ZUC-128 algorithm was listed as the core part in the third international encryption and integrity protection algorithms, EEA3 and EIA3 in 4G-LTE mobile communication system by 3rd generation partnership project (3GPP)...
详细信息
ZUC-128 algorithm was listed as the core part in the third international encryption and integrity protection algorithms, EEA3 and EIA3 in 4G-LTE mobile communication system by 3rd generation partnership project (3GPP). ZUC-256 will soon become one of important encryption and integrity protection algorithms in 5G mobile communication system. Compared with software implementations, hardware implementations using field programmable gate array (FPGA) have significant advantages in terms of performance. Implementation's solution for ZUC-256 algorithm was studied by using FPGA as the hardware platform, two optimized implementation algorithms for ZUC-256 were proposed based on linear feedback shift register feedback calculation optimization algorithm and S-box replacement optimization algorithm on the platform of Cyclone IV and Spartan-6. The operating efficiency of ZUC-256 algorithm was verified on two FPGA hardware platforms. The test results show that the optimized ZUC-256 keystream generation algorithm has a main frequency of 209.346 MHz and a throughput of 6.542 Gbps on the FPGA. Optimized ZUC-256 algorithm's performance is improved by 12% compared with the original ZUC-256 algorithm. The running result in our optimized scheme is 214.4% higher than that of the stream cipher algorithm implemented by Kitsos et al., the speed is 95.8% higher than that of the research results from Wang et al., compared with the research results of Zhang et al., this optimized scheme has increased by 45.6%. Moreover, it possesses comprehensive performance advantages compared with the results of Drucker et al. on CCNC 2019. The proposed optimization implementation algorithms for ZUC-256 on FPGA have broad application prospects in the future of 5G system.
This paper describes an encryption algorithm based on a polynomial system of residual classes. We study the FPGA bitstream implementation on the Xilinx and 16-nm UltraScale™ ASIC architecture which enables floating-po...
详细信息
ISBN:
(数字)9781728197135
ISBN:
(纸本)9781728197142
This paper describes an encryption algorithm based on a polynomial system of residual classes. We study the FPGA bitstream implementation on the Xilinx and 16-nm UltraScale™ ASIC architecture which enables floating-point operation, multi-processing, parallelism, pipelining, highperformance computing, etc. The software-based bitstream encryption and on-chip decryption are performed with the stored encryption key and encrypted bitstream, generated by a Vivado tool. The self-authenticating algorithms with a symmetric key are investigated. The encryption algorithms are implemented using the polynomial system of residual numbers. Data encryption in a residual number system is effectively implemented by ASICs. Design of irreducible polynomial is proposed and discussed. Our developments and findings are empowered by the low-power FinFET FPGA architecture.
The emerging blockchain technology is one of the most feasible solutions to decentralized and autonomous energy management in distributed energy systems (DESs). However, with the increase of renewable energy penetrati...
详细信息
The emerging blockchain technology is one of the most feasible solutions to decentralized and autonomous energy management in distributed energy systems (DESs). However, with the increase of renewable energy penetration in the DES, blockchain nodes will generate massive calculation tasks and cause high delay in energy trading. In this paper, we propose a dynamic energy management mode, which is tailored for the DES with high penetration of renewable energy. Firstly, a novel consensus mechanism is established by the proof of energy contribution. Particularly, the energy contribution value characterizes the credible transaction, emission reduction, demand response and system operation contribution of energy prosumers. Secondly, the model inversion process of blockchain SM2 encryption algorithm is simplified by using the verification data of nodes with high energy contribution, so as to improve the computation ability of the DES. Finally, an actual energy blockchain project with 300 renewable energy prosumers is analyzed as an example. The case study shows that this work can reduce the network delay to less than 2000 ms, which is more than double the operation efficiency of the energy trading in Ethereum. Moreover, by calculating the network delay under different conditions, it is concluded that the number of committee nodes has a greater impact on operational efficiency than the number of transactions in the new block and the total number of nodes.
In this paper, a new circuit which can include a capacitor, an inductor and a novel nonlinear memristor is designed. Complex dynamics and special characters are investigated by changing three parameters for the design...
详细信息
In this paper, a new circuit which can include a capacitor, an inductor and a novel nonlinear memristor is designed. Complex dynamics and special characters are investigated by changing three parameters for the designed chaotic system, whose circuitry realization has been implemented to show its reliability. A novel chaotic behavior which is similar with quasiperiodic oscillation is produced. In addition, a novel image encryption method based on memristor chaotic system and DNA computing is proposed. The experimental results show that the algorithm not only can resist different kinds of attack, but also can improve good encryption effect.
Laws and regulations for privacy protection have been promulgated one after another, and the phenomenon of data islands has become a significant bottleneck hindering the development of big data and artificial intellig...
详细信息
Laws and regulations for privacy protection have been promulgated one after another, and the phenomenon of data islands has become a significant bottleneck hindering the development of big data and artificial intelligence technologies. From the perspective of the historical development, concepts, and architecture classification of federated learning, the technical advantages of federated learning are explained using Internet of Things. Simultaneously, numerous attack methods and classifications of federated learning systems are examined, as well as the distinctions between different federated learning encryption algorithms. Finally, it reviews research in the subject of federal learning privacy protection and security mechanisms, as well as identifies difficulties and opportunities.
The world is moving towards digitization for all forms of data. Images are one of the most used data that contains a lot of information. With the increasing network technology, the sharing of data across the internet ...
详细信息
The world is moving towards digitization for all forms of data. Images are one of the most used data that contains a lot of information. With the increasing network technology, the sharing of data across the internet has also manifold. Certain images are confidential and require security for storing or transmitting on an insecure communication channel. Digital images usually have highly correlated data where compression can be performed to reduce the load on the transmission channel or storage memory. The paper proposes an algorithm to compress the digital images and encryption is performed on the compressed data to provide security. Compression of the image is performed using the Set partitioning in hierarchical trees algorithm. The compressed image is encrypted using a chaotic sequence generated using the Henon map and the cipher image is scrambled using a permutation table obtained from Piecewise Linear chaotic map. To reduce the computation while generating the chaotic sequence, a base conversion operation is used. The initial parameters of the chaotic systems are generated from the elliptic curve point are shared securely using ElGamal based elliptic curve cryptosystem. Security analyses are conducted along with a comparison with other existing systems. The proposed algorithm is secured against various attacks and outperforms existing techniques concerning various statistical and security aspects of an enciphering algorithm.
In the hostile environment, use of pseudo-random numbers in encryption algorithm has become difficult due to increased computing power of attackers. To overcome from the hackers true random number generator solving by...
详细信息
ISBN:
(纸本)9781728196879
In the hostile environment, use of pseudo-random numbers in encryption algorithm has become difficult due to increased computing power of attackers. To overcome from the hackers true random number generator solving by giving unique random sequence Authors recommend based on experiment to add parameters dependencies of analog Phase-Locked Loop (PLL) based on TRNG, and it also tries to optimize few parameters using Genetic algorithm (GA). The proposed approach selects optimum values for different parameters and increases flexibility, resource utilization, throughput Digital architecture for optimized TRNG is obtained using Altera platform. Implementation the optimized TRNG on ALTERA QUARTUS-H DEO board gives enhancement R and S parameters by 42.18% and 38.67% respectively.
The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most efficient ciphers...
详细信息
Artificial neural network is a very important operation model in the field of artificial intelligence. Ann deals with complex problems by simulating the structure and logic of human brain. Chaotic system is a dynamic ...
详细信息
Artificial neural network is a very important operation model in the field of artificial intelligence. Ann deals with complex problems by simulating the structure and logic of human brain. Chaotic system is a dynamic system of deterministic, disordered and nonlinear motion. Whether random factors are added or not, it can show a random phenomenon, that is, it shows internal randomness, the motion trajectory is not periodic or divergent, and it depends on the initial value, and the sensitivity is also stronger. This paper introduces the types of ciphers in cryptography, encryption algorithms in cryptography and the characteristics of chaos, and introduces in detail the feedforward neural network, feedback neural network and self-organizing neural network in neural network, as well as the current encryption algorithms based on chaos and neural network.
In the past few years, cloud edge system from conception to gradually improve, develop to today has become a mature side of cloud model. Compared with simple cloud computing, cloud edge system has lower network latenc...
详细信息
In the past few years, cloud edge system from conception to gradually improve, develop to today has become a mature side of cloud model. Compared with simple cloud computing, cloud edge system has lower network latency and is suitable for application scenarios with higher real-time requirements. Although it can make up for some shortcomings of cloud computing, it also faces many problems in practical application, how to realize the safe transmission of information in the open network environment is one of the difficulties. Since the data transmission process between the edge and the cloud exists in the form of plaintext transmission, this allows attackers to easily disrupt normal data interactions. It is an important research point to ensure the stable operation of the cloud edge system while maximizing the security of communication. To this end, the following work has been done in the direction of secure data transmission in this paper: 1. Analyzed the potential risks of the cloud edge system communication network from the perspective of data source security and data transmission security. 2. Summarizes the requirements and limitations of secure communication, introduces a lightweight SM9 encryption algorithm with low implementation cost and low resource consumption. And compared with other encryption algorithms. 3. Provide algorithmic foundation for establish a framework for secure transmission of lightweight data and achieve data confidentiality protection. Provides a viable reference for secure data transmission in the cloud edge system.
暂无评论