Heuristic Search Attacks on Gradual Secret Release Protocol: a Cryptanalysis Approach on E-Learning Security


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Cryptanalysis on GSR fair exchange protocol to study and analyse the robustness of the protocol. In order to perform the cryptanalysis, heuristic attacks are to be over the protocol. The heuristic attacks can be termed as the attacks, which are artificially generated by various heuristic search algorithms. This work intend to use renowned heuristic search algorithms such as Genetic algorithm (GA) and Particle Swarm Optimization Algorithm (PSO) and a latest search algorithm such as cuckoo search (CS). GA and PSO have been applied for cryptanalysis of various protocols and encryption standards. CS is an emerging search algorithm and it proved the performance in solving optimization problems. Based on the aforesaid peculiarities, perform cryptanalysis based on such algorithms. Under various algorithm parameters, attacks will be made over the protocol and the performance will be studied. The protocol and the search algorithms will be implemented in MATLAB and the results will be analysed in depth to study the robustness of the protocol under such security issues.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Gradual Secret Release (GSR); Genetic Algorithm (GA); Particle Swarm Optimization (PSO); Cuckoo Search Algorithm (CSA); Encryption; Decryption; Public Key and Private Key

Full Text:

PDF


References


Tom Warger, EduServe, and Gregory Dobbin, “Learning Environments: Where Space, Technology, and Culture Converge”, ELI White Papers, Educause Learning Initiative, October 29, 2009.

Sabin-Corneliu Buraga, “Developing agent-oriented E-Learning systems”, In Proc. of the 14th International. Conference on Control Systems and Computer Science, Vol. 3, pp.1-6, 2003

A. Gunasekaran, Ronald D. McNeil, Dennis Shaul, (2002) "E-learning: research and applications", Industrial and Commercial Training, Vol. 34, No 2, pp.44-53, 2002

Chih-Ming Chen, Hahn-Ming Lee, Ya-Hui Chen, “Personalized e-learning system using Item Response Theory”, Computers & Education, Vol. 44, No. 3, pp. 237-255, 2005.

Ghanashyam, Srikanta Patnaik, "Design and Implementation of An Efficient Integrated Wavelet based Distributed Co-Operation Technique for Fast Retrieval of Stored and Preserved Data in E-Learning for Universities of Odisha", International journal of Advanced Scientific Research and Technology, Vol. 3, No. 2, pp. 137-154, 2012.

Mark E. McMurtrey James P. Downey, Steven M. Zeltmann Ronald E. McGaughey “seniors and Technology: Results From A Field Study”, Journal of Computer Information Systems, Vol. 51, No. 4, pp. 22-51, 2011.

Khalil El-Khatib, Larry Korba, Yuefei Xu, and George Yee, “Privacy and Security in E-Learning”, International Journal of Distance Education, Vol. 1, No. 4, pp. 1-15, 2003.

Yang, Chunsheng; Lin, F.O.; Lin, H, “Policy-based Privacy and Security Management for Collaborative E-education Systems”, Proceedings of the 5th IASTED International Multi-Conference Computers and Advanced Technology in Education, 2002

J. Kelsey, B. Schneier, D. Wagner, and C. Hall “Side Channel Cryptanalysis of Product Ciphers” Journal of Computer Security, Vol. 8, No. 2, pp. 141-158, 2000.

S.M. Furnell,P.D. Onions, U. Bleimann, U. Gojny,M. Knahl, H.F. Röder,P.W. Sanders, “A Security Framework for Online Distance Learning and Training”, Internet Research, Vol. 8 No. 3, pp.236-242, 1998

Bing Wu, Jianmin Chen, Jie Wu and Michaela Cardei, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless Network Security, Vol. 2, pp. 103-135, 2007

Hazem M. El-Bakry, Nikos Mastorakis, “Realization of E-University for Distance Learning”, Transactions on Computers, Vol. 8, No. 1, pp. 48-62, January 2009.

Najwa Hayaati Mohd Alwi, Ip-Shing Fan, “E-Learning and Information Security Management”, International Journal of Digital Society (IJDS), Vol. 1, No 2, pp. 148-156, June 2010

Defta (Ciobanu) Costinela – Luminita, “Security issues in e-learning platforms”, World Journal on Educational Technology, Vol. 3, No 3, pp. 153-167, 2011.

Najwa Hayaati Mohd Alwi and Ip-Shing Fan, “Information Security Threats Analysis for E-Learning”, Communications in Computer and Information Science, Vol. 73, pp. 285-291, 2010.

Rafal Grzybowski, “Security of Information in University E-learning Systems”, Journal of Applied Computer Science, Vol. 19 No. 2, pp. 7-18, 2011.

Debajyoti Konar, and Chandan Mazumdar, “A Practical Approach of Fairness in Web-based E-learning”, Proceedings of The International MultiConference of Engineers and Computer Scientists, Vol. 1, pp. 656-661, 2012.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize