In this study, a novel scheme of advancedencryptionstandard (AES) is proposed. Its independent round key is generated by the two-dimensional (2D) Henon map and the 2D Chebyshev map. The goal is to improve the low se...
详细信息
In this study, a novel scheme of advancedencryptionstandard (AES) is proposed. Its independent round key is generated by the two-dimensional (2D) Henon map and the 2D Chebyshev map. The goal is to improve the low security and conquer the defect of the traditional AES algorithm. Then, the improved algorithm is used to encrypt colour image, and the result shows that the encryptionalgorithm has better security by cryptanalysis.
In the wireless sensor network (WSN), ensuring secure routing in the network is a crucial and critical task. Providing security and sustaining energy is still a difficult problem in the research community, despite the...
详细信息
In the wireless sensor network (WSN), ensuring secure routing in the network is a crucial and critical task. Providing security and sustaining energy is still a difficult problem in the research community, despite the network's adoption of multiple routing protocols. However, the traditional protocols encountered multiple challenges as the network's adoption is far more susceptible to attacks, tampering, and manipulation due to the deployment scenario, the characteristics of the sensor-equipped nodes, and their communication protocols. Consequently, an optimal solution to ensure secure node deployment for wireless network systems utilizing the Artificial Bird Optimization-based Deep Convolutional Neural Network in conjunction with the Modified advanced encryption standard algorithm (ABO-mAES-DCNN) is developed in this research for effectively encrypting and managing the duty cycles. Specifically, the regional clustering with adaptive region partitioning enabled in this research is used to choose the cluster head. The region-based clustering's adaptive partitioning feature dynamically modifies the domain's partitions or areas to ensure an even distribution of nodes. The proposed research exploits the deep CNN classifier, which precisely identifies the nodes' states adaptively selects each node's scheduling mode, and carries out effective Duty cycle management. Further, the Modified advanced encryption standard algorithm (mAES) is adopted to secure the data after identifying the node's state. Specifically, Artificial Bird Optimization is utilized for optimum path selection and assists in minimizing energy consumption. The proposed ABO-mAES-DCNN model's performance is reported in terms of alive nodes, delay, energy, and throughput as 14, 0.01 ms, 0.41 J, and 0.55 bps respectively for 100 nodes. With 200 nodes analysis, the ABO-mAES-DCNN model attained 115 alive nodes, a delay of 0.01 ms, energy of 0.35 J, and throughput of 0.47 bps and surpassed other existing techniqu
Fog computing network plays a significant role in enhancing the communication between the end users and the cloud server accompanying high security. The quality of service of the systems could be greatly enhanced by t...
详细信息
Fog computing network plays a significant role in enhancing the communication between the end users and the cloud server accompanying high security. The quality of service of the systems could be greatly enhanced by these fog computing technologies that provide high computation capability, storage and enhanced network connectivity. The transmission of data through this technology is highly vulnerable to various threatening especially medical data are highly vulnerable due to their sensitivity. In this research, a trust based fog computing authentication model is enabled for assuring the security of the data transmission. The proposed model is executed in five different phases that includes setup phase, user registration phase, Fog node registration phase, login phase and authentication phase and each phase performs a specific function to improve the security. In each phase the data are transmitted in the encrypted form that is performed using the advanced encryption standard algorithm that ensured the security of the data and this algorithm could be enabled to both public and private sectors. In every phase the data are authenticated and the users are validated for the proceeding of authentication and this authorized access enhances the security level of the systems. The efficiency of the proposed trust based fog computing authentication model is proved by measuring the parameters detection rate, computation time, storage capability, vulnerability rate and privacy ratio that attained the improvement of 5% in detection rate, 42% in computational time, 31.51% memory usage, 82.41% vulnerability rate and 27.53% privacy ratio that shows the superiority of the proposed method.
Nowadays, the design of ultra-compact area advancedencryptionstandard (AES) architectures is highly demanded by the electronics industry since many of these architectures are embedded in portable devices, such as sm...
详细信息
Nowadays, the design of ultra-compact area advancedencryptionstandard (AES) architectures is highly demanded by the electronics industry since many of these architectures are embedded in portable devices, such as smart phones, tablets, etc., in which the area is critically limited. Until now, many approaches have been proposed to create high-processing and compact architectures. However, the area consumption is still a factor to be improved. In this paper, a highly compact encryption/decryption architecture, which is implemented in a low-cost FPGA, to efficiently simulate the AES algorithm, is proposed. Specifically, an optimized Galois Field Multiplier, which is the most demanding operation in terms of area consumption and processing speed, involved in Mix-Columns and Inverse Mix-Columns transformations, is presented. Therefore, the optimization of the proposed GF (28) multiplier by two has allowed to us create an ultra-compact Mix-Columns circuit since this circuit involves large number of multiplications. In addition, the design involves a routing circuit which allowed the proposed architecture to perform encryption or decryption by using common modules. The results demonstrate that the proposed digital circuit expends fewer LUTs and fewer registers when compared with the most compact encryption/decryption architectures reported to date.
Nowadays, the Internet of Things (IoT) is widely used in the daily lives of humans, which range from tiny wearable devices to huge industrial systems. However, designing the IoT application is difficult, because the d...
详细信息
Nowadays, the Internet of Things (IoT) is widely used in the daily lives of humans, which range from tiny wearable devices to huge industrial systems. However, designing the IoT application is difficult, because the devices in the IoT network are susceptible to security threats (e.g. malicious attacks). Therefore, an effective cryptographic process must be developed with a minimum amount of hardware resources. In this paper, an optimized advancedencryptionstandard (AES) architecture is proposed to improve the security between the IoT devices. The following key strategies are involved in the proposed AES architecture: 1) Efficient Pseudo Random Number Generator (EPRNG) using the two-level True Random Number Generator based key generation module is used to generate a different optimal key value for each clock cycle, 2) the number of logical elements used in the AES architecture is minimized because there is no registers are required for storing the generated keys as it is automatic key generation. The performances of the EPRNG-AES architecture are analyzed in terms of the number of slice registers, flip flops, number of slice Look Up Table (LUT), number of logical elements, slices, bonded Input/ Output Block (IOB), power, delay, and operating frequency. The EPRNG-AES architecture is evaluated with five different AES architectures such as AES-PNSG, LAES, AES-HLS, AES-CTR and AES-MMC. The EPRNG-AES architecture designed in the Kintex 7 uses 153 slices, which is less when compared with the number of slices in LAES and AES-HLS.
Cloud computing is a broad term that can be understood differently depending on the context. Its primary goal is to reduce capital expenses on infrastructure, operating systems, deployment, and storage. The National I...
详细信息
Data deduplication is a process that gets rid of excessive duplicates of data and minimizes the storage capacity to a large extent. This process mainly optimizes redundancies without compromising the data fidelity or ...
详细信息
Data deduplication is a process that gets rid of excessive duplicates of data and minimizes the storage capacity to a large extent. This process mainly optimizes redundancies without compromising the data fidelity or integrity. However, the major challenge faced by most data deduplication systems is secure cloud storage. Cloud computing relies on the ability and security of all information. In the case of distributed storage, data protection and security are critical. This paper presents a Secure Cloud Framework for owners to effectively handle cloud-based information and provide high security for information (SCF). Weaknesses, Cross-Site Scripting (XSS), SQL perfusion, adverse processing, and wrapping are all examples of significant attacks in the cloud. This paper proposes an improved Secure File Deduplication Avoidance (SFDA) algorithm for block-level deduplication and security. The deduplication process allows cloud customers to adequately manage the distributed storage space by avoiding redundant information and saving transfer speed. A deep learning classifier is used to distinguish the familiar and unfamiliar data. A dynamic perfect hashing scheme is used in the SFDA approach to perform convergent encryption and offer secure storage. The Chaotic krill herd optimization (CKHO) algorithm is used for the optimal secret key generation process of the advancedencryptionstandard (AES) algorithm. In this way, the unfamiliar data are encrypted one more time and stored in the cloud. The efficiency of the results is demonstrated via the experiments conducted in terms of computational cost, communication overhead, deduplication rate, and attack level. For file sizes of 8 MB, 16 MB, 32 MB, and 64 MB, the proposed methodology yields a deduplication rate of 53%, 62%, 54%, and 44%, respectively. The dynamic perfect hashing and the optimal key generation using the CKHO algorithm minimizes the data update time and the time taken to update a total of 1024 MB data is 341.5 ms.
The internet of things (IoT) is a multiple devices, which connects with the internet for communication, in order to obtain the updated from the cloud. The fog can act as a controller and it is located between the IoT ...
详细信息
The internet of things (IoT) is a multiple devices, which connects with the internet for communication, in order to obtain the updated from the cloud. The fog can act as a controller and it is located between the IoT devices and cloud. The major attacks like de-synchronization, and disclosure has arises in the devices, this has been prevented. The major contribution in this work is key generation and authentication, for key generation the "advanced encryption standard algorithm" is developed, in which the new and old keys are generated. The encryption is done under the source side, and decryption is done under the device side. The fog security is maintained through "device tag, and bit wise XOR rotational algorithm". The security, and the computational complexity is defined in this work and it is given in table format. The implementations are carried out in the MATLAB R2016 a. The proposed algorithm is compared with the existing protocols like LMAP, M2AP, EMAP, SASI, and RAPP, from the comparison the proposed methodology makes the better knowledge about the security and prevents from various attacks.
The cryptographic algorithm has been gradually improved in design, but its implementations are vulnerable to side-channel analysis (SCA). Generally speaking, adding a mask to the primitive is the best way to counterac...
详细信息
The cryptographic algorithm has been gradually improved in design, but its implementations are vulnerable to side-channel analysis (SCA). Generally speaking, adding a mask to the primitive is the best way to counteract SCA. In the high-order mask, the key to affecting performance and security lies in the multiplication design. Based on the research of the advancedencryptionstandard (AES) algorithm, internal round function structure, and zero-knowledge proof, a high-order AES mask scheme is designed to optimise the implementation. In this scheme, the substitution-box protects sensitive variables in the algorithm with the use of secure multiplication and secure inversion by column. The scheme named as in columns higher-order mask (ICHM), features low cost and high security. The result of the experiment proves the security and effectiveness of the ICHM.
Nowadays programmable devices (microprocessors and DSPs) are based on complex architectures optimized for obtaining maximum speed performances that degrades when the implemented application is mostly based on operatio...
详细信息
ISBN:
(纸本)9781457702013
Nowadays programmable devices (microprocessors and DSPs) are based on complex architectures optimized for obtaining maximum speed performances that degrades when the implemented application is mostly based on operations on single bit or subset of bits. This kind of data processing and bit manipulation operations can be accelerated by using a Reconfigurable Functional Unit (RFU). In this paper the benefits of using the ADAPTO RFU (Adder-Based Dynamic Architecture for Processing Tailored Operators) [1] [2] to speed up the advanced encryption standard algorithm (AES) is investigated. The paper shows how the ADAPTO architecture is useful for the acceleration the AES algorithm due the efficient implementation of the most complex operations of the algorithm. A comparison in terms of number of assembly instructions is given.
暂无评论