An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault  

在线阅读下载全文

作  者:Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 

机构地区:[1]Department of Computer Science,Alhamd Islamic University,Islamabad,44000,Pakistan [2]Department of Computer Science and Technology,University of Science and Technology Beijing,Beijing,100083,China [3]Department of Computer Science,National University of Technology,Islamabad,44000,Pakistan [4]Department of Electrical Engineering,National University of Technology,Islamabad,44000,Pakistan [5]Department of Computer Science and Information Systems,College of Applied Sciences,AlMaarefa University,Riyadh,13713,Saudi Arabia [6]Department of Computer Science,Faculty of Computer and Information Systems,Islamic University of Madinah,Medinah,42351,Saudi Arabia [7]Department of Information Technology,College of Computer Sciences and Information Technology College,Majmaah University,Al-Majmaah,11952,Saudi Arabia [8]Department of Natural and Applied Sciences,Faculty of Community College,Majmaah University,Majmaah,11952,Saudi Arabia

出  处:《Computers, Materials & Continua》2024年第1期589-616,共28页计算机、材料和连续体(英文)

基  金:Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2023-811.

摘  要:Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.

关 键 词:Replay attack MALWARE message attack file encryption CRYPTOLOGY data security 

分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象