Cyber-attacks are increasing and varying dramatically day by day. It has become challenging to control cyber-attacks and to identify the perpetrators and their intentions. In general, the analysis of the intentions of cyber-attacks is one of the main challenges in digital forensics. In many cases of cyber-attacks, the analysis of the intent of the attacks determines the strategy and tools used in the attack, thus facilitating the process of identifying the perpetrator of the attack with greater accuracy. In this paper a model will be proposed to analyze the intentions of cyber-attacks. In this proposal, a set of steps will be conceived by linking them with a case-based reasoning methodology. This model will be examined by analyzing the intent of attacks for some cases and comparing the results with other methods of analyzing the intent of attacks. Hopefully the results will determine the intent of cyber-attacks more accurately.
No abstract
<p class="Affiliation">Recently, the security of digital images becomes an important issue with the rapid growth of digital communication and multimedia application. Recent cryptography algorithms are providing essential techniques to protect information and multimedia data. However, those algorithms are usually suffering from the problem of time-consuming. Encryption algorithms have been growth quickly and many image encryption methods have been used to protect information and multimedia data from unauthorized access. This research presents effective technique for image encryption which employs Red, Green and Blue (RGB) components of the RGB color image. The proposed technique utilizes matrix multiplication and inverse matrices for encryption-decryption purpose. Moreover, the effectiveness of the proposed encryption-decryption techniques lay on minimizing the encryption-decryption time and the square error between the original and the decrypted image. The evaluations of the proposed technique were done using many images with different sizes, while the ex perimental results show that the improved encryption technique time are greatly reduced compared with “RGB Color Image Encryption-Decryption Using Gray Image” method. The proposed technique has a high confidentiality level through using confusion diffusion sequentially with a square matrix key and two vectors keys. However, those keys are generated randomly and make the process of hacking the image very difficult.</p>
Information security is a very important science, especially after the continuous increase in cybercrime of all kinds, which caused very large financial, economic and political losses, so it was necessary to find a solution to protect the data and keep it secret. Data encryption is one of the most important solutions to preserve data and reduce cybercrime. The encryption process means converting the plain text using a private key into symbols and numbers that make this text incomprehensible to others. There are many algorithms that are used for encryption, and the public key algorithms are the strongest in the encryption process because they depend on two keys, the public key and the private key. One of the most important problems facing this type of algorithm is the lack of a clear mathematical model that facilitates understanding and how to deal with these keys. In this thesis, a mathematical model has been proposed in which two functions are defined, the public key and the function of the private key, based on the concepts and specific characteristics of the function. A general mathematical model was constructed by defining two functions, one for the public key and the other for the private key, using the properties of a function in mathematics, to produce strong keys used in the public key algorithm, to protect data and keep it secret, and this model was applied to the RSA and ELGamal algorithms. The most important result was that in the case of applying the mathematical model, it is easy to understand and deal with the public key and the private key mathematically.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.