Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and ba...
详细信息
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and backup. In cloud computing, protection of data in server and while in media is a challenging issue. Our proposed encryption algorithm Hybrid DESCAST has been designed to provide the security of huge volume of data sent through the media and the same will remain encrypted in the cloud sever. This cipher text will be decrypted only when the same is required to be used by the authenticated user. Problems of individual DES and CAST block cipher algorithm have been tackled by our proposed encryption algorithm. Complexity and Computation time for encryption and decryption for our proposed algorithm is higher than the individual DES and CAST algorithm. This paper is focused to provide security of data in cloud server, as well as for the data while transferring from client to cloud server and vice versa. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://***/licenses/by-nc-nd/4.0/).
Interconnection network plays an important role in Coarse-Grained Reconfigurable Arrays and it has a significant influence on the performance,area overhead and power *** make the interconnection network adapt to the m...
详细信息
ISBN:
(纸本)9781509066261;9781509066254
Interconnection network plays an important role in Coarse-Grained Reconfigurable Arrays and it has a significant influence on the performance,area overhead and power *** make the interconnection network adapt to the mapping of cryptographic algorithms with lower area overhead,an area-efficient interconnection network based on the Mesh topology structure is proposed,and a new kind of routing node is *** on the 55 nm CMOS standard cell library to design,the throughput of the interconnection network is 37.5 GB/s,and the area is 0.37 mm,which is 4.9% of the total area of the *** with the related classes,the area ratio is decreased obviously;structure dynamic reconstruction rate is 5-150 times higher;and the utilization rate of the reconfigurable cryptographic processing blocks is also improved greatly.
Based on some recent results derived from the Shannon theory of secrecy systems, this paper develops a new mathematical model for an infinite cryptosystem with perfect secrecy, and establishes a sufficient condition f...
详细信息
Based on some recent results derived from the Shannon theory of secrecy systems, this paper develops a new mathematical model for an infinite cryptosystem with perfect secrecy, and establishes a sufficient condition for a cryptosystem of perfect secrecy with non-uniformly distributed keys based on several groups of orthogonal Latin squares. The new model has the following features and advantages. First, the model with non-uniformly distributed keys, where the number of keys can be many more than the number of messages in a secrecy system, greatly improves the common one with finite perfect secrecy based on modulo additions in the current literature. Second, the model can be regraded as a theoretical base for designing practical block cipher algorithms. Third, since the number of basic cryptosystems in the new model is many more than that of the basic cryptosystems available in the current literature, it helps design new stream and block cipher algorithms with practical security and better resistance to known plaintext attacks. Finally, the present research on infinite secrecy systems of the new model is theoretically valuable and practically useful, as illustrated by an example of designing new basic cryptosystems under the conditions of the new model.
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and ba...
详细信息
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and backup. In cloud computing, protection of data in server and while in media is a challenging issue. Our proposed encryption algorithm Hybrid DESCAST has been designed to provide the security of huge volume of data sent through the media and the same will remain encrypted in the cloud sever. This cipher text will be decrypted only when the same is required to be used by the authenticated user. Problems of individual DES and CAST block cipher algorithm have been tackled by our proposed encryption algorithm. Complexity and Computation time for encryption and decryption for our proposed algorithm is higher than the individual DES and CAST algorithm. This paper is focused to provide security of data in cloud server, as well as for the data while transferring from client to cloud server and vice versa.
A fast authentication mode based on Multi-block Chaining (MBC) is put forward; and its security is proved. The MBC mode is for new generation block cipher algorithms. Its speed is about 13% faster than that of the aut...
详细信息
A fast authentication mode based on Multi-block Chaining (MBC) is put forward; and its security is proved. The MBC mode is for new generation block cipher algorithms. Its speed is about 13% faster than that of the authentication modes in common use (for example, cipherblock chaining-message authentication code mode). The dependence test results meet the requirement. The MBC mode is complete; its degree of ava-lanche effect is about 0.9993; its degree of strict avalanche criterion is 0.992 or so. The frequency test results indicate that the output generated by the MBC mode has uniformity. The binary matrix rank test results imply that it is linear independent among disjoint sub-matrices of the output. Maurer’s universal statistical test results show that the output could be significantly compressed without loss of information. Run test, spectral test, non-overlapping template matching test, overlapping template matching test, Lempel-Ziv compression test, linear complexity test, serial test, approximate entropy test, cumulative sums test, random excursions test and random excursions variant test results fulfill the requirements of all. Therefore the MBC mode has good pseudo-randomness. Thus the security of MBC mode is verified by the way of statistical evaluation.
In this paper, we propose a new joint watermarking/encryption algorithm for the purpose of verifying the reliability of medical images in both encrypted and spatial domains. It combines a substitutive watermarking alg...
详细信息
ISBN:
(纸本)9781424441211
In this paper, we propose a new joint watermarking/encryption algorithm for the purpose of verifying the reliability of medical images in both encrypted and spatial domains. It combines a substitutive watermarking algorithm, the quantization index modulation (QIM), with a block cipher algorithm, the Advanced Encryption Standard (AES), in CBC mode of operation. The proposed solution gives access to the outcomes of the image integrity and of its origins even though the image is stored encrypted. Experimental results achieved on 8 bits encoded Ultrasound images illustrate the overall performances of the proposed scheme. By making use of the AES blockcipher in CBC mode, the proposed solution is compliant with or transparent to the DICOM standard.
Power analysis attacks are non intrusive and easily mounted. As a consequence, there is a growing interest in efficient implementation of these attacks against block cipher algorithms such as Data Encryption Standard ...
详细信息
ISBN:
(纸本)9781424442959
Power analysis attacks are non intrusive and easily mounted. As a consequence, there is a growing interest in efficient implementation of these attacks against block cipher algorithms such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). In our paper we propose a new technique based on the Kalman theory. We show how this technique could be useful for the cryptographic domain by making power analysis attacks faster. Moreover we prove that the Kalman filter is more powerful than the High Order Statistics technique.
Interconnection network plays an important role in Coarse-Grained Reconfigurable Arrays and it has a significant influence on the performance, area overhead and power consumption. To make the interconnection network a...
详细信息
Interconnection network plays an important role in Coarse-Grained Reconfigurable Arrays and it has a significant influence on the performance, area overhead and power consumption. To make the interconnection network adapt to the mapping of cryptographic algorithms with lower area overhead, an area-efficient interconnection network based on the Mesh topology structure is proposed, and a new kind of routing node is constructed. Based on the 55 nm CMOS standard cell library to design, the throughput of the interconnection network is 37.5 GB/s, and the area is 0.37 mm~2, which is 4.9% of the total area of the system. Compared with the related classes, the area ratio is decreased obviously;structure dynamic reconstruction rate is 5-150 times higher;and the utilization rate of the reconfigurable cryptographic processing blocks is also improved greatly.
暂无评论