Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 3

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  cryptographic
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Elliptical curve cryptography (ecc) is a public key encryption approach based on elliptic curve idea that may be used to create quicker, smaller, and greater green cryptographic keys. Ecc generates keys through the houses of the elliptic curve equation in area of the traditional approach of generation as the manufactured from very huge prime numbers. The technology may be used at the side of maximum public key encryption strategies, together with rsa, and diffiehellman. Consistent with some researchers, ecc can yield a degree of safety with a 164-bit key that different structures require a 1,024-bit key to advantage. Because of the fact ecc helps to establish equivalent safety with decrease computing power and battery useful resource usage, it's far turning into widely used for cellular programs. In this work we implement ECC Algorithm with altered approach for encrypting and decrypting the probe image and encrypted images respectively. Our proposed approach has proposed that the elapsed time to perform the task for same input image is less than the conventional approach. We have run the cryptography procedure for n number of iterations in order to get the accurate results and compared that particular elapsed time with the conventional approach. We have contemplated an approach in which we consider region of interest (ROI) unlike the conventional approach, the advantage of the proposed work is we n need not to cover all the pixel vectors but only those which is required to be encrypted or decrypted. The proposed work has applied ecc algorithm for error calculations which has been shown in the experimental results. The proposed work has compared the result in both the aspects in terms of elapsed time to perform the algorithm and ROI feature to get implemented at the same time.
2
Content available remote On Some Crypto-messages Parser
EN
Some methods of automatic verification of cryptographic protocols require creating specially designed formal languages based on suitable algebra of terms (called crypto-terms or crypto-messages). Sometimes in verification process it is essential to check whether a given crypto-term is a sub term of another one or in general whether some crypto-term belongs to the specified crypto-Language (a set of some crypto-terms) or not. Another problem is creating the set of all ant chains of subterms of a given term wit h respect to the order introduced by a subterm relation. The main goal of this paper is to present a tool for verification whether crypto-term belongs to the specified crypto-language or not. Our main purpose is to check lexical analysis and syntax analysis. Finally, after checking that a crypto-sentence is correct, we convert it into the special format, purpose was to check lexical analysis and syntax analysis. For our investigation Flex and Bison - the well known grammar tools – have been used. We believe that our tool will be usefull in research on the topic of symbolic verification of cryptographic protocols.
PL
W pracy rozpatrzono problematykę wykorzystania kryptografii do zapewnienia bezpieczeństwa danych we współczesnych kanałach informacyjnych. Wskazano na różnice między zastosowaniem kodowania symetrycznego i asymetrycznego. Przedstawiono klasyczne przykłady algorytmów kryptograficznych oraz pokazano praktyczne ich zastosowanie.
EN
This paper considers problems of using cryptography to ensure data safety in modern information channels. It points out the differences between use of symmetric and ansymmetric code, it also introduces classical examples of cryptography algorithms and shows its practical use.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.