A cryptographically secure ew database with selective random access

被引:0
|
作者
Ikram, N [1 ]
Shepherd, SJ [1 ]
机构
[1] Univ Bradford, Dept Elect Engn, Bradford BD7 1DP, W Yorkshire, England
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
This paper describes the design and implementation of a high security EW database based on building up a hierarchical information system employing multilevel security classifications. Users activities in each classification are authorised via Personal Identification Numbers (PINs). The information is encrypted using the Software Optimised Encryption Algorithm (SEAL) which enables random access to and decryption of records in the database as well as guaranteeing the integrity of the retrieved records. the required record is decrypted; the database as stored on the permanent media remains fully encrypted at all times providing a very high degree of database confidentiality and integrity. The application has been particularly targeted towards Electronic Warfare libraries and tests conducted to determine its utility in real-time systems.
引用
收藏
页码:1407 / 1411
页数:5
相关论文
共 50 条
  • [1] A Design for a Cryptographically Secure Pseudo Random Number Generator
    Williams, Benjamin
    Hiromoto, Robert E.
    Carlson, Albert
    [J]. PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 864 - 869
  • [2] Cryptographically secure random number generator with chaotic additional input
    Fatih Özkaynak
    [J]. Nonlinear Dynamics, 2014, 78 : 2015 - 2020
  • [3] Cryptographically secure random number generator with chaotic additional input
    Ozkaynak, Fatih
    [J]. NONLINEAR DYNAMICS, 2014, 78 (03) : 2015 - 2020
  • [4] Hybrid Cryptographically Secure Pseudo-Random Bit Generator
    Kumar, Mahesh K. M.
    Sunitha, N. R.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 296 - 301
  • [5] Cryptographically Secure Computation
    Shen, Emily
    Varia, Mayank
    Cunningham, Robert K.
    Vesey, W. Konrad
    [J]. COMPUTER, 2015, 48 (04) : 78 - 81
  • [6] Biometric Signcryption Using Hyperelliptic Curve and Cryptographically Secure Random Number
    Sathya, K.
    Rajasekar, Vani
    Premalatha, J.
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2016,
  • [7] Cryptographically Secure Biometrics
    Stoianov, A.
    [J]. BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION VII, 2010, 7667
  • [8] A HTTP-Enabled Cryptographically Secure Hardware Random Number Generator
    Bozicevic, Mislav
    Radovan, Aleksander
    [J]. 2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1268 - 1272
  • [9] Design of a cryptographically secure pseudo random number generator with grammatical evolution
    Ryan, Conor
    Kshirsagar, Meghana
    Vaidya, Gauri
    Cunningham, Andrew
    Sivaraman, R.
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01)
  • [10] Design of a cryptographically secure pseudo random number generator with grammatical evolution
    Conor Ryan
    Meghana Kshirsagar
    Gauri Vaidya
    Andrew Cunningham
    R. Sivaraman
    [J]. Scientific Reports, 12