Posts

Showing posts with the label Cryptography

A Case Study of Mobile Health Applications: The OWASP Risk of Insufficient Cryptography

Image
A Case Study of Mobile Health Applications: The OWASP Risk of Insufficient Cryptography DOI:  https://doi.org/10.30564/jcsr.v4i1.4271 Abstract Mobile devices are being deployed rapidly for both private and professional reasons. One area of that has been growing is in releasing healthcare applications into the mobile marketplaces for health management. These applications help individuals track their own biorhythms and contain sensitive information. This case study examines the source code of mobile applications released to GitHub for the Risk of Insufficient Cryptography in the Top Ten Mobile Open Web Application Security Project risks. We first develop and justify a mobile OWASP Cryptographic knowledgegraph for detecting security weaknesses specific to mobile applications which can be extended to other domains involving cryptography. We then analyze the source code of 203 open source healthcare mobile applications and report on their usage of cryptography in the applications. Our f...

A Novel Image Encryption Scheme Based on Reversible Cellular Automata

Image
A Novel Image Encryption Scheme Based on Reversible Cellular Automata DOI:  https://doi.org/10.30564/jeisr.v1i1.1078 Abstract In this paper, a new scheme for image encryption is presented by reversible cellular automata. The presented scheme is applied in three individual steps. Firstly, the image is blocked and the pixels are substituted by a reversible cellular automaton. Then, image pixels are scrambled by an elementary cellular automata and finally the blocks are attached and pixels are substituted by an individual reversible cellular automaton. Due to reversibility of used cellular automata, decryption scheme can reversely be applied. The experimental results show that encrypted image is suitable visually and this scheme has satisfied quantitative performance. Keywords:  Cryptography, Cellular automata, Reversible cellular automata, Image encryption, Image scrambling, Image substituting

A Case Study of Mobile Health Applications: The OWASP Risk of Insufficient Cryptography

Image
A Case Study of Mobile Health Applications: The OWASP Risk of Insufficient Cryptography Abstract Mobile devices are being deployed rapidly for both private and professional reasons. One area of that has been growing is in releasing healthcare applications into the mobile marketplaces for health management. These applications help individuals track their own biorhythms and contain sensitive information. This case study examines the source code of mobile applications released to GitHub for the Risk of Insufficient Cryptography in the Top Ten Mobile Open Web Application Security Project risks. We first develop and justify a mobile OWASP Cryptographic knowledgegraph for detecting security weaknesses specific to mobile applications which can be extended to other domains involving cryptography. We then analyze the source code of 203 open source healthcare mobile applications and report on their usage of cryptography in the applications. Our findings show that none of the open source healthca...