{"title":"OCA: An intelligent model for improving security breach of biometric based authentication systems","authors":"Sandeep Kumar Sharma, Anil Kumar, Rashmi Ashtagi, Rekha Jain","doi":"10.47974/jdmsc-1765","DOIUrl":"https://doi.org/10.47974/jdmsc-1765","url":null,"abstract":"In the recent era, biometrics is one of the most used authentication systems. Generally, biometric systems are based on imaging technology, which works on scanned images. This system processes the image and compares it with the database and decides authenticity of user. Authentication and faster response are the key objectives of all biometric systems, but they suffered from a serious issue i.e., security breach. In this article, a Cellular Automata based method is introduced, which processes the image and identify possible security breaches. The proposed method analysis all the pixels of the image and maps a rule, which processes the image and generates a gray image by defining all the possible edges of the image objects. The gray image contains only binary values, which may reduce the chance of breach and decrease the comparison time of gray image with database. In this paper, the proposed method is experimented on the open-source dataset and the results are validated using authentication parameters.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticated key exchange protocol security of cloud services management using machine learning","authors":"Vani Agrawal, Nilesh Dubey, Virendra Singh, Nepali Singla, Sarvesh Kumar, Dinesh Goyal","doi":"10.47974/jdmsc-1761","DOIUrl":"https://doi.org/10.47974/jdmsc-1761","url":null,"abstract":"The reason for cloud-based confirmation is to shield organizations from programmers attempting to take classified data. Cloud validation permits approved clients across organizations and landmasses to safely get to data put away in the cloud with verification given through cloud-based administrations. Artificial intelligent (AI) permits organizations to empower the information to show the framework how to tackle the central issue with AI calculations and how to get better after some time. The present undertakings are assaulted with information. To drive better business decisions, they need to sort out it. Distributed computing is a huge term for all Data Science and Machine Learning Enthusiasts. It is far-fetched that you probably won’t have run over it, even as a juvenile. The most important issue is that this type of security is needed for the cloud services. A clear explanation for this is that as the dataset develops, i.e., more models and features are added, the AI model ends up being more multifaceted. Internet Key Exchange (IKE) is a standard convention used to set up a safe and confirmed correspondence channel between two gatherings through a virtual private network (VPN). The convention guarantees security for VPN exchange, remote host and organization access.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Baqer Hashim Al-Hakeem, Nuhad Salim Al-Mothafar
{"title":"Semi-essentially prime modules","authors":"Mohammed Baqer Hashim Al-Hakeem, Nuhad Salim Al-Mothafar","doi":"10.47974/jdmsc-1631","DOIUrl":"https://doi.org/10.47974/jdmsc-1631","url":null,"abstract":"Let R be a commutative ring with 1 and M be a (left) unitary R – module. This essay gives generalizations for the notions prime module and some concepts related to it. We termed an R – module M as semi-essentially prime if annR (M) = annR (N) for every non-zero semi-essential submodules N of M. Given some of their advantages characterizations and examples, and we study the relation between these and some classes of modules.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raju M. Sairise, Suresh Limkar, Sarika T. Deokate, Shrinivas T. Shirkande, Rupali Atul Mahajan, Anil Kumar
{"title":"Secure group key agreement protocol with elliptic curve secret sharing for authentication in distributed environments","authors":"Raju M. Sairise, Suresh Limkar, Sarika T. Deokate, Shrinivas T. Shirkande, Rupali Atul Mahajan, Anil Kumar","doi":"10.47974/jdmsc-1825","DOIUrl":"https://doi.org/10.47974/jdmsc-1825","url":null,"abstract":"Secure communication is crucial in today’s increasingly interconnected world, especially in distributed contexts where several parties must cooperate while maintaining confidentiality and authenticity. In order to overcome these difficulties, this work introduces a novel Secure Group Key Agreement Protocol (SGKAP) strengthened with Elliptic Curve Secret Sharing (ECSS).The proposed SGKAP uses the strength of elliptic curve cryptography to provide a shared secret key across participants, assuring data transmission confidentiality. Contrary to conventional methods, SGKAP integrates ECSS as a second layer of security to verify participant identity, thus boosting the protocol’s resistance to malevolent adversaries.To create a shared group key, members exchange their elliptic curve public keys at the start of the protocol. During this stage, ECSS is used, and participants create distinctive authentication tokens using their personal secrets. Participants exchange and verify these tokens among themselves, ensuring that only those with the proper permissions have access to the group key.In addition to guaranteeing data confidentiality, SGKAP also verifies the group members’ participation. Furthermore, by mandating secret-sharing-based authentication, ECSS strengthens the protocol’s resistance to insider attacks.We carried out a comprehensive set of simulations and experiments in various distributed contexts to assess the performance and security of SGKAP with ECSS.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135357941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
{"title":"An examination of the security of the TR-31 and AS 2805 schemes","authors":"Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf","doi":"10.47974/jdmsc-1644","DOIUrl":"https://doi.org/10.47974/jdmsc-1644","url":null,"abstract":"In our review of payments cryptography, we analyze the security of the Australian card payment system. In the analysis, we examine existing cryptographic protocols using well-known techniques. We discuss the Australian Triple-DES variant methods (AS 2805) which offer key usage division. We then compare Triple-DES variants with alternative mechanisms to discover a significant weakness in the AS 2805 methods.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135843804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The optimized Diffie-Hellman key exchange using the graphical method","authors":"Huda Kadhim M. Aljader, Ruma Kareem K. Ajeena","doi":"10.47974/jdmsc-1615","DOIUrl":"https://doi.org/10.47974/jdmsc-1615","url":null,"abstract":"In this paper, we describe a new contribution that uses the optimization problem to create a new version of the Diffie-Hellman key exchange (DHKE). The proposed version depended on the optimized discrete logarithm functions (ODLFs) that are given as a new definition in this work. A graphical method considers a fundamental tool to compute a shared secret key (SSK) in the proposed optimized Diffie-Hellman key exchange (ODHKE). The ODHKE is a more secure protocol for computing the SSK in comparison with the original DHKE.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135843811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of S-boxes with LBN and DBN ≥ 4","authors":"Sonu Pal, Saibal. K. Pal, Anupama Panigrahi","doi":"10.47974/jdmsc-1572","DOIUrl":"https://doi.org/10.47974/jdmsc-1572","url":null,"abstract":"There is always a need for good and safe S-boxes in block ciphers for secure communication. To improve the security of lightweight block ciphers, S-boxes with high linear and diiferential branch numbers (LBN and DBN) are utilized. Many of these S-boxes have been built in recent years. Sarkar et. al. built S-boxes with LBN and DBN both equal to 3. Kim Hangi et. al. also created 8-bit S-boxes using smaller S-boxes with at least 3 LBN and DBN. In this direction, we narrow the search space of 8 × 8 S-boxes with LBN = DBN = 4. We used the Feistel and Lai-Massey structures to build these S-boxes. We present a detailed explanation of such 8 × 8 S-boxes.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135844183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kamal Upreti, Sheng-Lung Peng, Pravin Ramdas Kshirsagar, Prasun Chakrabarti, Halah A. Al-Alshaikh, A. K. Sharma, Ramesh Chandra Poonia
{"title":"A multi-model unified disease diagnosis framework for cyber healthcare using IoMT- cloud computing networks","authors":"Kamal Upreti, Sheng-Lung Peng, Pravin Ramdas Kshirsagar, Prasun Chakrabarti, Halah A. Al-Alshaikh, A. K. Sharma, Ramesh Chandra Poonia","doi":"10.47974/jdmsc-1831","DOIUrl":"https://doi.org/10.47974/jdmsc-1831","url":null,"abstract":"The past several decades of research into machine learning have been of great assistance to humanity in the diagnosis of a variety of ailments using various forms of automated diagnostic procedures. Machine learning, combined with smart health devices, has improved health monitoring, timely diagnoses, and treatment. This paper introduces a unified disease diagnosis framework, integrating cloud computing, machine learning, and IoT. The framework has three layers: physical (collects patient data), fog (intermediate layer with a domain identification unit to determine input and diagnosis type), and transmission (cloud server with a disease detection unit). The performance evaluation shows the robustness and efficiency of the model as compared to state-of-art models.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Huff curve–ElGamal graphic public key cryptosystem","authors":"Batool Hatem Akar Alkfari, Ruma Kareem K. Ajeena","doi":"10.47974/jdmsc-1640","DOIUrl":"https://doi.org/10.47974/jdmsc-1640","url":null,"abstract":"A new graph for the cryptographic application is presented in this work. This graph is defined using the Huff curve over a prime field. The Huffs curve graph (HCg) considered as an alternative graph of the Edwards curve graph (EdCG).The HCg is used to give another modified Version Public-key cryptosystem ElGamal (EPKC) the proposed HC-ElGamal graphic cryptosystem enhances the secure communication in compare with original EPKC.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gaikwad Vidya Shrimant, K. Ravindranath, Gudapati Syam Prasad
{"title":"A mathematical model for secure Cloud-IoT communication: Introducing the revolutionary lightweight key mechanism","authors":"Gaikwad Vidya Shrimant, K. Ravindranath, Gudapati Syam Prasad","doi":"10.47974/jdmsc-1750","DOIUrl":"https://doi.org/10.47974/jdmsc-1750","url":null,"abstract":"Internet of Things (IoT) is a new technology in telecommunications that focuses on wireless, remote communication. It involves connecting various smart devices to build a network that can transfer data through the cloud. In this type of environment, challenges such as device life span of battery, space needed for storage, consumption of power, and data security for cloud IoT have been identified. This work presents the design and implementation of a secure lightweight key establishment system for the integration of IoT Cloud. A Symmetric Lightweight Algorithm is utilized to enhance the security of Cloud IoT. To improve the efficiency of key setup time, the Advanced Encryption Standard (AES) is applied. The use of AES algorithm in combination with Cloud and IoT Security ensures efficient and consistent performance across software and hardware platforms in various environments. This integration allows for the connection of various smart devices and sensors to Cloud IoT services, facilitating the sharing of sensor readings while addressing security concerns. Before any data is transferred, we securely authenticate both the cloud server and IoT device and generate unique session keys for each new communication session. We conclude by discussing about how cloud computing helps IoT technology achieve secure connection by overcoming various security challenges.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}