多层数据加密算法

M. Abid, S. Revathy
{"title":"多层数据加密算法","authors":"M. Abid, S. Revathy","doi":"10.1109/ICOEI48184.2020.9142890","DOIUrl":null,"url":null,"abstract":"Gentry, Sahai, and Waters created the first identity-based encryption (IBE) and lattice-based cryptography in CRYPTO 2013. This scheme is improved in this paper by exploiting the US National Security Agency's (NSA) hashing function. POSIX is used to create a small and portable algorithm to assimilate multiple keys under a single identity-key that enables protection under different identities to be evaluated as one. The encryption renders the original file transformed by splitting it and encrypting the resulting files before encrypting the combination as a whole. Focus has been converged on modulating and modifying available encryption techniques to be processed as multiple segments of a single algorithm for more robust and powerful application. Both, the passkey as well as the data is encrypted using sets of pre-defined encryption techniques and the algorithm is processed via legacy libraries to be more versatile and provide an easy to implement scheme. The algorithm is developed to be applied in the instances of standalone dataset or in cases of virtualization where the algorithm can be inherited by the subsystems as modules to be used for security purposes.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Multi-Tier Data Encryption Algorithm\",\"authors\":\"M. Abid, S. Revathy\",\"doi\":\"10.1109/ICOEI48184.2020.9142890\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Gentry, Sahai, and Waters created the first identity-based encryption (IBE) and lattice-based cryptography in CRYPTO 2013. This scheme is improved in this paper by exploiting the US National Security Agency's (NSA) hashing function. POSIX is used to create a small and portable algorithm to assimilate multiple keys under a single identity-key that enables protection under different identities to be evaluated as one. The encryption renders the original file transformed by splitting it and encrypting the resulting files before encrypting the combination as a whole. Focus has been converged on modulating and modifying available encryption techniques to be processed as multiple segments of a single algorithm for more robust and powerful application. Both, the passkey as well as the data is encrypted using sets of pre-defined encryption techniques and the algorithm is processed via legacy libraries to be more versatile and provide an easy to implement scheme. The algorithm is developed to be applied in the instances of standalone dataset or in cases of virtualization where the algorithm can be inherited by the subsystems as modules to be used for security purposes.\",\"PeriodicalId\":267795,\"journal\":{\"name\":\"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)\",\"volume\":\"281 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOEI48184.2020.9142890\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOEI48184.2020.9142890","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

Gentry, Sahai和Waters在CRYPTO 2013中创建了第一个基于身份的加密(IBE)和基于格子的加密。本文利用美国国家安全局(NSA)的哈希函数对该方案进行了改进。POSIX用于创建一个小型且可移植的算法,以在单个身份密钥下吸收多个密钥,从而使不同身份下的保护能够被评估为一个。加密通过拆分原始文件并在对整个组合进行加密之前对结果文件进行加密来呈现转换后的原始文件。重点已经集中在调制和修改可用的加密技术,将其作为单个算法的多个部分进行处理,以获得更健壮和强大的应用程序。密钥和数据都使用一组预定义的加密技术进行加密,算法通过遗留库进行处理,从而更加通用,并提供易于实现的方案。该算法被开发用于独立数据集的实例或虚拟化的情况下,其中算法可以被子系统继承为用于安全目的的模块。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Multi-Tier Data Encryption Algorithm
Gentry, Sahai, and Waters created the first identity-based encryption (IBE) and lattice-based cryptography in CRYPTO 2013. This scheme is improved in this paper by exploiting the US National Security Agency's (NSA) hashing function. POSIX is used to create a small and portable algorithm to assimilate multiple keys under a single identity-key that enables protection under different identities to be evaluated as one. The encryption renders the original file transformed by splitting it and encrypting the resulting files before encrypting the combination as a whole. Focus has been converged on modulating and modifying available encryption techniques to be processed as multiple segments of a single algorithm for more robust and powerful application. Both, the passkey as well as the data is encrypted using sets of pre-defined encryption techniques and the algorithm is processed via legacy libraries to be more versatile and provide an easy to implement scheme. The algorithm is developed to be applied in the instances of standalone dataset or in cases of virtualization where the algorithm can be inherited by the subsystems as modules to be used for security purposes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信