[go: up one dir, main page]

Khanas et al., 2020 - Google Patents

Research on the use of algorithms for matrix transformations for encrypting text information

Khanas et al., 2020

Document ID
2421578052356462213
Author
Khanas Y
Borecki M
Publication year
Publication venue
Security and Privacy

External Links

Snippet

Several algorithms are presented in the article for the transformation of numerical matrices by nonstandard means. These algorithms are shown in the data encryption task, namely, a text message with a certain set of characters. An analysis of the effectiveness of the …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Wang et al. Understanding human-chosen pins: characteristics, distribution and security
KR101059798B1 (en) Password input system and method using two alpha-numeric matrices
CN106161006B (en) Digital encryption algorithm
CN103491062B (en) Method and device for generating password
KR101133544B1 (en) Password input system using alpha-numeric matrix and password input method using the same
Omolara et al. Developing a modified hybrid caesar cipher and vigenere cipher for secure data communication
CN101374149A (en) Method and system for preventing password theft
Ciampa A comparison of password feedback mechanisms and their impact on password entropy
Voyiatzis et al. An empirical study on the web password strength in Greece
CN105447374B (en) Computer implemented system for generating and giving for change authorization code and method
Arroyo et al. Polybius square in cryptography: a brief review of literature
CN101877636A (en) Equation password encryption method
Licayan et al. Enhancing playfair cipher using seed based color substitution
Khanas et al. Research on the use of algorithms for matrix transformations for encrypting text information
Gabor et al. Security issues related to e-learning education
KR101899901B1 (en) Database security method and apparatus
Erike et al. Dynamic User-Dependent Technique for Robust Multi-Password Generation Against Offline Cracking Attacks
RU2538913C2 (en) Method for depersonalisation of personal data
Bharti et al. The empirical study and analysis of the blockchain technology
Al-Nasrawi New cryptographic system of romanized Arabic text based on modified playfiar
Srinivasa Ravi Kiran et al. Implementing Multilevel Graphical Password Authentication Scheme in Combination with One Time Password
Metilda et al. Password generation using array generating interval timed colored Petri net (AGITCPN) for effective security
Rani et al. A novel session password security technique using textual color and images
Biocco et al. Grid authentication: A memorability and user sentiment study
Varshney et al. A Robust Graphical Authentication System for the Shoulder Surfing Attack