通过科罗娜大流行提供安全 Zoom 会议的建议

IF 0.9 4区 工程技术 Q3 ENGINEERING, MULTIDISCIPLINARY
Rasha S. Ali , Rajaa K. Hasoun , Inas Fadhil Jaleel , Ghassan H. Abdul-Majeed
{"title":"通过科罗娜大流行提供安全 Zoom 会议的建议","authors":"Rasha S. Ali ,&nbsp;Rajaa K. Hasoun ,&nbsp;Inas Fadhil Jaleel ,&nbsp;Ghassan H. Abdul-Majeed","doi":"10.1016/j.jer.2023.10.015","DOIUrl":null,"url":null,"abstract":"<div><p>The Zoom program is widely used to manage meetings around the world, but it is easy to leak the associated Personal Meeting ID. The present study aims at improving the security for Zoom meetings during the transmission process. A new encryption algorithm is proposed to achieve this goal. The system includes three steps namely; separating images, scrambling one-half of the image, encrypting, and substituting the other scrambled half. Implementation of these three steps is achieved by using: cutting the image vertically, Arnold Cut Map, and tRNA respectively. The Bioinformatics technique (tRNA) used in encrypting (red and green) colors, and the Arnold cut map used in the scrambling and shifting process in the encryption method. The performance of the proposed system is measured by using a series of tests such as key sensitivity, histogram analysis, information entropy, correlation analysis, NCPR, similarity, and PSNR test. The results reveal a high sensitivity for initial values, resistant to statistical attack, and have the best performance in the NCPR test. It also passes the evaluation criteria for the both encryption method and S-Box. The complexity of the suggested system is represented by the attacker's need to know many chaos parameters, the logistic method (Arnold cut map), the utilized visual cryptographic techniques, and the methods used to generate the S-Box and keys. The consumed time is fewer than AES algorithm because AES takes huge time in the encryption process especially for big data. The proposed key needs to refresh only one time to make big changed and produces high security.</p></div>","PeriodicalId":48803,"journal":{"name":"Journal of Engineering Research","volume":"12 2","pages":"Pages 91-100"},"PeriodicalIF":0.9000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2307187723002754/pdfft?md5=29475c6488c06b10745e8634ee36c54b&pid=1-s2.0-S2307187723002754-main.pdf","citationCount":"0","resultStr":"{\"title\":\"Proposal for providing secure Zoom meeting through Corona pandemic\",\"authors\":\"Rasha S. Ali ,&nbsp;Rajaa K. Hasoun ,&nbsp;Inas Fadhil Jaleel ,&nbsp;Ghassan H. Abdul-Majeed\",\"doi\":\"10.1016/j.jer.2023.10.015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>The Zoom program is widely used to manage meetings around the world, but it is easy to leak the associated Personal Meeting ID. The present study aims at improving the security for Zoom meetings during the transmission process. A new encryption algorithm is proposed to achieve this goal. The system includes three steps namely; separating images, scrambling one-half of the image, encrypting, and substituting the other scrambled half. Implementation of these three steps is achieved by using: cutting the image vertically, Arnold Cut Map, and tRNA respectively. The Bioinformatics technique (tRNA) used in encrypting (red and green) colors, and the Arnold cut map used in the scrambling and shifting process in the encryption method. The performance of the proposed system is measured by using a series of tests such as key sensitivity, histogram analysis, information entropy, correlation analysis, NCPR, similarity, and PSNR test. The results reveal a high sensitivity for initial values, resistant to statistical attack, and have the best performance in the NCPR test. It also passes the evaluation criteria for the both encryption method and S-Box. The complexity of the suggested system is represented by the attacker's need to know many chaos parameters, the logistic method (Arnold cut map), the utilized visual cryptographic techniques, and the methods used to generate the S-Box and keys. The consumed time is fewer than AES algorithm because AES takes huge time in the encryption process especially for big data. The proposed key needs to refresh only one time to make big changed and produces high security.</p></div>\",\"PeriodicalId\":48803,\"journal\":{\"name\":\"Journal of Engineering Research\",\"volume\":\"12 2\",\"pages\":\"Pages 91-100\"},\"PeriodicalIF\":0.9000,\"publicationDate\":\"2024-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2307187723002754/pdfft?md5=29475c6488c06b10745e8634ee36c54b&pid=1-s2.0-S2307187723002754-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Engineering Research\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2307187723002754\",\"RegionNum\":4,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering Research","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2307187723002754","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

摘要

Zoom 程序被广泛用于管理世界各地的会议,但相关的个人会议 ID 很容易泄露。本研究旨在提高 Zoom 会议在传输过程中的安全性。为实现这一目标,我们提出了一种新的加密算法。该系统包括三个步骤,即分离图像、对图像的二分之一进行加扰处理、加密和替换另一半加扰图像。这三个步骤分别通过垂直切割图像、阿诺德切割图和 tRNA 来实现。生物信息学技术(tRNA)用于加密(红色和绿色)颜色,阿诺德切割图用于加密方法中的加扰和移位过程。通过一系列测试,如密钥灵敏度、直方图分析、信息熵、相关性分析、NCPR、相似性和 PSNR 测试,衡量了所提系统的性能。结果表明,该系统对初始值具有很高的灵敏度,能抵御统计攻击,在 NCPR 测试中表现最佳。它还通过了加密方法和 S-Box 的评估标准。建议系统的复杂性体现在攻击者需要知道许多混沌参数、逻辑方法(阿诺德切割图)、使用的可视化加密技术以及生成 S-Box 和密钥的方法。消耗的时间比 AES 算法少,因为 AES 算法在加密过程中需要耗费大量时间,尤其是对大数据而言。而所提出的密钥只需刷新一次即可进行大的更改,并具有很高的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Proposal for providing secure Zoom meeting through Corona pandemic

The Zoom program is widely used to manage meetings around the world, but it is easy to leak the associated Personal Meeting ID. The present study aims at improving the security for Zoom meetings during the transmission process. A new encryption algorithm is proposed to achieve this goal. The system includes three steps namely; separating images, scrambling one-half of the image, encrypting, and substituting the other scrambled half. Implementation of these three steps is achieved by using: cutting the image vertically, Arnold Cut Map, and tRNA respectively. The Bioinformatics technique (tRNA) used in encrypting (red and green) colors, and the Arnold cut map used in the scrambling and shifting process in the encryption method. The performance of the proposed system is measured by using a series of tests such as key sensitivity, histogram analysis, information entropy, correlation analysis, NCPR, similarity, and PSNR test. The results reveal a high sensitivity for initial values, resistant to statistical attack, and have the best performance in the NCPR test. It also passes the evaluation criteria for the both encryption method and S-Box. The complexity of the suggested system is represented by the attacker's need to know many chaos parameters, the logistic method (Arnold cut map), the utilized visual cryptographic techniques, and the methods used to generate the S-Box and keys. The consumed time is fewer than AES algorithm because AES takes huge time in the encryption process especially for big data. The proposed key needs to refresh only one time to make big changed and produces high security.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Engineering Research
Journal of Engineering Research ENGINEERING, MULTIDISCIPLINARY-
CiteScore
1.60
自引率
10.00%
发文量
181
审稿时长
20 weeks
期刊介绍: Journal of Engineering Research (JER) is a international, peer reviewed journal which publishes full length original research papers, reviews, case studies related to all areas of Engineering such as: Civil, Mechanical, Industrial, Electrical, Computer, Chemical, Petroleum, Aerospace, Architectural, Biomedical, Coastal, Environmental, Marine & Ocean, Metallurgical & Materials, software, Surveying, Systems and Manufacturing Engineering. In particular, JER focuses on innovative approaches and methods that contribute to solving the environmental and manufacturing problems, which exist primarily in the Arabian Gulf region and the Middle East countries. Kuwait University used to publish the Journal "Kuwait Journal of Science and Engineering" (ISSN: 1024-8684), which included Science and Engineering articles since 1974. In 2011 the decision was taken to split KJSE into two independent Journals - "Journal of Engineering Research "(JER) and "Kuwait Journal of Science" (KJS).
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信