Computer Science And Technology - Research Publications
Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82
Browse
3 results
Search Results
Item Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward-Curve Digital Signature Algorithm(Hindawi Limited, 2023-04-08T00:00:00) Shankar, Gauri; Ai-Farhani, Liwa H.; Anitha Christy Angelin, P.; Singh, Parvinder; Alqahtani, Abdullah; Singh, Abha; Kaur, Gaganpreet; Samori, Issah AbubakariAt the moment, digital documents are just as important as paper documents. As a result, authenticity is essential, especially in legal situations and digital forensics. As technology advances, these digital signature algorithms become weaker, necessitating the development of digital authentication schemes capable of withstanding current security threats. This study proposed a scheme based on an asymmetric key cryptosystem and the user's biometric credentials to generate keys for digital signatures. A single document can be signed by multiple signatories at the same time under this scheme. The primary goal of this article is to create a safe and cost-effective multiignature scheme. To create keys for document signing and verification, the Edwards-curve Digital Signature Algorithm (EdDSA), especially Ed25519, is employed. The Edwards-curve Digital Signature Algorithm is used with blockchain technology to sign crypto wallets. The Python implementation of a scheme that enables platform independence. We performed performance, security, and comparative analysis to ensure maximum usability. The article's main findings are that the Ed25519 algorithm can be used in blockchain. � 2023 Gauri Shankar et al.Item Implementation and analysis of enhanced obfuscation technique for data security(Blue Eyes Intelligence Engineering and Sciences Publication, 2019) Tanuja; MeenakshiWith the fast development of digital exchange of data in an electronic way, data and information security are becoming more important in both transmission and data storage. Cryptography is used as a solution which plays an important role in data and information security systems against malicious attacks. The encryption technique is used to provide confidentiality to the data during transmission because security threats are more on data during transmission than data at rest. One can also use encryption to secure user's data at data storage (i.e., data at rest). But an encryption algorithm consumes a more amount of computing resources such as processing power, memory and computation time. Obfuscation technique is a very lightweight technique that comes into a picture to protect the data at storage from malicious attacks. There are many obfuscation techniques are available to ensure the confidentiality of the data. In this paper, an obfuscation technique has been proposed and implemented which uses a 128-bit key to improve the security of the data. The experimental results show that the time taken for obfuscation and de-obfuscation is less and also from the security point of view it provides high avalanche effect.Item Performance evaluation of various symmetric encryption algorithms(Institute of Electrical and Electronics Engineers Inc., 2015) Kansal, S.; Mittal, M.With rise in the use of internet in various fields like banking, military and government sector, the security and privacy of the data has been the main concern. Today, most of the data handling and electronic transactions are done on the internet. When the information is transferred from the sender to the receiver over the internet, it may be eavesdropped by an intruder and thus is a continuous threat to the secrecy or confidentiality of the data. The popular technique that protects the confidentiality of the data is cryptography which converts the plain text into unreadable form and then receiver applies reverse mechanism to decrypt the unreadable form of data to readable form. This mechanism is called as encryption-decryption process. Thus to secure the data over the internet, it is important to find out which algorithm performs better than the other algorithms. In this paper, the different symmetric encryption algorithms like DES, 3DES, AES have been analyzed with respect to different parameters and data types (like text files, image) on i7 processor. ? 2014 IEEE.