A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kannammal, A.
- E Market Place Security Using Elliptic Curve Distributed Key
Authors
1 Dept. of Computer Science, Tamil University, Thanjavur, IN
2 CIT, Coimbatore, IN
3 Karpagam University, IN
4 Tamil University, IN
Source
Networking and Communication Engineering, Vol 3, No 13 (2011), Pagination: 830-832Abstract
Aiming to develop an e-market, need to consider not only technological, but also business issues that might affect their acceptance and profitability. By describing an example of an e-market application, this paper discusses these issues and shows that although technology may provide various different solutions for the development of an e-market, it cannot on its own lead to an e-market’s success. During the last decade e-commerce has quickly evolved through a succession of business models. The commercially operational business sites in eleven categories: e-shop, e-auction, e-procurement, e-mall, third party marketplace, virtual communities, value chain service provider, value chain integrator, collaboration platform, information brokerage and trust. However, that the Internet economy has divided the overall market space into three broader structures: Portals, Market Makers, and Product Service providers. A portal engages primarily in building a community of users seeking information about products and services. A market maker plays a similar role with that of a portal in building a community of buyers, customers. A community of suppliers of products and services. However, market makers differ from portals in that they provide, handle and facilitate the business transaction that takes place between the buyer and the supplier. Last but not least, the product, service providers are dealing directly with their customers when it ultimately comes to the business transaction. These three structures incorporate various business models or different definitions. For example, a market maker is similar to an e-mall, a third party marketplace, an e-marketplace or an e-market. For reasons of clarity, in this paper, define our application by using the term “e-market”. E-markets have evolved and become important elements in the Internet-age economy. The main functionality of an electronic market is to match seller offerings with buyer preferences.Keywords
E-Market, ECC, Distributed Key.- Algorithm for Cryptanalysis with Application to Data Encryption Standard
Authors
Source
Networking and Communication Engineering, Vol 1, No 6 (2009), Pagination: 240-244Abstract
A random search through a finite but large key space is not usually an acceptable cryptanalysis approach. The focus of this work is on the use of a genetic algorithm (GA) to conduct a directed search in a key space. The structure of Lucifer was significantly altered and since the design rationale was never made public and the secret key size was reduced from 128-bit to 56-bits this initially resulted in controversy, and some distrust among the public. In this paper, a new method has been developed for the first time to break DES like examples. These examples include both DES with eight rounds. The performance of the proposed method, as such, is considerably faster than exhaustive search and differential cryptanalysis. Therefore, it can be directly applied to a variety of DES like systems instead of the current techniques. Here, a Genetic Algorithm, GA, is proposed for the cryptanalysis is of DES like systems to find out the underlying key. The genetic algorithm approach is adopted, for obtaining the exact key by forming an initial population of keys that belong to the key subspace. In the proposed algorithms, the premature convergence could be avoided by dynamic variation of control parameters that can affect the fitness function. DES uses a 56-bit encryption key. The key size was apparently dictated by the memory and processing constraints imposed by a single-chip implementation of the algorithm for DES. The key itself is specified with 8 bytes, but one bit of each byte is used as a parity check.
Keywords
Data Encryption Standard, Encryption Algorithm, Genetic Algorithm.- Active Network Approach for Security Management
Authors
1 Department of Computer Science, Tamil University, Thanjavur-10, IN
2 Department of Computer Technology & Applications, Coimbatore Institute of Technology (CIT), Coimbatore-14, IN
Source
Networking and Communication Engineering, Vol 1, No 4 (2009), Pagination: 160-162Abstract
Networks are more and more subject to various kinds of complex security attacks. Existing security system responses have reached their limits in detecting and defending against various network attacks because current attacks are decentralized, automated and intelligent and these systems are passive in response to network attack in that they are limited to being local; and there is no automated, network wide response against detected attacks. Some drawbacks of existing systems reveal the necessity of designing a new generation of systems adapted to dynamical environment. In order to deal with these requirements, active networks approach provides interesting characteristics; it is a novel approach that gives networks and services flexibility and spontaneity. With an active network in place, we can build a more active and dynamic attack response by pushing the countermeasures near the source of attack. This paper describes this approach.