Accepted Papers

  • Cryptographic strength estimation using Spurious Keys with considerati

    Mekala Rama Rao and Department of Electronics and Communication Engineering, Jawaharlal Nehru Technological University Hyderabad, Telangana, India


    In the era of digital economy, the security of ones wealth depends on the cryptosystem used by the e-wallet provider. The privacy of a social networking user depends on the strength of the cryptogram used. With the increased attacks on the personal data and banking system through cyber space, it is important to have new dimensional measures to estimate the strength of a cryptosystem. One such method which considers message as a text and measures the strength of the system based on the language of the message, is presented in this paper. Among the available private key cryptosystems, namely stream ciphers and block ciphers, the advantage of block ciphers is that they can be synchronized i.e. losing one cipher text can not affect the correctness of the decryption of the following blocks. The encrypter used in block ciphers is a memoryless device. Block ciphers can be easily standardized due to the fact that they transmit information in blocks. But the disadvantage is that identical plaintexts result in identical cipher texts. As these data patterns are not hidden by the algorithm, the complexity of the system has questionable influence on the cryptanalysis process. A need for new measure of strength estimation is thus required for block ciphers. A new approach to determine cryptographic strength, namely spurious key analysis for block ciphers is evaluated in this paper.

    The very purpose of the paper is to examine the possibilities of considering spurious key analysis as one of the strongest methods to estimate the strength of a Cryptosystem. Though there are other methods like cryptanalysis, the importance of the language used in the message is emphasized in this analysis. Spurious key analysis has been performed on two sets of plaintexts containing two different scripts namely English and Devanagari.


    Nanabayin Menyah and Ahmet zmen, Department of Computer Engineering, Sakarya University, Sakarya, Turkey


    Message Queue Telemetry Transport (MQTT) is a common light weight, open, simple, client-server publish/subscribe messaging transport protocol that supports three Quality of Service (QoS) levels for reliable communication. It is useful and efficient for most resource constrained IoT devices. In this work, an experimental setup is designed to demonstrate the network performance of MQTT protocol on a constrained device for different QoS levels and variable size of payloads. The novel part of this study covers client-side encryption of payloads and its effect over network performance. We used 128-bits Advanced Encryption Standard (AES). The messages are transferred using three different QoS levels in MQTT over real wired low-end publish client and low-end subscriber client via a broker server based on different payload sizes. The packets are captured to analyze end-to-end latency, throughput and message loss along with the measurement of encryption and decryption processing time.

  • Block Chain Based Data Logging and Integrity Management System for Clo

    Jun Hak Par1, Jun Young Park1,Eui Nam Huh2, 1Department of Computer Science and Engineering, Kyung Hee University, Yongin-si, South Korea, 2Department of Computer Science and Engineering, Kyung Hee University, Yongin-si, South Korea


    Along with the increasing use of cloud services, security threats are also increasing and attack methods are becoming more diverse. However, there are still few measures and policies to deal with security incidents in the cloud environment. Although many solutions have been proposed through research on digital forensics for responding to security incidents, but it is still difficult to prove the integrity of evidence collection and storage in the cloud environment. To solve these problems, in this paper, we propose a blockchain based data logging and integrity management system for cloud forensics. In addition, compare the performance of the proposed system with the other blockchain based cryptocurrency.

                                                                                          Copyright CSIA 2017                                                                                  Designed By Wireilla