this paper presents a new method to implement template based simple power analysis of cryptographic algorithms. Template attacks are most powerful side channel technique to evaluation cryptographic hardware. They use ...
详细信息
ISBN:
(纸本)9781538608043
this paper presents a new method to implement template based simple power analysis of cryptographic algorithms. Template attacks are most powerful side channel technique to evaluation cryptographic hardware. They use a profiling phase to compute features of a multivariate Gaussian distribution of power signals from a training device and an attack phase to infer cryptographic key on a target device. In this paper we introduce new approach of template attack using minimum distance comparison of signals. Results show distance based template attack leads to higher probability of success respect to Gaussian template attack. Also we present full key bits recovery of A5/1 stream cipher by template based power analysis of key bits initialization. The results of new attack on A5/1 indicate that probability of success key recovery in this method is higher than conventional template attack.
In the past recent years the idea towards secure data communication is increasing day by day. The secure communication is being achieved by applying various cryptographic algorithms on the data which is to be transfer...
详细信息
ISBN:
(纸本)9781728149769
In the past recent years the idea towards secure data communication is increasing day by day. The secure communication is being achieved by applying various cryptographic algorithms on the data which is to be transferred over wireless networks. The different cryptographic algorithms that are generally practiced in the current cyber world are Advanced Encryption Standard (AES), Data Encryption Standard (DES), RSA algorithm, Message Digest 5 (MD5), Secure Hash algorithm (SHA). All these algorithms are highly secured with sound and complex mathematical computations that makes the hacker tedious to breach the data which is protected by these algorithm. The hardware implementation of algorithms enhances the speed, efficiency and reliability of security standards. In this work the Field Programmable Gate Array (FPGA) implementation of various cryptographic algorithms is discussed in details. The main motivation behind the FPGA implementations of Security algorithms is to increase the speed and decrease delays of software implementations. There are millions of logic gates that are clustered in FPGA, this brings new innovations to existing algorithms. This paper surveyss the parameters such as throughput, operating frequency, number of slice registers used and number of clock cycles of FPGA that have the major role in execution process of cryptographic algorithms. Comparative analysis on hardware implementation of security algorithms on different FPGA's is also done.
In this paper, we study the statistical properties of pseudorandom number sequence (PRS) generators (PRNGs) based on strong cryptographic algorithms. We propose a method for assessing the quality of PRS generators and...
详细信息
ISBN:
(纸本)9781538693605
In this paper, we study the statistical properties of pseudorandom number sequence (PRS) generators (PRNGs) based on strong cryptographic algorithms. We propose a method for assessing the quality of PRS generators and a criterion based on the quality/ speed ratio to compare output of PRNGs. It uses the results of statistical testing of generated PRSs and allows to evaluate similarity degree of sequences produced by PRNGs to true random sequences. We apply the method to study statistical properties of pseudorandom sequences produced by several generators based on popular cryptographic algorithms.
This paper is intended to present software for testing and evaluating cryptographic algorithms. The proposed software is an improvement of NIST -Statistical Test Suite, designed after NIST SP 800-22. The upgrade is re...
详细信息
ISBN:
(纸本)9781424463633
This paper is intended to present software for testing and evaluating cryptographic algorithms. The proposed software is an improvement of NIST -Statistical Test Suite, designed after NIST SP 800-22. The upgrade is reflected in implementing on the interface the fife finalists of AES selection process, different implementation rules and introducing and implementing a new statistical test based on Walsh-Hadamard transform.
Cloud networks have become increasingly popular due to their scalability and flexibility, but they also face new security challenges. To address these challenges, researchers have proposed many cryptographic algorithm...
详细信息
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users' credentia...
详细信息
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users' credentials and sensitive information. Therefore, this study employed RSA and ElGamal cryptographic algorithms with the application of SHA-256 for digital signature formulation to enhance security and validate the sharing of sensitive information. Security is increasingly becoming a complex task to achieve. The goal of this study is to be able to authenticate shared data with the application of the SHA-256 function to the cryptographic algorithms. The methodology employed involved the use of C# programming language for the implementation of the RSA and ElGamal cryptographic algorithms using the SHA-256 hash function for digital signature. The experimental result shows that the RSA algorithm performs better than the ElGamal during the encryption and signature verification processes, while ElGamal performs better than RSA during the decryption and signature generation process.
This paper presents a software-based parallel cryptographic solution with a massive-parallel memory-embedded SIMD matrix (MTX) for data-storage systems. MTX can have up to 2,048 2-bit processing elements, which are co...
详细信息
This paper presents a software-based parallel cryptographic solution with a massive-parallel memory-embedded SIMD matrix (MTX) for data-storage systems. MTX can have up to 2,048 2-bit processing elements, which are connected by a flexible switching network, and supports 2-bit 2,048-way bit-serial and word-parallel operations with a single command. Furthermore, a next-generation SIMD matrix called MX-2 has been developed by expanding processing-element capability of MTX from 2-bit to 4-bit processing. These SIMD matrix architectures are verified to be a better alternative for processing repeated-arithmetic and logical-operations in multimedia applications with low power consumption. Moreover, we have proposed combining Content Addressable Memory (CAM) technology with the massive-parallel memory-embedded SIMD matrix architecture to enable fast pipelined table-lookup coding. Since both,arithmetic logical operation and table-lookup coding execute extremely fast on these architectures, efficient execution of encryption and decryption algorithms can be realized. Evaluation results of the CAM-less and CAM-enhanced massive-parallel SIMD matrix processor for the example of the Advanced Encryption Standard (AES), which is a widely-used cryptographic algorithm, show that a throughput of up to 2.19 Gbps becomes possible. This means that several standard data-storage transfer specifications, such as SD, CF (Compact Flash), USB (Universal Serial Bus) and SATA (Serial Advanced Technology Attachment) can be covered. Consequently, the massive-parallel SIMD matrix architecture is very suitable for private information protection in several data-storage media. A further advantage of the software based solution is the flexible update possibility of the implemented-cryptographic algorithm to a safer future algorithm. The massive-parallel memory-embedded SIMD matrix architecture (MTX and MX-2) is therefore a promising solution for integrated realization of real-time cryptographic algorith
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...
详细信息
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of *** choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud *** important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific *** main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic *** study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and *** study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file *** study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end *** research may focus more on how various hypervisors perform while handling cryptographic workloads.
Editor ’s notes: The authors propose Crypto-DSEDA, an auto-generation framework for exploring Computing-in-Memory (CiM)-based cryptographic accelerators. Crypto-DSEDA includes an automatic architecture generation pip...
详细信息
Editor ’s notes: The authors propose Crypto-DSEDA, an auto-generation framework for exploring Computing-in-Memory (CiM)-based cryptographic accelerators. Crypto-DSEDA includes an automatic architecture generation pipeline that takes behavioral-level descriptions as input, optimizes dataflow and resource allocation through design space exploration, and finally generates the accelerator architecture and dataflow of the target algorithm. —Yiran Chen, Duke University, USA
cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unn...
详细信息
cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the National Institute of Standards and Technology hash function competition, which was used to develop the SHA-3 standard, and apply a new testing strategy to all available reference implementations. Motivated by the cryptographic properties that a hash function should satisfy, we develop four tests. The Bit-Contribution Test checks if changes in the message affect the hash value, and the Bit-Exclusion Test checks that changes beyond the last message bit leave the hash value unchanged. We develop the Update Test to verify that messages are processed correctly in chunks, and then use combinatorial testing methods to reduce the test set size by several orders of magnitude while retaining the same fault-detection capability. Our tests detect bugs in 41 of the 86 reference implementations submitted to the SHA-3 competition, including the rediscovery of a bug in all submitted implementations of the SHA-3 finalist BLAKE. This bug remained undiscovered for seven years, and is particularly serious because it provides a simple strategy to modify the message without changing the hash value returned by the implementation. We detect these bugs using a fully automated testing approach.
暂无评论