Volume 9 Number 1 March 2018

    
Towards a Hybrid Approach Based on Elliptic Curves and Cellular Automata to Encrypt Images

Hichem Bouchakour Errahmani, Kamel Mohamed Faraoun

https://doi.org/

Abstract In this paper, we present a new approach of image encryption using a stream ciphering model. The proposed pseudo-random number generator is based on combination of elementary one-dimensional cellular automata (CA)with elliptic curves. Indeed, we explored the transitions of the CA with the coordinates of a point belonging to an elliptic curve. The outcome from another point was multiplied by a scalar. CA... Read More


An Efficient New IBE Scheme in the Model Selective ID

Ramesh ch, K Venugopal Rao, D Vasumathi

https://doi.org/

Abstract A Public-Key System (especially Identity-Based Encryption) is said to be secure if it is proved to be secure against simulation studies, taking into account the purpose of the attacker and the model used. Among the goals there are indistinguished IND and semantic goal, regarding the models, we quote Chosen Plaintext Attack (CPA),Chosen Ciphertext Attack (CCA). Their combination gives INDistinguishability under Chosen Plaintext Attack... Read More


Research And Implementation of Computer Network User Behavior Forensics System based on System a Log

Wen Zhe Lu

https://doi.org/

Abstract In recent years, many computer forensics theoretical methods have been developed to provide efficient means to counter computer crimes. Computer evidence must be accurate and thorough. A design of architecture of a forensics system is given in this design, and the log data is the key Computer evidence to analyse. One of the key issues this paper tries to resolve is the log-data... Read More