skip to main content
10.1145/3110025.3110152acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Cryptographic Sequence on Variant Maps

Published:31 July 2017Publication History

ABSTRACT

In modern cyberspace environments, big data streams are the most important issue in people's daily lives, each person consumes a larger number of data streams every day. Security risks of storage and transmission of data streams may lead to personal privacy disclosure, it is important for network security to have useful tools facing challenges. Randomness testing provides useful tools to secure results of stream ciphers. Based on multiple statistical probability distributions, this paper presents a visual scheme, variant maps, to measure a whole cryptographic sequence into multiple 1D and 2D maps. Mapping mechanism and sample cases are provided.

References

  1. Ali, Anwaar, et al. "Big data for development: applications and techniques." Big Data Analytics 1.1(2016):2.Google ScholarGoogle Scholar
  2. Mayer-Schönberger V, Cukier K. Big Data: A Revolution that Will Transform How We Live, Work, and Think: Eamon Dolan/Houghton Mifflin Harcourt; 2013.Google ScholarGoogle Scholar
  3. Najafabadi, Maryam M, et al. "Deep learning applications and challenges in big data analytics." Journal of Big Data 2.1(2015):1.Google ScholarGoogle Scholar
  4. Fang R, Pouyanfar S, Yang Y, et al. Computational Health Informatics in the Big Data Age: A Survey[J]. Acm Computing Surveys, 2016, 49(1):12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Assunção, Marcos D., et al. "Big Data computing and clouds: Trends and future directions." Journal of Parallel & Distributed Computing s 79--80(2015):3--15.Google ScholarGoogle Scholar
  6. Xu L, Jiang C, Wang J, et al. Information Security in Big Data: Privacy and Data Mining[J]. IEEE Access, 2014, 2:1149--1176. Google ScholarGoogle ScholarCross RefCross Ref
  7. Lerman, Liran, G. Bontempi, and O. Markowitch. "A machine learning approach against a masked AES." Journal of Cryptographic Engineering5.2(2015):123--139.Google ScholarGoogle Scholar
  8. Bassham Iii, Lawrence E, et al. "SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications." Nist Special Publication (2010).Google ScholarGoogle Scholar
  9. Zheng JZJ, Zheng CH (2010) A framework to express variant and invariant functional spaces for binary logic. Frontiers of Electrical and Electronic Engineering in China 5: 163. Google ScholarGoogle ScholarCross RefCross Ref
  10. Zheng JZJ, Zheng CHH, Kunii TL (2011) A Framework of Variant Logic Construction for Cellular Automata, InTech, Shanghai.Google ScholarGoogle Scholar
  11. Zheng J, Zheng C (2011) Variant measures and visualized statistical distributions. Acta Photonica Sinica 40: 1397. Google ScholarGoogle ScholarCross RefCross Ref
  12. Ji, Yan, et al. "Variant Maps on Normal and Abnormal ECG Data Sequences." Biology and Medicine 8.6 (2016): 1.Google ScholarGoogle Scholar
  13. Heim DM, Heim O, Zeng PA, Zheng J (2016) Successful Creation of Regular Patterns in Variant Maps from Bat Echolocation Calls. Biol Syst Open Access 5:166Google ScholarGoogle Scholar
  14. Zheng J, Zhang W, Luo J, Zhou W, Liesaputra V (2014) Variant map construction to detect symmetric properties of genomes on 2D distributions. Journal of Data Mining in Genomics & Proteomics 5: 1.Google ScholarGoogle Scholar
  15. Zheng J, Luo J, Zhou J (2014) Pseudo DNA sequence generation of non-coding distributions using variant maps on cellular automata. Applied Mathematics 5: 153. Google ScholarGoogle ScholarCross RefCross Ref
  16. Yang, Weizhong, and J. Zheng. "Variant Pseudo-Random Number Generator." (2012).Google ScholarGoogle Scholar
  17. Zheng, Jeffrey, et al. "Variant Map System to Simulate Complex Properties of DNA Interactions Using Binary Sequences." Advances in Pure Mathematics 5.7A(2013):5--24. Google ScholarGoogle ScholarCross RefCross Ref
  1. Cryptographic Sequence on Variant Maps

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASONAM '17: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017
          July 2017
          698 pages
          ISBN:9781450349932
          DOI:10.1145/3110025

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 31 July 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate116of549submissions,21%

          Upcoming Conference

          KDD '24
        • Article Metrics

          • Downloads (Last 12 months)1
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader