Cloud computing and poor security issues have quadrupled over the last six years and with the alleged presence of backdoors in common encryption ciphers, has created a need for personalising the encryption process by the client. In 2007, two Microsoft employees gave a presentation ``On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators\u27\u27 and was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Security Agency, which if true creates an urgent need for personalising the encryption process by generating locally unbreakable one-time pad ciphers. Hybrid random binary...
We present a method of generating encryptors, in particular, Pseudo Random Number Generators (PRNG),...
The first article is his/her secret key stored in the computer. The second thing is a singleprivatesa...
In recent years and with the great progress of the use of cloud computing and their uses that cover...
Cloud computing security issues are being reported in newspapers, television, and on the Internet, o...
Abstract: In this paper, we examine a system for encrypting data before storing in the Cloud. Adopti...
There is no secrecy without randomness, and we address poor cloud security using an analogue chaotic...
The work reported in this thesis commenced with a review of methods for creating random binary seque...
Cloud computing is expected to grow considerably in the future because it has so many advantages wit...
Data exchange over the Internet and other access channels is on the rise, leads to the insecurity of...
In this paper, we examine the design and application of a one-time pad encryption system for protect...
Cloud computing brings flexible and cost-effective services. However, security concerns plague the c...
Cryptography has been a key factor in enabling services and products trading over the Internet. Clou...
Sensitive data exchanging among things over the Internet must be protected by a powerful cryptograph...
Cryptographic algorithms have played an important role in information security for protecting privac...
As of late, numerous more ventures have moved their information into the cloud by utilizing record s...
We present a method of generating encryptors, in particular, Pseudo Random Number Generators (PRNG),...
The first article is his/her secret key stored in the computer. The second thing is a singleprivatesa...
In recent years and with the great progress of the use of cloud computing and their uses that cover...
Cloud computing security issues are being reported in newspapers, television, and on the Internet, o...
Abstract: In this paper, we examine a system for encrypting data before storing in the Cloud. Adopti...
There is no secrecy without randomness, and we address poor cloud security using an analogue chaotic...
The work reported in this thesis commenced with a review of methods for creating random binary seque...
Cloud computing is expected to grow considerably in the future because it has so many advantages wit...
Data exchange over the Internet and other access channels is on the rise, leads to the insecurity of...
In this paper, we examine the design and application of a one-time pad encryption system for protect...
Cloud computing brings flexible and cost-effective services. However, security concerns plague the c...
Cryptography has been a key factor in enabling services and products trading over the Internet. Clou...
Sensitive data exchanging among things over the Internet must be protected by a powerful cryptograph...
Cryptographic algorithms have played an important role in information security for protecting privac...
As of late, numerous more ventures have moved their information into the cloud by utilizing record s...
We present a method of generating encryptors, in particular, Pseudo Random Number Generators (PRNG),...
The first article is his/her secret key stored in the computer. The second thing is a singleprivatesa...
In recent years and with the great progress of the use of cloud computing and their uses that cover...