Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alexander G. Chefranov is active.

Publication


Featured researches published by Alexander G. Chefranov.


security of information and networks | 2009

Hill cipher modification based on eigenvalues HCM-EE

Ahmed Y. Mahmoud; Alexander G. Chefranov

We propose and analyze a new modification of the Hill cipher, HCM-EE, generating dynamic encryption key matrix by exponentiation that is made efficiently with the help of eigenvalues. Security of HCM-EE is provided by the use of a large number of dynamic keys. Experimental results show that HCM-EE is from two to seven times more effective in the encryption quality of RGB bitmap images than Hill cipher and its known modifications in the case of images with large single colour areas, and slightly more effective otherwise. It is two times faster than HCM-H, having the best encryption quality among Hill cipher modifications compared versus HCM-EE.


Archive | 2013

Theory and Practice of Cryptography Solutions for Secure Information Systems

Atilla Eli; Josef Pieprzyk; Alexander G. Chefranov; Mehmet A. Orgun; Huaxiong Wang; Rajan Shankaran

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns.Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.


security of information and networks | 2010

Elgamal public key cryptosystem and signature scheme in GU(m,p,n)

Alexander G. Chefranov; Ahmed Y. Mahmoud

ElGamal public key cryptosystem and signature scheme is extended to the recently discovered group GU(m,p,n), of numbers co-prime to mpn and having analytical representation and known order. Elements of GU(m,p,n> with the maximal order are used as the base elements in the proposed extension instead of primitive roots used in the original scheme. Proposed scheme allows easy periodic change of the group and base elements to provide necessary security level without change of the prime number p contrary to the case of GF(p) used in the original ElGamal scheme. Computation of discrete logarithms in the proposed scheme is difficult for large p.


ieee international conference on automation quality and testing robotics | 2010

Secure Hill cipher modifications and key exchange protocol

Ahmed Y. Mahmoud; Alexander G. Chefranov

The paper presents modifications of the Hill cipher generating dynamic encryption key matrix. The presented modifications provide better security and encryption quality than known ones. It also presents a protocol for secure key exchange similar to Diffie-Hellmans one, but using commutative matrices and matrix multiplication operations instead of time-consuming exponentiation.


Archive | 2008

One-Time Password Authentication with Infinite Hash Chains

Alexander G. Chefranov

One-time password scheme based on infinite forward stepping hash chains and not requiring re- initialization after a certain number of authentications is proposed. It resists known for such type schemes attacks, channel failures, and server side database compromise. p h p h h h n =


security of information and networks | 2013

Secure true random number generator in WLAN/LAN

Alexander G. Chefranov; Seyed Masoud Alavi Abhari; Hooman Alavizadeh; Maryam Farajzadeh Zanjani

Wireless networks need more security in comparison to the other networks due to their intrinsic vulnerabilities to possible attacks. It is expected that by using a distributed method for true random number generators (TRNG) in wireless sensor networks (WSN) and wireless LAN (WLAN) randomness quality of generated numbers can be enhanced. We analyze a protocol for a distributed TRNG named ScatterLight (L. R. Giuseppe, M. Fabrizio and O. Marco, 2011) for a WSN. After making some changes on ScatterLight structure and physical data sources, the Enhanced ScatterLight protocol is introduced; it provides secure and high qualified true random numbers. Thus, the quality of randomness of obtained random numbers using National Institute of Standards and Technology tests is evaluated. Finally, by analyzing the results, it can be conducted that Enhanced ScatterLight protocol in comparisons with ScatterLight protocol in WLAN and LAN provides 60% and 53% better randomness quality respectively, while the performance is equal in both protocols.


international symposium on computer and information sciences | 2013

Commutative Matrix-based Diffie-Hellman-Like Key-Exchange Protocol

Alexander G. Chefranov; Ahmed Y. Mahmoud

A matrix-based Diffie-Hellman-like key exchange protocol and utilizing it secure key-exchange protocol similar to HMQV are proposed. The proposed key exchange protocol uses matrix multiplication operation only; it does not rely on the complexity of the discrete logarithm problem contrary to the prototype and its known variants. Two-way arrival at the common key, similar to that employed in the Diffie-Hellman protocol, is provided by specially constructed commutative matrices. The trap-door property ensuring the proposed protocol security is based on exploiting of a non-invertible public matrix in the key generating process.


IEEE Communications Letters | 2008

Parameterized Improved Fast Encryption Algorithm for Multimedia PIFEA-M

Alexander G. Chefranov

Improved fast encryption algorithm for multimedia IFEA-M is modified to withstand recently discovered vulnerability to differential known plaintext-ciphertext attack. The proposed parameterized algorithm PIFEA-M has the same performance as FEA-M that is about 25% better than that of IFEA-M.


ieee international conference on automation quality and testing robotics | 2010

An effective hybrid swing-up and stabilization controller for the inverted pendulum-cart system

Dilek Amir; Alexander G. Chefranov

A new hybrid swing-up and stabilization controller (HSSC) for the inverted pendulum-cart system (IPCS) is proposed. The HSSC includes a fuzzy switching controller, a simple swing-up controller, and a fuzzy stabilization controller. The proposed HSSC can autonomously adapt its parameters according to the changes in the specification parameters of the IPCS without any need for an external adaptation mechanism. The comparison results illustrate the effectiveness of the proposed controller by improving the performance of the well-known SIRM FC [4] almost by 150%.


ieee international conference on automation, quality and testing, robotics | 2006

Pseudo-Random Number Generator RC4 Period Improvement

Alexander G. Chefranov; T. A. Mazurova

A new pseudo-random number generator algorithm RC4E, having period significantly greater than RC4 has, is proposed. It is an extension of RC4. It uses RC4 as a main engine and Heaps algorithm as a second engine, providing enumeration of all possible permutations. Second engine is invoked periodically and it resets the current state of the main engine. Experiments, conducted on the both algorithms, showed their good statistical properties and practically same performance

Collaboration


Dive into the Alexander G. Chefranov's collaboration.

Top Co-Authors

Avatar

Sergey G. Chefranov

Eastern Mediterranean University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Igor I. Mokhov

Eastern Mediterranean University

View shared research outputs
Top Co-Authors

Avatar

Josef Pieprzyk

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ahmed Y. Mahmoud

Eastern Mediterranean University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Oleg B. Makarevich

Southern Federal University

View shared research outputs
Top Co-Authors

Avatar

S. G. Chefranov

Russian Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Maryam Farajzadeh Zanjani

Eastern Mediterranean University

View shared research outputs
Researchain Logo
Decentralizing Knowledge