scispace - formally typeset
Search or ask a question
Author

H.S. Mohan

Bio: H.S. Mohan is an academic researcher from SJB Institute of Technology. The author has contributed to research in topics: Block cipher & Encryption. The author has an hindex of 2, co-authored 3 publications receiving 25 citations.

Papers
More filters
01 Jan 2011
TL;DR: This paper presents measured diffusion value of AES and MARS algorithms, which shows that the number of rounds is chosen such that the algorithm provides the SAC value.
Abstract: Block ciphers are very important in communication systems as they provide confidentiality through encryption. The popular block ciphers are Advanced Encryption Standard (AES) and MARS algorithms. Each cipher uses several rounds of fixed operations to achieve desired security level. The security level is measured in terms of diffusion and confusion. The diffusion level should be at least equal to strict avalanche criterion (SAC) value. Therefore, the number of rounds are chosen such that the algorithm provides the SAC value. This paper presents measured diffusion value of AES and MARS algorithms. Diffusion values are compared for both the algorithms: AES and MARS. Similarly, speed of each algorithm is compared.

22 citations

Proceedings ArticleDOI
05 Aug 2010
TL;DR: HCF is implemented in the Linux kernel, and the security mechanism in Globus Toolkit (GT4) is deployed to ensure that HCF can identify the spoofed packet in a Grid Environment.
Abstract: IP spoofing has been exploited by Distributed Denial of Service (DDoS) attacks to conceal flooding sources and localities in flooding traffic, and prevent legitimate hosts into becoming reflectors, redirecting and amplifying flooding traffic. Thus, the ability to filter spoofed IP packets near victims is essential to their own protection as well as to their avoidance of becoming congestion and involuntary DoS reflectors. Although an attacker can forge any field in the IP header, he or she cannot falsify the number of hops an IP packet takes to reach its destination. This hop count information can be inferred from the Time- to-Live (TTL) value in the IP header. Using a mapping between IP addresses and their hop-counts to an Internet server, the server can distinguish spoofed IP packets from legitimate ones. Based on this observation, we present a novel filtering technique that is immediately deployable to weed out spoofed IP packets. We have an IP to Hop Count Mapping Table (IP2HC) to store the Hop Count Values. We implement HCF in the Linux kernel, demonstrating its benefits using experimental measurements. We deploy the security mechanism in Globus Toolkit (GT4) to ensure that HCF can identify the spoofed packet in a Grid Environment.

2 citations

Journal ArticleDOI
TL;DR: This paper proposes a method of enhancing the diffusion power by key multiplication rather than conventional key addition used in the Advanced encryption standard algorithm, and the measured results indicate more diffusion when compared with the existing method.
Abstract: Block ciphers are very important in communication systems as they provide confidentiality through encryption. The popular block cipher is an Advanced Encryption Standard (AES). Each cipher uses several rounds of fixed operations to achieve desired security level. The number of rounds in a block cipher is decided based upon the resistivity levels against the known attacks. The very first level of attack on an encryption algorithm is to search for repetitive cipher values and relate them to plaintext. The diffusion enables to spread out the repetitive plain text patterns in the cipher values. The diffusion is achieved using linear operations such as key addition, rotate byte, MDS matrix multiplication, etc. In this paper we propose a method of enhancing the diffusion power by key multiplication rather than conventional key addition used in the Advanced encryption standard algorithm. The paper discusses the problems associated with the key multiplication and provides the possible solutions. The measured results indicate more diffusion when compared with the existing method. Key multiplication, as a diffusion element, is a better solution in the design of encryption algorithms.

1 citations

Proceedings ArticleDOI
23 Apr 2022
TL;DR: A multi-blockchain access control architecture with lightweight privacy protection in cloud called Autherization-Privacy, which begins with account address of the node in blockchain as the unique id and defines the admission permission of data for cloud, which is cypher and kept in blockchain.
Abstract: The applications of the blockchain technology are still being discovered. When a new potential disruptive technology emerges, there is a tendency to try to solve every problem with that technology. With the expansion and intensity of cloud computing, cloud security has become a critical concern in the area. One of the most important security measures for securing sensitive data hosted in the cloud is access control. To overcome this problem, we offer a multi-blockchain access control architecture with lightweight privacy protection in cloud called Autherization-Privacy. We begin with account address of the node in blockchain as the unique id and at the same time, define the admission permission of data for cloud, which is cypher and kept in blockchain.
Journal ArticleDOI
TL;DR: In this paper , a shuffled shepherd squirrel optimization (SSSOA) technique is devised for in-network aggregation in WSN, where the path is formulated from source node to destination through routing process, and source node broadcasts a packet concurrently to destination.
Abstract: The wireless sensor network (WSN) is commonly based on small node collaboration. These nodes are specified by wireless communication, low price, and energy consumption. Moreover, the WSN can be utilized to compute pressure, temperature, as well as monitoring health, military supervision, and so on. A variety of WSN applications need to gather data from sensor nodes based on sink. In this paper, shuffled shepherd squirrel optimization (SSSOA) technique is devised for in-network aggregation in WSN. Here, the path is formulated from source node to destination through routing process, and source node broadcasts a packet concurrently to destination. The WSN is initiated, and the suitable cluster head (CH) is selected from all nodes. Consequently, CH is selected based on the developed shuffled shepherd squirrel optimization (SSSOA) method.

Cited by
More filters
01 Jan 2013
TL;DR: This paper has used symmetric cryptographic technique AES (Advance encryption standard) having 200 bit block as well as key size and the same conventional 128 bit conventional AES algorithm is implemented for 200 bit using 5*5 Matrix.
Abstract: With the fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against various attacks. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. Two types of cryptographic techniques are being used: symmetric and asymmetric. In this paper we have used symmetric cryptographic technique AES (Advance encryption standard) having 200 bit block as well as key size. And the same conventional 128 bit conventional AES algorithm is implemented for 200 bit using 5*5 Matrix. After the implementation, the proposed work is compared with 128 bit, 192 bits & 256 bits AES techniques on two points. These points are encryption and decryption time and throughput at both encryption and decryption sides.

64 citations

Proceedings ArticleDOI
31 Oct 2013
TL;DR: The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round.
Abstract: Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient. In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient. We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round. C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.

55 citations

Journal ArticleDOI
TL;DR: The security goals were enhanced via "A New Approach for Complex Encr ypting and Decrypting Data" which maintains the security on the communication channels by making it difficult for attacker to predicate a pattern as well as speed of the encryption / decryption scheme.
Abstract: During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very hard to crack. Cryptography plays major roles to fulfilment these demands. Nowadays, many of researchers have proposed many of encryption and decryption algorithms such as AES, DES, RSA, and others. But most of the proposed algorithms encounteredsome problems such as lack of robustness and significant amount of time added to packet delay to maintain the security on the communication channelbetween the terminals. In this paper, the security goals were enhanced via "A New Approach for Complex Encr ypting and Decrypting Data" which maintains the security on the communication channels by making it difficult for attacker to predicate a pattern as well as speed of the encryption / decryption scheme.

47 citations

Journal ArticleDOI
TL;DR: This research aims to fix the gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF), which provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.
Abstract: The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

33 citations

Proceedings ArticleDOI
01 Aug 2014
TL;DR: A comprehensive survey to all sorts of HTTP-based DoS and DDoS attacks is conducted in order to figure out and identify the optimal specifications for a protective framework against HTTP- Based Denial of Service (DoS) and Distributed Denial Of Service (DDoS) attacks.
Abstract: Nowadays, the most distinct threat to the web applications is HTTP-based Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack, which it causes a massive damage to them and corrupt their works completely. Up to now, various researches are accomplished in this field for the sake of identifying and determining the most convenientrequired specifications for a protective solution that helps to protect web applications from HTTP-based DoS and DDoS attacks. Unfortunately, despite of that,the optimal specifications of the protective solution have not been identified, and therefore this paper comes out to state and identify these missing specifications. In this paper, a comprehensive survey to all sorts of HTTP-based DoS and DDoS attacks is conducted in order to figure out and identify the optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks.

14 citations