Computer
Asmaa Ibrahim Hussieen; Abeer Tariq MaoLood; Ekhlas Khalaf Gbash
Abstract
Conventional voting activities are often replaced by electronic voting (EV) in light of the quick expansion of the Internet. For a variety of reasons, various nations have lately switched to EV rather than conventional voting. Different EV systems were presented up to this point. In both practical and ...
Read More ...
Conventional voting activities are often replaced by electronic voting (EV) in light of the quick expansion of the Internet. For a variety of reasons, various nations have lately switched to EV rather than conventional voting. Different EV systems were presented up to this point. In both practical and theoretical fields, on the other hand, there is no perfect solution. To meet such objectives, the researchers strive for preserving cryptographic primitives when developing high-efficiency e-voting schemes. The concept of fog computing was developed to improve network infrastructure to satisfy the demands of large amounts of data the same time as also increasing the efficiency of the processing power. Also, it has been created as well to address concerns with Cloud computing, like the distribution environment complexity, real-time response, mobility, and IoT application location awareness. The concentration of this study was on a complete review regarding the systems of EVs through various scholars as a platform to detect flaws or problems in the deployment of extremely secure EV systems. In addition, nations having a history of EV system adoption were examined. A concept for future work on establishing a safe EV system depends on problems discovered in numerous works.
Computer
Yusra Ahmed Ghareeb; Ekhlas Khalaf Gbashi
Abstract
Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated ...
Read More ...
Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated in the area of information protection, helping to assure the validity of the information generated. These include the following algorithms: SHA-1, SHA-2, SHA-3, AES, RC5, RSA, and more. In order to secure the legitimacy of the information and monitoring data , the speed of encryption and authentication must be critical. . Due to the necessity of fast and secure algorithms, these features are required. In this work, modification of the SHA-3 algorithm by introducing a new function called (the keccak function), which has an extremely quick execution time and a high level of security, also versatile cryptographic function. This change is implemented via the 2D chaotic system, which is geared towards generating random values for constants for the SHA3 algorithm. These constants values are generated by the SHA3 algorithm, and so are random and unguessable by the intrude. Statistical tests conducted by the National Institute of Standards and Technology (NIST) effectively outperformed the randomness of a proposed approach .The proposed algorithm shows lower execution time compared to previous studies, which is 0.041616sec for 1MB.