Konu "Cryptography" için listeleme
Toplam kayıt 24, listelenen: 1-20
-
Algebraic break of a cryptosystem based on discretized two-dimensional chaotic maps
(Elsevier Science BV, 2009-03-30)Recently, a cryptosystem based on two-dimensional discretized chaotic maps was proposed [T. Xiang, et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we cryptanalyze the proposal using algebraic methods. We give three ... -
Algebraic construction of semi bent function via known power function
(Işık University Press, 2021)The study of semi bent functions (2- plateaued Boolean function) has attracted the attention of many researchers due to their cryptographic and combinatorial properties. In this paper, we have given the algebraic construction ... -
Application of Laplace transform to cryptography using linear combination of functions
(Işık University Press, 2021)The strength of nations, organizations such as military, intelligence agency, hinges primarily on its ability to keep sensitive information secure from intruders. Today, cryptography is used to protect mobile communication, ... -
Breaking an orbit-based symmetric cryptosystem
(Pergamon-Elsevier Science Ltd, 2011-09)We report a break for a recently proposed class of cryptosystems. The cryptosystem uses constant points of a periodic secret orbit to encrypt the plaintext. In order to break the system, it suffices to sort the constant ... -
Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]
(Elsevier Science BV, 2009-09-07)In this comment, we analyze a recently proposed Baptista-like cryptosystem and show that it is not invertible. Others weaknesses are also reported. A modified version of this cryptosystem is proposed to show how to overcome ... -
Cryptanalysis of a chaos-based image encryption algorithm
(Elsevier Science BV, 2009-03-30)A chaos-based image encryption algorithm was proposed in [Z.-H. Guan, F. Huang, W. Guan, Phys. Lett. A 346 (2005) 153]. In this Letter, we analyze the security weaknesses of the proposal. By applying chosen-plaintext and ... -
Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps
(Elsevier Science BV, 2008-11-17)Recently, an encryption algorithm based on two-dimensional discretized chaotic maps was proposed [Xiang et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we analyze the security weaknesses of the proposal. Using the ... -
Cryptanalysis of a multi-chaotic systems based image cryptosystem
(Elsevier Science BV, 2010-01-15)This paper is a cryptanalysis of a recently proposed multi-chaotic systems based image cryptosystem. The cryptosystem is composed of two shuffling stages parameterized by chaotically generated sequences. We propose and ... -
Cryptanalysis of Fridrich's chaotic image encryption
(World Scientific Publishing, 2010-05)We cryptanalyze Fridrich's chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret ... -
Cryptanalysis of image encryption with compound chaotic sequence
(IEEE, 2009)Recently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give ... -
Design of a key exchange protocol between SIM card and service provider
(Institute of Electrical and Electronics Engineers Inc., 2015-11-05)Current capabilities of smart cards, Smartphones, and cellular network provoke companies to provide vast amount of services to the mobile users. Some of those services require end-to-end encryption between a Service Provider ... -
Deterministic generation of large scale atomic W states
(Optical Soc Amer, 2016-05-30)We present a deterministic scheme for generating large-scale atomic W states in a cavity QED system via a simple expansion mechanism, which is realized only by a detuned interaction between two identical atoms and a vacuum ... -
Dilemma between security and privacy on the internet
(Işık Üniversitesi, 2005-07-31)In this thesis, the following issues are discussed. Even in today society, it is hard to talk about security and privacy. And no one can imagine what will be structure of tomorrow society. We study what are the internet ... -
Generating multi-atom entangled W states via light-matter interface based fusion mechanism
(Nature Publishing Group, 2015-11-09)W state is a key resource in quantum communication. Fusion technology has been proven to be a good candidate for preparing a large-size W state from two or more small-size W states in linear optical system. It is of great ... -
GSM and GPRS security
(Işık Üniversitesi, 2004-09)In this thesis study, today's popular mobile voice (GSM) and data (GPRS) communication technologies (as an intorduction) and their security were studied. GSM arhitecture, key components of the GSM, security fonctions, and ... -
A hybrid approach to private record matching
(IEEE Computer Soc, 2012-10)Real-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the ... -
Implementing lightweight, dynamic hierarchical key assignment scheme for cloud computing
(IEEE, 2024-03-25)In this paper, we propose the implementation and adaptation of a hierarchical key assignment scheme (HKAS) previously developed in our research to improve access control in cloud computing environments. The secret keys ... -
Kaotik kriptografinin çilesi
(IEEE, 2013-06-13)Son yirmi yıldır araştırılan bir konu olmasına rağmen, kaotik kriptografi ana akım kriptografi literatüründe yer almıyor. Bu makalede, bu ayrımın nedenleri üzerinde durulmuştur. -
NFC loyal: A Beneficial model to promote loyalty on smart cards of mobile devices
(IEEE, 2010)Near Field Communication (NFC) as a new emerging technology currently tries to find a suitable ecosystem. Development of new standards such as secure element, secure channel, as well as Java Card enables creating new ...