检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi
机构地区:[1]Department of Computer Science,Alhamd Islamic University,Islamabad,44000,Pakistan [2]Department of Computer Science and Technology,University of Science and Technology Beijing,Beijing,100083,China [3]Department of Computer Science,National University of Technology,Islamabad,44000,Pakistan [4]Department of Electrical Engineering,National University of Technology,Islamabad,44000,Pakistan [5]Department of Computer Science and Information Systems,College of Applied Sciences,AlMaarefa University,Riyadh,13713,Saudi Arabia [6]Department of Computer Science,Faculty of Computer and Information Systems,Islamic University of Madinah,Medinah,42351,Saudi Arabia [7]Department of Information Technology,College of Computer Sciences and Information Technology College,Majmaah University,Al-Majmaah,11952,Saudi Arabia [8]Department of Natural and Applied Sciences,Faculty of Community College,Majmaah University,Majmaah,11952,Saudi Arabia
出 处:《Computers, Materials & Continua》2024年第1期589-616,共28页计算机、材料和连续体(英文)
基 金:Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2023-811.
摘 要:Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
关 键 词:Replay attack MALWARE message attack file encryption CRYPTOLOGY data security
分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.23.86.150