http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Counter Chain: A New Block Cipher Mode of Operation
El-Semary, Aly Mohamed,Azim, Mohamed Mostafa A. Korea Information Processing Society 2015 Journal of information processing systems Vol.11 No.2
In this paper, we propose a novel block cipher mode of operation, which is known as the counter chain (CC) mode. The proposed CC mode integrates the cipher block chaining (CBC) block cipher mode of operation with the counter (CTR) mode in a consistent fashion. In the CC mode, the confidentiality and authenticity of data are assured by the CBC mode, while speed is achieved through the CTR mode. The proposed mode of operation overcomes the parallelization deficiency of the CBC mode and the chaining dependency of the counter mode. Experimental results indicate that the proposed CC mode achieves the encryption speed of the CTR mode, which is exceptionally faster than the encryption speed of the CBC mode. Moreover, our proposed CC mode provides better security over the CBC mode. In summary, the proposed CC block cipher mode of operation takes the advantages of both the Counter mode and the CBC mode, while avoiding their shortcomings.
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
El-Semary, Aly M.,Mostafa, Mostafa Gadal-Haqq M. Korea Information Processing Society 2010 Journal of information processing systems Vol.6 No.4
The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.
SPCBC: A Secure Parallel Cipher Block Chaining Mode of Operation based on logistic Chaotic Map
( Aly M. El-semary ),( Mohamed Mostafa A. Azim ),( Hossam Diab ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7
Several block cipher modes of operation have been proposed in the literature to protect sensitive information. However, different security analysis models have been presented for attacking them. The analysis indicated that most of the current modes of operation are vulnerable to several attacks such as known plaintext and chosen plaintext/cipher-text attacks. Therefore, this paper proposes a secure block cipher mode of operation to thwart such attacks. In general, the proposed mode combines one-time chain keys with each plaintext before its encryption. The challenge of the proposed mode is the generation of the chain keys. The proposed mode employs the logistic map together with a nonce to dynamically generate a unique set of chain keys for every plaintext. Utilizing the logistic map assures the dynamic behavior while employing the nonce guarantees the uniqueness of the chain keys even if the same message is encrypted again. In this way, the proposed mode called SPCBC can resist the most powerful attacks including the known plaintext and chosen plaintext/cipher-text attacks. In addition, the SPCBC mode improves encryption time performance through supporting parallelized implementation. Finally, the security analysis and experimental results demonstrate that the proposed mode is robust compared to the current modes of operation.
Counter Chain: A New Block Cipher Mode of Operation
( Aly Mohamed El Semary ),( Mohamed Mostafa A. Azim ) 한국정보처리학회 2015 Journal of information processing systems Vol.11 No.2
In this paper, we propose a novel block cipher mode of operation, which is known as the counter chain (CC) mode. The proposed CC mode integrates the cipher block chaining (CBC) block cipher mode of operation with the counter (CTR) mode in a consistent fashion. In the CC mode, the confidentiality and authenticity of data are assured by the CBC mode, while speed is achieved through the CTR mode. The proposed mode of operation overcomes the parallelization deficiency of the CBC mode and the chaining dependency of the counter mode. Experimental results indicate that the proposed CC mode achieves the encryption speed of the CTR mode, which is exceptionally faster than the encryption speed of the CBC mode. Moreover, our proposed CC mode provides better security over the CBC mode. In summary, the proposed CC block cipher mode of operation takes the advantages of both the Counter mode and the CBC mode, while avoiding their shortcomings.
A. Serwa,Hossam H. El-Semary 대한공간정보학회 2020 Spatial Information Research Vol.28 No.2
The main objective of this research is to find a semi-automatic method to determine the practical number of clusters in MS satellite images. This study puts a general skeleton for determining the practical number of classes in multi spectral (MS) remote sensing images. The sequence of the research starts with input the reference data, proposed classes’ samples and the MS image of the study area. The unsupervised classification is carried out using Envi software many times with different excessive number of classes. Fuzzy K-means method is applied as an unsupervised classification algorithm. A comparison between the classified image and the proposed classes’ samples is carried out using ADIPRS software to testify if the classifi- cation is reliable or not based on appearance. The process continues until the condition of the appearance is satisfied then the comparison with the reference is carried out to test the accuracy limit of the classes.
Ahmed. Serwa,Hossam H. El-Semary 대한공간정보학회 2016 Spatial Information Research Vol.24 No.3
Aerial photogrammetry is an engineering sur- veying operation, which is a traditional methodology that can be used to map the earth. The rapid development in instrumentation and computer dependency led to the need to develop photogrammetric software. Inertial navigation system (INS) can provide light weight positioning methodology in aerial imagery. This research is a trial to integrate INS with a pre-developed soft computational simulator of 3A3P in order to obtain a dynamic virtual map. The developed system supports inertial measurement unit (IMU) and link the theoretical exposure station coor- dinates and the inertial measurements. The developed system enables photogrammetrists to visualize the aerial imaging process and it can be used to monitor the imaging process. It makes all the calculations that are required to obtain the theoretical coordinates and produces a virtual aerial map. The system converts the measurements of the IMU into space coordinates that can be useful to monitor the imaging process.