Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/3256
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Siriwardana, S.M.D.N. | - |
dc.contributor.author | Ragingsan, R | - |
dc.contributor.author | D. Silva, D | - |
dc.date.accessioned | 2023-02-11T07:55:46Z | - |
dc.date.available | 2023-02-11T07:55:46Z | - |
dc.date.issued | 2022-12-22 | - |
dc.identifier.citation | S. M. D. N. Siriwardana, R. Ragingsan and D. D. Silva, "Using Smartphone Sensors for Encrypting Mobile Data Storage to Withstand Quantum Cryptanalysis," 2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Dharan, Nepal, 2022, pp. 161-168, doi: 10.1109/I-SMAC55078.2022.9987308. | en_US |
dc.identifier.issn | 2768-0673 | - |
dc.identifier.uri | https://rda.sliit.lk/handle/123456789/3256 | - |
dc.description.abstract | Advancement of encryption standards in mobile communication technology has also paved the way for the emergence of different encryption standards for encrypting mobile storage. But even the most sophisticated encryption algorithms and mobile data encryption software exist today, found to consist of 4 main security and design flaws through the studies conducted during this research, which hinders their performance in achieving the ultimate security in mobile data encryption. They are, Inability to achieve True Randomness in key generation, the Possibility of repeating using the same encryption key, Limited key-length which is not enough to cover the entire message, the Inability to increase security without compromising performance. Because of these reasons the confusion and diffusion rounds used in the middle of the algorithm will be useless in face of quantum computing power because the key selection is ultimately predictable within a selected domain if the domain is pre-defined already. Through this research, solutions to all of these research problems were being able to overcome to produce an unprecedented One-Time Pad encryption algorithm and utilize it in mobile software to provide the ultimate data privacy for static mobile data storage, with the ability even to withstand the most sophisticated quantum cryptanalysis attacks. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC); | - |
dc.subject | Smartphone Sensors | en_US |
dc.subject | Encrypting Mobile Data | en_US |
dc.subject | Mobile Data Storage | en_US |
dc.subject | Withstand Quantum | en_US |
dc.subject | Cryptanalysis | en_US |
dc.title | Using Smartphone Sensors for Encrypting Mobile Data Storage to Withstand Quantum Cryptanalysis | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/I-SMAC55078.2022.9987308 | en_US |
Appears in Collections: | Department of Computer Systems Engineering Research Papers - Dept of Computer Systems Engineering Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Using_Smartphone_Sensors_for_Encrypting_Mobile_Data_Storage_to_Withstand_Quantum_Cryptanalysis.pdf Until 2050-12-31 | 660.94 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.