A secure key exchange protocol for Industrial Internet of Things based on tropical triad matrix semiring DOI

J. Jackson,

R. Perumal

International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown

Published: Nov. 21, 2024

Language: Английский

Design of an academic document forgery detection system DOI Creative Commons
Sirapat Boonkrong

International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown

Published: June 21, 2024

Abstract Advances in digital technology and communication are reducing the popularity of physical or paper-based documents, particularly official academic field. Many institutions have shifted from documents to electronic formats. However, with availability document-editing photo-editing software, an adversary can illegally modify original suit their needs. Therefore, it is essential that receivers these must verify authenticity detect forgery documents. In this study, a cryptographic hash function, which concerned data integrity, used modifications Experiments were conducted evaluate correctness speed document verification. The proposed system was compared other conventional methods such as signature-based, convolutional neural network, blockchain-based methods. Our study shows efficiently forged 100% accuracy verification 0.352 ms, considerably faster than current network technologies. function-based method provides another way help

Language: Английский

Citations

4

Privacy-enhanced secure framework for educational data protection and analysis DOI
Balachandar Vellingiri,

K. Venkatesh

International Journal of Information Technology, Journal Year: 2025, Volume and Issue: unknown

Published: March 17, 2025

Language: Английский

Citations

0

Securing the Internet of Things: A Comprehensive Review of Ransomware Attacks, Detection, Countermeasures, and Future Prospects DOI Creative Commons
Peizhi Yan,

Tala Talaei Khoei

Franklin Open, Journal Year: 2025, Volume and Issue: unknown, P. 100256 - 100256

Published: March 1, 2025

Language: Английский

Citations

0

GWWAES: a hybrid optimization method to secure IoT networks DOI

Sanjeev Kumar,

Sukhvinder Singh Deora

International Journal of Information Technology, Journal Year: 2025, Volume and Issue: unknown

Published: April 10, 2025

Language: Английский

Citations

0

A novel approach for code coverage testing using hybrid metaheuristic algorithm DOI
Fatma Ahsan, Faisal Anwer

International Journal of Information Technology, Journal Year: 2024, Volume and Issue: 16(6), P. 3691 - 3701

Published: June 22, 2024

Language: Английский

Citations

3

Computing isogeny on Edwards curves for quantum safe cryptography DOI
Ankit Chaudhary, Manoj Kumar, Kamal Upreti

et al.

International Journal of Information Technology, Journal Year: 2025, Volume and Issue: unknown

Published: March 9, 2025

Language: Английский

Citations

0

LightAgriCrypt: A Novel Lightweight Stream Cipher for Enhancing Security in Smart Agriculture Systems DOI
Shahnwaz Afzal, Mohammad Ubaidullah Bokhari

Security and Privacy, Journal Year: 2025, Volume and Issue: 8(3)

Published: April 17, 2025

ABSTRACT The agriculture industry has embraced recent technological advancements to ensure sustainable farming methods, increase resource efficiency, and boost productivity. Nonetheless, merging these technologies raised new security concerns, particularly protecting personal data preserving device communication integrity. We propose a lightweight stream cipher address challenges facilitate secure in smart environments. innovation lies the key‐generating block, which utilizes 128‐bit key 64‐bit Initialization Vector (IV) produce an 80‐bit keystream through iterative round functions. This process involves integration of dynamic nonlinear logic module robust state update mechanism, ensuring high entropy resistance against cryptanalytic attacks. In second phase, is initialized feedback shift register (NLFSR), where it undergoes additional transformations using specialized filter output functions generate final encryption keystream. two‐phase design not only ensures but also adapts effectively constraints systems. Comprehensive comparative evaluations demonstrate that proposed outperforms state‐of‐the‐art ciphers multiple benchmarks, such as Grain v1, Grain‐128, Trivium, Logic. suggested achieves higher throughput, ideal Shannon values, faster decryption times. It exhibits robustness with near‐zero correlation coefficients, passes all 16 NIST randomness tests, efficient memory usage, low power consumption, strong cryptographic makes solution tailored unique needs

Language: Английский

Citations

0

An Efficient Multilayer Approach for Securing E-Healthcare Data in Cloud using Crypto – Stego Technique DOI Open Access

Ms. Nagamany Abirami,

M. S. Anbarasi

International Research Journal on Advanced Science Hub, Journal Year: 2024, Volume and Issue: 6(06), P. 135 - 143

Published: June 5, 2024

Healthcare data has been moving to cloud platforms in recent years, which increased accessibility and scalability but also raised security issues. Ensuring integrity safeguarding private health information from unwanted access are critical. This paper presents a comprehensive strategy integrate effective Elliptic Curve Cryptography ECC-AES with steganography techniques improve the of healthcare cloud. is especially well-suited for situations limited resources since it provides strong reduced key sizes. Confidentiality guaranteed by encrypting using ECC- AES before storage, reducing possibility breaches. Steganography integrated against skilled adversaries adding an extra degree obfuscation concealing encrypted inside innocuous files or images. Strict management procedures, control systems, frequent audits important components proposed system that ensure adherence Health Insurance Portability Accountability Act (HIPAA) General Data Protection Regulation (GDPR) compliance requirements pertaining protection. The multilayer on environment than other existing systems.

Language: Английский

Citations

1

ChaosForge: a lightweight stream cipher fusion of chaotic dynamics and NLFSRs for secure IoT communication DOI
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Gaurav Yadav

et al.

International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown

Published: July 29, 2024

Language: Английский

Citations

1

Color image encryption system based fractional hyperchaotic, fibonacci matrix and quaternion algebra DOI
Rachid Chaker, Omar El Ogri, Abdelkarim Boua

et al.

International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown

Published: July 22, 2024

Language: Английский

Citations

1