• Title/Summary/Keyword: hybrid-based encryption

Search Result 31, Processing Time 0.023 seconds

A Novel Security Scheme with Message Level Security for Hybrid Applications

  • Ma, Suoning;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.215-217
    • /
    • 2016
  • With the popularity of smart device, mobile applications are playing more and more important role in people's daily life, these applications stores various information which greatly facilitate the user's daily life. However due to the frequent transmission of data in the network also increases the risk of data leakage, more and more developers began to focus on how to protect user data. Current mainstream development models include Native development, Web development and Hybrid development. Hybrid development is based on JavaScript and HTML5, it has a cross platform advantages similar to Web Apps and a good user experience similar to Native Apps. In this paper according to the features of Hybrid applications, we proposed a security scheme in Hybrid development model implements message-level data encryption to protect user information. And through the performance evaluation we found that in some scenario the proposed security scheme has a better performance.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

A Framework for Hybrid eBook Service System based on Mobile Smart Device and Smart TV Broadcasting Contents (스마트TV 방송콘텐츠와 모바일 스마트 기기 기반 하이브리드 eBook 서비스 시스템 프레임워크)

  • Jun, Eung-Sup;Chang, Yong-Sik;Oh, Sang-Soo;Choi, Yun-Eui
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.45-48
    • /
    • 2014
  • 디지털 콘텐츠의 급속한 보급과 더불어 휴대용 단말기를 이용한 eBook 관련 콘텐츠의 개발이 점증하고 있는 추세에 유통 다변화를 통한 보급 확대를 위해 스마트 TV를 통한 VOD 방송콘텐츠와 연동하여 전자책을 사용자에게 즉시로 제공할 수 있는 시스템이 요구되고 있다. 본 연구에서는 스마트 TV 방송콘텐츠를 기반으로 한 eBook 콘텐츠의 VOD 서비스를 하이브리드형으로 휴대 스마트 기기에 제공하기 위한 효과적인 시스템의 구성과 DRM 전략을 위한 프레임워크를 제시하고 프로토타입 시스템을 제안한다.

  • PDF

Data Communication Method Based on Hybrid Encryption in Smartphone (스마트폰에서의 하이브리드 암·복호화 기반 데이터 통신 방법)

  • Jo, Sung-hwan;Kim, Seong-Hoon;Han, Gi-Tae;Lee, Hyo-Seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.71-74
    • /
    • 2014
  • 스마트폰의 활용 범위가 점점 확장됨에 따라 데이터 통신량도 증가되어 가고 있으며, 데이터 유출을 방지하기 위해 다양한 암 복호화 알고리즘을 필요로 하고 있다. 본 논문에서는 기존의 비대칭 알고리즘과 대칭 알고리즘을 이용한 하이브리드 암 복호화 기반 데이터 교환방법을 제안한다. 비대칭 알고리즘은 RSA방법을 사용하여 상호간에 대칭키의 절반인 반키(Half Key)를 교환할 수 있도록 하였으며, 대칭 알고리즘은 AES를 사용하여 데이터를 암 복호화 할 수 있도록 하였다. 또한 기존의 AES 알고리즘의 S-Box와 키 스케쥴링 과정을 변형하여 무차별 대입 공격에 대해 방어할 수 있도록 하였다. 그 결과 기존의 비대칭 또는 대칭 알고리즘을 단독으로 사용하는 방법보다 안전하고 빠른 보안수준을 보장할 수 있음을 확인하였다.

  • PDF

A New Approach for Information Security using an Improved Steganography Technique

  • Juneja, Mamta;Sandhu, Parvinder Singh
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.405-424
    • /
    • 2013
  • This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits of blue components and partial green components of random pixel locations in the edges of images. An adaptive LSB based steganography is proposed for embedding data based on the data available in MSB's (Most Significant Bits) of red, green, and blue components of randomly selected pixels across smooth areas. A hybrid feature detection filter is also proposed that performs better to predict edge areas even in noisy conditions. AES (Advanced Encryption Standard) and random pixel embedding is incorporated to provide two-tier security. The experimental results of the proposed approach are better in terms of PSNR and capacity. The comparison analysis of output results with other existing techniques is giving the proposed approach an edge over others. It has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.

Secure Authenticated key Exchange Protocol using Signcryption Scheme (Signcryption을 이용한 안전한 인증된 키 교환 프로토콜 연구)

  • Kim Rack-Hyun;Youm Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.139-146
    • /
    • 2006
  • A Signcryption proposed by Yuliang Zheng in 1997 is a hybrid public key primitive that combines a digital signature and a encryption. It provides more efficient method than a straightforward composition of an signature scheme with a encryption scheme. In a mobile communication environment, the authenticated key agreement protocol should be designed to have lower computational complexity and memory requirements. The password-based authenticated key exchange protocol is to authenticate a client and a server using an easily memorable password. This paper proposes an secure Authenticated Key Exchange protocol using Signcryption scheme. In Addition we also show that it is secure and a more efficient that other exiting authenticated key exchange protocol.

Image Steganography for Hiding Hangul Messages in Hybrid Technique using Variable ShiftRows (가변 ShiftRows를 이용한 하이브리드 기법에서 한글 메시지 은닉을 위한 이미지 스테가노그래피)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.217-222
    • /
    • 2022
  • Information plays an important role in modern society. Most of the information is processed and moved in the digital space. In cyberspace, confidential communication based on resistance and security is fundamental. It is essential to protect the information sent and received over the network. However, information may be leaked and forged by unauthorized users. The effectiveness of the existing protection system decreases as an innovative technique is applied to identify the communication contents by a third party. Steganography is a technique for inserting secret information into a specific area of a medium. Stegganography and steganalysis techniques are at odds with each other. A new and sophisticatedly implemented system is needed to cope with the advanced steganalysis. To enhance step-by-step diffusion and irregularity, I propose a hybrid implementation technique of image steganography for Hangul messages based on layered encryption and variable ShiftRows. PSNR was calculated to measure the proposed steganography efficiency and performance. Compared to the basic LSB technique, it was shown that the diffusion and randomness can be increased even though the PSNR decreased by 1.45%.

A Design of Online Execution Class and Encryption-based Copyright Protection Hybrid (온라인 실행 코드와 암호화 기반 불법 복제 방지 시스템의 융합설계)

  • Kim, Hee-Sun;Kim, Sung-Ryul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.113-115
    • /
    • 2012
  • 안드로이드 앱의 불법 복제를 방지하고자 기존에 온라인 실행(Online Execution Class: OEC) 또는 앱을 암호화된 상태로 배포하여 실행 시에 적법한 사용자만이 암호를 복호화하여 실행이 가능하도록 하는 방법들이 있다. 하지만 스마트폰이 저전력과 저사양인 점을 고려할 때, 위에 방법은 스마트폰의 보안을 보장할 수 있지만 성능 면에서 부담이 된다. 본 논문에서 OEC를 암호화하여 보안 수준을 높이고 개발자에게 보안 수준을 선택할 수 있게 하여 환경에 맞추어 안전을 유지할 수 있도록 시스템 설계를 제안한다.

Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices

  • Tiwari, Harsh Durga;Kim, Jae Hyung
    • ETRI Journal
    • /
    • v.40 no.3
    • /
    • pp.396-409
    • /
    • 2018
  • Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. DNA-based encryption has also been proven to have good security. To develop a more secure and stable cryptography technique, we propose a new hybrid DNA-encoded ECC scheme that provides multilevel security. The DNA sequence is selected, and using a sorting algorithm, a unique set of nucleotide groups is assigned. These are directly converted to binary sequence and then encrypted using the ECC; thus giving double-fold security. Using several examples, this paper shows how this complete method can be realized on IoT devices. To verify the performance, we implement the complete system on the embedded platform of a Raspberry Pi 3 board, and utilize an active sensor data input to calculate the time and energy required for different data vector sizes. Connectivity and resilience analysis prove that DNA-mapped ECC can provide better security compared to ECC alone. The proposed method shows good potential for upcoming IoT technologies that require a smaller but effective security system.

E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions (DLP방식의 문제점 극복을 위한 E-DRM 방식의 개인정보 보호 기술)

  • Choi, Jong-Uk;Lee, Yong-Jin;Park, Ju-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1103-1113
    • /
    • 2012
  • DLP technology has been effectively enforcing privacy protection policy in on-line computing environment. However, with wide spread use of smart devices and promotion of smart-works, it has been pointed out that DLP technology cannot effectively prevent privacy leakage at smart devices and is comparatively weak at APT attack. In this paper, we suggests a hybrid approach, PPS, which integrates E-DRM system with DLP technology, taking advantages of both technologies. The technology basically uses encryption function and access control of E-DRM system, and thus it can effectively prevent leakage of privacy information of customers, even if the documents are in the hands of malicious third parties.