-13) Solak, Ercan
    Son yirmi yıldır araştırılan bir konu olmasına rağmen, kaotik kriptografi ana akım kriptografi literatüründe yer almıyor. Bu makalede, bu ayrımın nedenleri üzerinde durulmuştur.
  • Yayın
    NFC loyal: A Beneficial model to promote loyalty on smart cards of mobile devices
    (IEEE, 2010) Özdenizci Köse, Büşra; Coşkun, Vedat; Aydın, Mehmet Nafiz; Ok, Kerem
    Near Field Communication (NFC) as a new emerging technology currently tries to find a suitable ecosystem. Development of new standards such as secure element, secure channel, as well as Java Card enables creating new ecosystems using a concurrent multi application platform based on Global Platform. We proposed NFC Loyal, which maintains data interaction and data sharing among payment and loyalty applications through our proposed structure, called as Secure Common Domain Management System (SCDM). SCDM as a centralized database management system on the smart card stores valuable iriformation provided by payment applications and shares them with loyalty applications. The direct outcome of using NFC Loyal is the increase in repeat purchases of customers; as well as a business plan among the payment firms, loyalty firms, and the smart card owner. We fully describe the technical including security architectures and background for the SCDM, and explain the details of the proposed model.
  • Yayın
    Cryptanalysis of image encryption with compound chaotic sequence
    (IEEE, 2009) Solak, Ercan
    Recently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give chosen-plaintext and known-plaintext attacks that yield the secret parameters of the algoritm. Our simulation results show that the computational complexity of the attacks is quite low.
  • Yayın
    Design of a key exchange protocol between SIM card and service provider
    (Institute of Electrical and Electronics Engineers Inc., 2015-11-05) Ok, Kerem; Coşkun, Vedat; Çevikbaş, Cem; Özdenizci Köse, Büşra
    Current capabilities of smart cards, Smartphones, and cellular network provoke companies to provide vast amount of services to the mobile users. Some of those services require end-to-end encryption between a Service Provider and a SIM card. Keyed SIM cards already contain the required structure for secure key generation and upload, whereas un-keyed SIM cards do not have the required capability for this. In this paper, we provide a key exchange protocol, which creates a symmetric key by the collaborative work of SIM card and the Service Provider server. After a successful protocol run, SIM card and Service Provider can perform end-to-end data encryption.