The Advanced encryption Standard (aes) encryptionalgorithm has never been broken since its introduction, and its security has been widely recognized and adopted widely by numerous countries and organizations. However...
详细信息
The Advanced encryption Standard (aes) encryptionalgorithm has never been broken since its introduction, and its security has been widely recognized and adopted widely by numerous countries and organizations. However, the algorithm requires dozens of iterations and each iteration involves a large number of computations, so there are problems such as low encryption efficiency and high computational costs. Aiming at these problems, this paper combines the characteristics of ternary optical computer (TOC), such as many data bits, parallel computation, three-valued encoding, to study and propose a parallel aesencryption scheme based on TOC. This scheme leverages the parallel advantages of TOC to improve the block-by-block encryption mode in the aes encryption algorithm. By employing a parallel computing strategy, it effectively reduces the execution time of the algorithm and significantly enhances encryption efficiency. In addition, this paper introduces threevalued operation logic on the basis of binary Exclusive OR(XOR) operation and constructs a set of three-valued XOR (T-XOR) standards to further improve the operation efficiency of aes encryption algorithm on TOC. Through the in-depth analysis of the algorithm resource consumption and time efficiency, and combined with the experimental verification, it can be concluded that the parallel aes encryption algorithm based on TOC has better computing efficiency and time effectiveness, which demonstrates the advantages of TOC in dealing with large-scale computing tasks.
Recent works in the field of cryptography focus on Deep Learning based Side Channel Analysis (DLSCA) as one of the most powerful attacks against common encryptionalgorithms such as aes. As a common case, profiling DL...
详细信息
ISBN:
(纸本)9783981926347
Recent works in the field of cryptography focus on Deep Learning based Side Channel Analysis (DLSCA) as one of the most powerful attacks against common encryptionalgorithms such as aes. As a common case, profiling DLSCA have shown great capabilities in revealing secret cryptographic keys against the majority of aes implementations. In a very recent study, it has been shown that Deep Learning can be applied in a non-profiling way (non-profiling DLSCA), making this method considerably more practical, and able to break powerful counter-measures for encryptionalgorithms such as aes including masking countermeasures, requiring considerably less power traces than a first order CPA attack. In this work, our main goal is to apply the non-profiling DLSCA against a hiding-based aes countermeasure which utilizes correlated noise generation so as to hide the secret encryption key. We show that this aes, with correlated noise generation as a lightweight countermeasure, can provide equivalent protection under CPA and under non-profiling DLSCA attacks, in terms of the required power traces to obtain the secret key.
Recent works in the field of cryptography focus on Deep Learning based Side Channel Analysis (DLSCA) as one of the most powerful attacks against common encryptionalgorithms such as aes. As a common case, profiling DL...
详细信息
ISBN:
(纸本)9783981926347
Recent works in the field of cryptography focus on Deep Learning based Side Channel Analysis (DLSCA) as one of the most powerful attacks against common encryptionalgorithms such as aes. As a common case, profiling DLSCA have shown great capabilities in revealing secret cryptographic keys against the majority of aes implementations. In a very recent study, it has been shown that Deep Learning can be applied in a non-profiling way (non-profiling DLSCA), making this method considerably more practical, and able to break powerful countermeasures for encryptionalgorithms such as aes including masking countermeasures, requiring considerably less power traces than a first order CPA attack. In this work, our main goal is to apply the non-profiling DLSCA against a hiding-based aes countermeasure which utilizes correlated noise generation so as to hide the secret encryption key. We show that this aes, with correlated noise generation as a lightweight countermeasure, can provide equivalent protection under CPA and under non-profiling DLSCA attacks, in terms of the required power traces to obtain the secret key.
With the advancement of technology, the Internet has become a widely used tool of communication. Million numbers of individual all over in the world can get the utilization of technology. Novel issues like cyber stalk...
详细信息
ISBN:
(纸本)9789811055447;9789811055430
With the advancement of technology, the Internet has become a widely used tool of communication. Million numbers of individual all over in the world can get the utilization of technology. Novel issues like cyber stalking have been increasing worldwide global attention. Cyber stalking can be explained as threatening behavior or undesirable advances intended for another using the Internet and other way of online communications, so client authentication in computer systems is an essential feature in the present time for avoiding cyber stalking. In this paper, we have scheduled a technique utilizing Bcrypt hashing technique with aesencryption for securing an online account and reducing cyber criminal activity.
for ensuring the security of the information transmission, safe encryptionalgorithms are needed to encrypt information in wireless communication networks. Currently, one relative common encryptionalgorithm is aes en...
详细信息
ISBN:
(纸本)9781467396462
for ensuring the security of the information transmission, safe encryptionalgorithms are needed to encrypt information in wireless communication networks. Currently, one relative common encryptionalgorithm is aes encryption algorithm. However, aes encryption algorithm is public, which brings many problems to its security. To solving the safe problem of aes encryption algorithm, one improved aesencryption based on chaos theory is proposed. Simulation is also conducted by MATLAB to verify the feasibly and security of the proposed improved aesencryption.
In this paper, a novel image encryptionalgorithm is proposed based on the combination of the chaos sequence and the modified aesalgorithm. In this method, the encryption key is generated by Arnold chaos sequence. Th...
详细信息
In this paper, a novel image encryptionalgorithm is proposed based on the combination of the chaos sequence and the modified aesalgorithm. In this method, the encryption key is generated by Arnold chaos sequence. Then, the original image is encrypted using the modified aesalgorithm and by implementing the round keys produced by the chaos system. The proposed approach not only reduces the time complexity of the algorithm but also adds the diffusion ability to the proposed algorithm, which make the encrypted images by the proposed algorithm resistant to the differential attacks. The key space of the proposed method is large enough to resist the brute-force attacks. This method is so sensitive to the initial values and input image so that the small changes in these values can lead to significant changes in the encrypted image. Using statistical analyses, we show that this approach can protect the image against the statistical attacks. The entropy test results illustrate that the entropy values are close to the ideal, and hence, the proposed algorithm is secure against the entropy attacks. The simulation results clarify that the small changes in the original image and key result in the significant changes in the encrypted image and the original image cannot be accessed.
In the rapidly evolving Industrial Internet of Things (IIoT), security is a key concern. The traditional aesalgorithm has limitations on key generation and attack resistance in IIoT's resource-limited and complex...
详细信息
ISBN:
(纸本)9789819756025;9789819756032
In the rapidly evolving Industrial Internet of Things (IIoT), security is a key concern. The traditional aesalgorithm has limitations on key generation and attack resistance in IIoT's resource-limited and complex environment. This paper presents a new aesalgorithm based on chaos for IIoT. The algorithm improves the security of aesencryption by integrating the chaotic system into the key generation process, and it mitigates known attacks by introducing chaos-based S-Box substitution. Through key sensitivity analysis and the results of FIPS 1402 experiments, it is indicated that the algorithm proposed in this paper exhibits higher security and efficiency compared to the traditional aesalgorithm. Our work enhances data security in the IIoT environment and provides a valuable solution for industrial communications and operations.
Currently, blockchain technology has been applied in various industries. Chinese Government has emphasized the important role and core position of blockchain technology on several formal occasions, elevating it to a n...
详细信息
ISBN:
(纸本)9798400718144
Currently, blockchain technology has been applied in various industries. Chinese Government has emphasized the important role and core position of blockchain technology on several formal occasions, elevating it to a national strategic level. Under this guidance, based on the technical characteristics and potential of blockchain, this paper proposes and constructs a student vocational core competency certification platform. Firstly, utilizing the decentralization and tamper-resistant features of blockchain, the paper establishes an alliance composed of MOOC platforms, universities, enterprises, and authoritative institutions, dedicated to certifying students' vocational core competencies. Through aes encryption algorithm and blockchain technology, the credibility and transparency of the certification process are ensured. Secondly, the paper analyzes the construction process of the vocational core competency index system for secondary vocational students and tests the blockchain transaction sorting and system transaction throughput. This research has certain reference value for the construction of vocational core competency certification platforms for secondary vocational students and the application of blockchain technology in the field of education.
Introduction: As the main means of information exchange within vehicles, the safety of the controller area network bus directly affects the safe operation of the vehicle and the safety of passengers' lives and ***...
详细信息
Introduction: As the main means of information exchange within vehicles, the safety of the controller area network bus directly affects the safe operation of the vehicle and the safety of passengers' lives and ***: To enhance its secure communication function, this study utilizes advanced encryption standard algorithms and improves the S-box of the algorithm to solve problems such as extended processing time. A secure communication system for the local area network bus of the vehicle controller is designed based on optimized advanced encryption standard *** and Discussion: The results showed that when the file size was 200MB, the encryption and decryption time spent by the research method was 469.8 s and 528.5 s, respectively, which are significantly lower than traditional methods. In the simulation results, under both non-encrypted and encrypted transmission, the information remained intact throughout the entire transmission process. This indicated that the optimization algorithm effectively reduced encryption processing time and system resource consumption while ensuring data confidentiality and integrity. The new system meets the security requirements of the local area network bus of vehicle-mounted ***: This study not only enhances the security of in-vehicle networks but also promotes the application and development of related encryption technologies in the field of vehicle networking. It provides strong technical support for the further development of vehicle networking and the safe operation of intelligent vehicles.
In order to improve the security protection of the customer-side energy use control system for data collection and monitoring, demand response, and energy efficiency improvement, it is urgent to further develop and im...
详细信息
ISBN:
(纸本)9781728176871
In order to improve the security protection of the customer-side energy use control system for data collection and monitoring, demand response, and energy efficiency improvement, it is urgent to further develop and improve the research on the security of customer-side system information collection and transmission encryption technology. By analyzing the characteristics of client-side system information collection and transmission, based on the synunetrical mixed 128-bit key aes-DES algorithm, the client-side system data trusted encryption transmission technology is studied, and the data trusted encrypted transmission model is established. And use the calculation example to simulate, compare the performance of the traditional aesalgorithm and the enhanced aesalgorithm. Because the enhanced version has better chaos, it can effectively deal with the complexity of the data in the process of client-side system acquisition and transmission and improve the ability to resist attacks.
暂无评论