Explore chapters and articles related to this topic
Probability
Published in William M. Mendenhall, Terry L. Sincich, Statistics for Engineering and the Sciences, 2016
William M. Mendenhall, Terry L. Sincich
Encryption systems with erroneous ciphertexts. In cryptography, ciphertext is encrypted or encoded text that is unreadable by a human or computer without the proper algorithm to decrypt it into plaintext. The impact of erroneous ciphertexts on the performance of an encryption system was investigated in IEEE Transactions on Information Forensics and Security (April, 2013). For one data encryption system, the probability of receiving an erroneous ciphertext is assumed to be β, where 0 < β < 1. The researchers showed that if an erroneous ciphertext occurs, the probability of an error in restoring plaintext using the decryption system is .5. When no error occurs in the received ciphertext, the probability of an error in restoring plaintext using the decryption system is αβ, where 0 < α < 1. Use this information to give an expression for the probability of an error in restoring plaintext using the decryption system.
Privacy and Challenges to Data-Intensive Techniques
Published in Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong, Cyber Defense Mechanisms, 2020
Pati Prasanthi, Gautam Kumar, Sheo Kumar, Mrutunjaya S. Yalawar
Encryption: Encryption is a method of transforming information by using an algorithm to make it unreadable for unauthorized users. The communication of data can be done with help of encryption key on one side here the data can be transferred and can be accessed by decrypted key on other side. It protects sensitive data such as credit card numbers by encoding and transforming data into unreadable cipher text. This encrypted data can only be read by decrypting it. Asymmetric key and symmetric key are the two primary types of encryption strategies.
A Secure Electronic Voting System Using Decentralized Computing
Published in Satya Prakash Yadav, Dharmendra Prasad Mahato, Nguyen Thi Dieu Linh, Distributed Artificial Intelligence, 2020
Dhruv Rawat, Amit Kumar, Suresh Kumar
Blockchain uses cryptography. It is a process of making and using codes to secure the transmission of information. Plaintext: It is the data to be protected during transmission.Encryption algorithm. It is a mathematical process that produces a ciphertext for any given plaintext and encryption key. It is a cryptographic algorithm that takes plaintext and an encryption key as input and produces a ciphertext.Ciphertext: It is the scrambled version of the plaintext produced by the encryption algorithm using a specific encryption key. The ciphertext is not guarded. It flows on a public channel. It can be intercepted or compromised by anyone who has access to the communication channel.Decryption algorithm: It is a mathematical process, that produces a unique plaintext for any given ciphertext and decryption key. It is a cryptographic algorithm that takes a ciphertext and a decryption key as input, and outputs a plaintext. The decryption algorithm essentially reverses the encryption algorithm and is thus closely related to it.Encryption key: It is a value that is known to the sender. The sender inputs the encryption key into the encryption algorithm along with the plaintext in order to compute the ciphertext.Decryption key: It is a value that is known to the receiver. The decryption key is related to the encryption key, but is not always identical to it. The receiver inputs the decryption key into the decryption algorithm along with the ciphertext in order to compute the plaintext.
Hybrid Elliptic Curve Cryptographic Approach for Data Privacy and Authentication in Secured Map Reduce Layer (SMR) for Optimized CPU Utilization
Published in IETE Journal of Research, 2023
Arogya Presskila Xavier, Ramesh Kesavan
Another essential factor is the encryption and decryption of data privacy in secure records. Which, cryptography is used to provide data integrity by hidden printing. It consists of two steps, Encrypting and Decrypting [11]. The plain text is converted into Cipher text's by the term called encryption; vice versa, the Ciphertext is converted into a plain text called decryption. Symmetric and asymmetric approaches are typical types of cryptographic algorithms that were used. In symmetric-key cryptography, only one key is used for encryption of plain text and decryption of chipper text [12]. Some features do not require special properties, k-length strings, which are automatically chosen. The encryption process is using a public key in asymmetric key cryptography and the private key is used in the receiver position for decryption of chipper text is called Public Key cryptography [13]. We provide two keys Public Key and Private Key for this methodology. Elliptic curve cryptography (ECC) is an important protection aspect of current science. Compared to all cryptography approaches, it offers comprehensive protection [14,15].
Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system
Published in Connection Science, 2022
Mounika Jammula, Venkata Mani Vakamulla, Sai Krishna Kondoju
An LWC is a technique by which any information or message is exchanged securely between two or more remote parties through a communication network under the surveillance of an eavesdropper. Every cryptographic scheme consists of two processes, namely encryption and decryption. In the encryption process, a text message is encrypted (encoded) into a cipher text message, while during the decryption process, the encoded cipher text message is again decrypted (decoded) into the original text message. Moreover, every cryptographic scheme is either based on a pair of keys (public and private) or a single (shared) key which is/are used to convert the text message into cipher text and vice-versa. The proposed LWC-ABE method supports high expressiveness, access policy updates, large attribute domains, and white box traceability properties. White-box traceability is the process by which the system may identify the malicious user if a user in the system intentionally leaks their decryption key to an unauthorised user using the information included in the key. The features of the proposed LWC-ABE method are illustrated as follows: Large attribute domain: the number of authorised institutions influences the size of public parameters, which does not rise in a linear manner with respect to attributes. There is no need to update the system attributes if the system is formed.Policy modification: The data owners continuously change the policy access specifications and generate the different ciphertexts to meet the higher security standards. Further, according to policy modification, the data owners also fine tune the data access properties in a flexible manner.The system has the potential capability to monitor malevolent users who unlawfully distribute private keys. The white box traceability creates a list of users with their access permissions, which helps to identify unauthorised users with low computational cost.Many authorised authorities: The data integrity problems are solved by introducing the multiple authority system, which also solves the issue of the single authority's insufficient credibility. Human inaccuracy, whether intentionally or inadvertent, may undermine data integrity. Transfer errors, such as unintentional alterations or data compromise when moving information between devices. vulnerabilities, malware/viruses, hacking, and other online dangers are the main causes of data integrity.It allows for any monotonous access structure and any customisable access control access approach.