Cascaded Encryption Scheme (CES) for Robust Content Security Over Internet Networks

نویسنده

  • O. B. Longe
چکیده

In an age when information exchange has been made more mobile by the advent and advances in internet technology, information security is assuming a worrisome dimension. Hacking, phishing, eavesdropping, scamming and a host of other vices have become the order of the day on communication channels. This research addresses the problem of data security on multimedia systems by proposing a cascaded approach to text encryption while in transit. The objective is to protect message content over public network by hybridizing and combining encryption algorithms in a cascaded format in a single document thus making breaking the codes more difficult for intruders. To counter this threats, new security technologies are required that persistently protect content throughout its lifetime. Conditional Access Systems (CAS) has been used to protect content delivered over cables. In [16] we presented a technique for protecting digital content on passing through Internet intermediaries. This present effort proposes a methodology that divides messages to be encrypted into packets coded using different encryption algorithm. Annotation techniques are implemented as pointers to sections within the documents to aid decryption. Index Terms Cascaded, Annotation, Access, Encryption, Protection, Internet, Intermediaries.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption

In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...

متن کامل

A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes

Voice over IP (VoIP) service has been widely deployed over the prevalent Internet due to the advanced technologies of digital voice compression, communication protocols, and wired/wireless networks. VoIP then benefitmuch lower cost of equipment, operation, and better integrationwith data applications than voice communications over telephony networks. On the other hand, VoIP further introduce se...

متن کامل

Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †

Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in cons...

متن کامل

A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs

The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008