Data Security Using Private Key Encryption System Based on Arithmetic Coding
نویسندگان
چکیده
منابع مشابه
Data Security Using Private Key Encryption System Based on Arithmetic Coding
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique ha...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملNormalized Unconditional ϵ-Security of Private-Key Encryption
In this paper we introduce two normalized versions of non-perfect security for private-key encryption: one version in the framework of Shannon entropy, another version in the framework of Kolmogorov complexity. We prove the lower bound on either key entropy or key size for these models and study the relations between these normalized security notions.
متن کاملSecurity of private-key encryption based on array codes - Electronics Letters
parity for model-based stereo correspondence has been described. This predctor is based on the fact that the vertical disparity depends very weakly on the depth structure of the scene [2] under certain conditions. The vertical disparity is approximated by a quadratic expression of image eccentricities x and y. The coefficiencies in the expression can be estimated from the object structure model...
متن کاملPrivate-key Symbolic Encryption Schemes
Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security analysis aiming at the automated verification of network protocols. The näıve use of symbolic encryption, however, may unnecessarily require an expensive construction: an arbitrary-length encryption scheme that is private and non-malleable in an adaptive CCACPA setting. Most of the time, such assumptions rem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Network Security & Its Applications
سال: 2011
ISSN: 0975-2307
DOI: 10.5121/ijnsa.2011.3305