Topic
Plaintext-aware encryption
About: Plaintext-aware encryption is a research topic. Over the lifetime, 1980 publications have been published within this topic receiving 101775 citations. The topic is also known as: Plaintext awareness.
Papers published on a yearly basis
Papers
More filters
••
21 citations
••
14 Nov 2013TL;DR: This paper proposed an algorithm to improve image security and its authority for its owner by means of watermarking and encryption technique and has used blind watermark extraction technique for extraction of the watermark.
Abstract: This paper proposed an algorithm to improve image security and its authority for its owner. This has been achieved by means of watermarking and encryption technique. Two methods RC4 and Advances Encryption Standard (AES) are adopted for encryption which uses stream cipher and block cipher respectively. For getting the watermarked image Rational Dither Modulation (RDM) method is used. First step of the algorithm is to embed the watermark and then the watermarked image is encrypted using secret key of the encryption technique. We have used blind watermark extraction technique for extraction of the watermark. Performance of the watermarking and encryption techniques is investigated for robustness, perceptual quality and security of the proposed algorithm.
21 citations
••
27 Jun 2014TL;DR: This article suggests an alternative on DES to obtain higher security and better execution efficiency by increasing the key size and updating the iteration technique, and demonstrates that the proposed algorithm outperforms both previous algorithms.
Abstract: In this age of explosive growth in information exchanges, there is indeed no time at which security does not matter. One of the symmetric encryption algorithms, DES, has kept its dominant position in the area of data encryption over the last few decades. However, with a rapid development in the field of computer hardware, DES has already been proved insecure. It takes a short time to translate the ciphertext to its corresponding plaintext using brute-force method at a reasonable cost. This is mainly due to the small key size DES employed. Given these issues, the objective of this article is to suggest an alternative on DES to obtain higher security and better execution efficiency by increasing the key size and updating the iteration technique. Comparisons were conducted with both DES and the advanced DES named triple DES (3DES). The results have demonstrated that the proposed algorithm outperforms both previous algorithms.
21 citations
••
10 Feb 2005TL;DR: This paper shows that KEM semantically secure against adaptively chosen ciphertext attacks (IND-CCA2) and DEM semanticallySecure against adaptive chosen plaintext/ciphertext attacks(IND-P2-C2) along with secure signatures and ideal certification authority are sufficient to realize a universally composable (UC) secure channel.
Abstract: For ISO standards on public-key encryption, Shoup introduced the framework of KEM (Key Encapsulation Mechanism), and DEM (Data Encapsulation Mechanism), for formalizing and realizing one-directional hybrid encryption; KEM is a formalization of asymmetric encryption specified for key distribution, and DEM is a formalization of symmetric encryption. This paper investigates a more general hybrid protocol, secure channel, using KEM and DEM, such that KEM is used for distribution of a session key and DEM, along with the session key, is used for multiple bi-directional encrypted transactions in a session. This paper shows that KEM semantically secure against adaptively chosen ciphertext attacks (IND-CCA2) and DEM semantically secure against adaptively chosen plaintext/ciphertext attacks (IND-P2-C2) along with secure signatures and ideal certification authority are sufficient to realize a universally composable (UC) secure channel. To obtain the main result, this paper also shows several equivalence results: UC KEM, IND-CCA2 KEM and NM-CCA2 (non-malleable against CCA2) KEM are equivalent, and UC DEM, IND-P2-C2 DEM and NM-P2-C2 DEM are equivalent.
21 citations
••
TL;DR: An amplitude-phase retrieval attack free encryption scheme is proposed by using two random masks, where one is considered as the random image and other as the public key, which can be easily implemented with the 4 f optical system.
21 citations