The Experts below are selected from a list of 264 Experts worldwide ranked by ideXlab platform
Xiang Peng - One of the best experts on this subject based on the ideXlab platform.
-
Generalized amplitude-phase retrieval Algorithm attack on 'double images encryption method with resistance against the special attack based on an Asymmetric Algorithm'
Proceedings of SPIE, 2016Co-Authors: Chenggong Zhang, Wenqi He, Xiang PengAbstract:A generalized amplitude-phase retrieval Algorithm (GAPRA) attack on ‘double images encryption method with resistance against the special attack based on an Asymmetric Algorithm’ (DIEM) is presented in this paper. The analysis shows that the DIEM is a cascaded cryptosystem, which consist of a joint transform correlator architecture and a phasetruncated Fourier transform scheme. A GAPRA attack is proposed and the potential risk of the cascaded cryptosystems is discussed. By using our method, an attacker could crack high-quality results of the plaintexts. A set of simulation results demonstrate the validity and feasibility of the proposed method.
-
Information security system based on virtual-optics imaging methodology and public key infrastructure
Optik, 2005Co-Authors: Xiang Peng, Peng ZhangAbstract:Summary In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption Algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an Asymmetric Algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an Asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.
-
Virtual-optical information security system based on public key infrastructure
Information Optics and Photonics Technology, 2005Co-Authors: Xiang Peng, Peng ZhangAbstract:A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an Asymmetric Algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.
Peng Zhang - One of the best experts on this subject based on the ideXlab platform.
-
Information security system based on virtual-optics imaging methodology and public key infrastructure
Optik, 2005Co-Authors: Xiang Peng, Peng ZhangAbstract:Summary In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption Algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an Asymmetric Algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an Asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.
-
Virtual-optical information security system based on public key infrastructure
Information Optics and Photonics Technology, 2005Co-Authors: Xiang Peng, Peng ZhangAbstract:A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an Asymmetric Algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.
John Hamilton - One of the best experts on this subject based on the ideXlab platform.
-
An elliptical cryptographic Algorithm for rf wireless devices
2007 Winter Simulation Conference, 2007Co-Authors: Robert Steven Owor, Khalil Dajani, Zephyrinus Okonkwo, John HamiltonAbstract:In this paper, we propose a new Asymmetric cryptographic Algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The Algorithm describes how an orthogonal frequency division multiplexing (OFDM) based RF wireless system can be encrypted using planner matrix Elliptical Curve Cryptography (ECC). The newly described Asymmetric Algorithm can be applied to the OFDM transmission scheme in the design of more robust and secure cryptography in portable wireless devices. An analysis of the proposed Algorithm is made using the discrete logarithm approach. Two methods, namely, Pollard's rho Attack and Index Calculus are investigated with respect to the new Algorithm. We found that our method makes it even more difficult to break the ECC encryption.
Robert Steven Owor - One of the best experts on this subject based on the ideXlab platform.
-
Winter Simulation Conference - An elliptical cryptographic Algorithm for RF wireless devices
2007 Winter Simulation Conference, 2007Co-Authors: Robert Steven Owor, Khalil Dajani, Zephyrinus Okonkwo, John A. HamiltonAbstract:In this paper, we propose a new Asymmetric cryptographic Algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The Algorithm describes how an orthogonal frequency division multiplexing (OFDM) based RF wireless system can be encrypted using planner matrix Elliptical Curve Cryptography (ECC). The newly described Asymmetric Algorithm can be applied to the OFDM transmission scheme in the design of more robust and secure cryptography in portable wireless devices. An analysis of the proposed Algorithm is made using the discrete logarithm approach. Two methods, namely, Pollard's rho Attack and Index Calculus are investigated with respect to the new Algorithm. We found that our method makes it even more difficult to break the ECC encryption.
-
An elliptical cryptographic Algorithm for rf wireless devices
2007 Winter Simulation Conference, 2007Co-Authors: Robert Steven Owor, Khalil Dajani, Zephyrinus Okonkwo, John HamiltonAbstract:In this paper, we propose a new Asymmetric cryptographic Algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The Algorithm describes how an orthogonal frequency division multiplexing (OFDM) based RF wireless system can be encrypted using planner matrix Elliptical Curve Cryptography (ECC). The newly described Asymmetric Algorithm can be applied to the OFDM transmission scheme in the design of more robust and secure cryptography in portable wireless devices. An analysis of the proposed Algorithm is made using the discrete logarithm approach. Two methods, namely, Pollard's rho Attack and Index Calculus are investigated with respect to the new Algorithm. We found that our method makes it even more difficult to break the ECC encryption.
Maricel O Balitanas - One of the best experts on this subject based on the ideXlab platform.
-
Wi Fi Protected Access-Pre-Shared Key Hybrid Algorithm
2020Co-Authors: Maricel O BalitanasAbstract:Potentially large number of cryptography solutions to attain security is widely known and recognized. Looking for a stronger scheme is the aim of most researchers to hide valuable information from each other. In this information age, many encryption Algorithm exist to help keep information secure and these Algorithms vary in complexity and ability to resist cracking. In this paper we present a hybrid crypto scheme that combines the acclaimed effective in symmetric type of Algorithm, AES and the Elliptic Curve Cryptography in Asymmetric Algorithm.
-
crossed crypto scheme in wpa psk mode
2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009Co-Authors: Maricel O Balitanas, Rosslin John RoblesAbstract:Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric Algorithm of AES and the Asymmetric Algorithm of Elliptic Curve Cryptography (ECC).
-
BLISS - Crossed Crypto-Scheme in WPA PSK Mode
2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009Co-Authors: Maricel O Balitanas, Rosslin John RoblesAbstract:Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric Algorithm of AES and the Asymmetric Algorithm of Elliptic Curve Cryptography (ECC).
-
Crossed Crypto-Scheme in WPA PSK Mode
2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009Co-Authors: Maricel O Balitanas, Rosslin John RoblesAbstract:Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric Algorithm of AES and the Asymmetric Algorithm of elliptic curve cryptography (ECC).