Khanas et al., 2020 - Google Patents
Research on the use of algorithms for matrix transformations for encrypting text informationKhanas et al., 2020
- Document ID
- 2421578052356462213
- Author
- Khanas Y
- Borecki M
- Publication year
- Publication venue
- Security and Privacy
External Links
Snippet
Several algorithms are presented in the article for the transformation of numerical matrices by nonstandard means. These algorithms are shown in the data encryption task, namely, a text message with a certain set of characters. An analysis of the effectiveness of the …
- 230000001131 transforming 0 title abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Understanding human-chosen pins: characteristics, distribution and security | |
KR101059798B1 (en) | Password input system and method using two alpha-numeric matrices | |
CN106161006B (en) | Digital encryption algorithm | |
CN103491062B (en) | Method and device for generating password | |
KR101133544B1 (en) | Password input system using alpha-numeric matrix and password input method using the same | |
Omolara et al. | Developing a modified hybrid caesar cipher and vigenere cipher for secure data communication | |
CN101374149A (en) | Method and system for preventing password theft | |
Ciampa | A comparison of password feedback mechanisms and their impact on password entropy | |
Voyiatzis et al. | An empirical study on the web password strength in Greece | |
CN105447374B (en) | Computer implemented system for generating and giving for change authorization code and method | |
Arroyo et al. | Polybius square in cryptography: a brief review of literature | |
CN101877636A (en) | Equation password encryption method | |
Licayan et al. | Enhancing playfair cipher using seed based color substitution | |
Khanas et al. | Research on the use of algorithms for matrix transformations for encrypting text information | |
Gabor et al. | Security issues related to e-learning education | |
KR101899901B1 (en) | Database security method and apparatus | |
Erike et al. | Dynamic User-Dependent Technique for Robust Multi-Password Generation Against Offline Cracking Attacks | |
RU2538913C2 (en) | Method for depersonalisation of personal data | |
Bharti et al. | The empirical study and analysis of the blockchain technology | |
Al-Nasrawi | New cryptographic system of romanized Arabic text based on modified playfiar | |
Srinivasa Ravi Kiran et al. | Implementing Multilevel Graphical Password Authentication Scheme in Combination with One Time Password | |
Metilda et al. | Password generation using array generating interval timed colored Petri net (AGITCPN) for effective security | |
Rani et al. | A novel session password security technique using textual color and images | |
Biocco et al. | Grid authentication: A memorability and user sentiment study | |
Varshney et al. | A Robust Graphical Authentication System for the Shoulder Surfing Attack |