-
Secure Handshake Mechanism for Autonomous Flying Agents Using Robust Cryptosystem
Authors:
Chandra Kanth Nagesh,
K N Hemanth Rao,
Anjan K Koundinya
Abstract:
The autonomous flying agents in a Network-centric environment and brings out various security threats and various techniques of Cryptography. Primary Focus is on study and implementation of how cryptographic algorithms can be effectively be used in a warfare scenario. The data security is the utmost key factor for the protection of data in such environments. The paper proposes mechanisms secured d…
▽ More
The autonomous flying agents in a Network-centric environment and brings out various security threats and various techniques of Cryptography. Primary Focus is on study and implementation of how cryptographic algorithms can be effectively be used in a warfare scenario. The data security is the utmost key factor for the protection of data in such environments. The paper proposes mechanisms secured data transmission from the command center (which can be the sending flying agent) to shooter target. The command center and shooter target have a unique set of encryption and decryption key which are created randomly by calibrating the security level at run time. In the beginning, the encryption key used for encrypting data is received from a shooter target when the communication is authenticated through UDP sockets. The encrypted data is sent to the shooter target with the signed signature and command center's encryption key. The encrypted data and signature are then decrypted and verified respectively at the shooter target. The time analysis is performed and observed inputs are provided to the command center.
△ Less
Submitted 19 June, 2019;
originally announced June 2019.
-
Performance Analysis of Parallel Pollard's Rho Algorithm
Authors:
Anjan K. Koundinya,
Harish G.,
Srinath N. K.,
Raghavendra G. E.,
Pramod Y. V.,
Sandeep R.,
Punith Kumar G
Abstract:
Integer factorization is one of the vital algorithms discussed as a part of analysis of any black-box cipher suites where the cipher algorithm is based on number theory. The origin of the problem is from Discrete Logarithmic Problem which appears under the analysis of the crypto-graphic algorithms as seen by a crypt-analyst. The integer factorization algorithm poses a potential in computational sc…
▽ More
Integer factorization is one of the vital algorithms discussed as a part of analysis of any black-box cipher suites where the cipher algorithm is based on number theory. The origin of the problem is from Discrete Logarithmic Problem which appears under the analysis of the crypto-graphic algorithms as seen by a crypt-analyst. The integer factorization algorithm poses a potential in computational science too, obtaining the factors of a very large number is challenging with a limited computing infrastructure. This paper analyses the Pollards Rho heuristic with a varying input size to evaluate the performance under a multi-core environment and also to estimate the threshold for each computing infrastructure.
△ Less
Submitted 19 May, 2013;
originally announced May 2013.
-
Map / Reduce Deisgn and Implementation of Apriori Alogirthm for handling voluminous data-sets
Authors:
Anjan K. Koundinya,
Srinath N. K.,
K. A. K. Sharma,
Kiran Kumar,
Madhu M. N.,
Kiran U. Shanbag
Abstract:
Apriori is one of the key algorithms to generate frequent itemsets. Analyzing frequent itemset is a crucial step in analysing structured data and in finding association relationship between items. This stands as an elementary foundation to supervised learning, which encompasses classifier and feature extraction methods. Applying this algorithm is crucial to understand the behaviour of structured d…
▽ More
Apriori is one of the key algorithms to generate frequent itemsets. Analyzing frequent itemset is a crucial step in analysing structured data and in finding association relationship between items. This stands as an elementary foundation to supervised learning, which encompasses classifier and feature extraction methods. Applying this algorithm is crucial to understand the behaviour of structured data. Most of the structured data in scientific domain are voluminous. Processing such kind of data requires state of the art computing machines. Setting up such an infrastructure is expensive. Hence a distributed environment such as a clustered setup is employed for tackling such scenarios. Apache Hadoop distribution is one of the cluster frameworks in distributed environment that helps by distributing voluminous data across a number of nodes in the framework. This paper focuses on map/reduce design and implementation of Apriori algorithm for structured data analysis.
△ Less
Submitted 19 December, 2012;
originally announced December 2012.