In this paper, we present an implementation of Russian cryptographic standards using HIP, an open-source technology that allows writing a C++ code, which can be compiled for AMD and NVIDIA GPUs. The details of effecti...
详细信息
ISBN:
(纸本)9781728170411
In this paper, we present an implementation of Russian cryptographic standards using HIP, an open-source technology that allows writing a C++ code, which can be compiled for AMD and NVIDIA GPUs. The details of effective CPU-GPU data copy are considered. The 8 times performance gain over the CPU AVX version is reached.
Image encryption is a technique where an algorithm along with a set of characters called key encrypts the data into cipher text. The cipher text can be converted back into plaintext by decryption. This technique is em...
详细信息
ISBN:
(数字)9781728157184
ISBN:
(纸本)9781728157191
Image encryption is a technique where an algorithm along with a set of characters called key encrypts the data into cipher text. The cipher text can be converted back into plaintext by decryption. This technique is employed for the security of data such that confidentiality, integrity and authenticity of data is maintained. In today's era security of information has become a crucial task, unauthorized access and use of data has become a noticeable issue. To provide the security required, there are several algorithms to suit the purposes. While the use and transferring of images has become easy and faster due to technological advancements especially wireless sensor network, image destruction and illegitimate use has become a potential threat. Different transfer mediums and various uses of images require different and appropriately suiting encryption approaches. Hence, in this paper we discuss the types of image encryption techniques. We have also discussed several encryption algorithms, their advantages and suitability.
This paper presents a new image encryption algorithm, that accepts an initial secret key and an initialization vector, to produce the encryption/decryption keys using a modified pseudo-random generator. This key is us...
详细信息
ISBN:
(数字)9781728141428
ISBN:
(纸本)9781728141435
This paper presents a new image encryption algorithm, that accepts an initial secret key and an initialization vector, to produce the encryption/decryption keys using a modified pseudo-random generator. This key is used to encrypt the input images using an XOR cipher. The mathematical inability of the attacker to determine the values of the seeds, due to their logical discreteness from the output of the pseudorandom generator, and thus the encryption algorithm, is the key feature that ensures the security of the algorithm. The proposed algorithm is used to encrypt the standard test images, and the obtained results are scrutinized with respect to the following metrics - histogram, correlation, entropy, NPCR, and UACI. Theoretical and experimental analyses are performed to justify the performance and security offered by the proposed algorithm.
In order to effectively solve the problem of data security in cloud computing, a hierarchical multi-authorization attribute-based encryption (HM-ABE) scheme is proposed. The authorization center of different privilege...
详细信息
In order to effectively solve the problem of data security in cloud computing, a hierarchical multi-authorization attribute-based encryption (HM-ABE) scheme is proposed. The authorization center of different privileges controls the different attributes and distributes the private key components. It greatly reduces the workload of a single authority. At the same time, it prevents joint attacks from illegal users. The standard security model is established to prove that the HM-ABE scheme reaches INA-CPA security. Through the experiment simulation, the performance is analyzed. The results show that the HMABE scheme implements a secure, efficient and flexible system access control. The flexibility of the attribute set is greatly improved. It adapts to more complex fine-grained access control.
With the rapid development of the logistics industry, the problem of product information traceability in the supply chain is becoming more and more serious. However, the traditional product traceability system has som...
详细信息
With the rapid development of the logistics industry, the problem of product information traceability in the supply chain is becoming more and more serious. However, the traditional product traceability system has some shortcomings, such as the vulnerability of centralized database, the inability to avoid tampering, and the difficulty in accountability and positioning. The decentralized, traceable and tamper-proof features of blockchain can improve the existing supply chain and solve the above problems. This paper firstly analyzed the information exchange of products in the supply chain, and then proposed the product information tracing scheme combining block chain, in which the improved DH key exchange algorithm and RC4 encryption algorithm were used to encrypt the product information to improve the security of the information.
Reversible data hiding (RDH) schemes provide some capacities in the host image to embed message so that message and the host image can respectively be extracted and restored at the destination with no distortion. This...
详细信息
ISBN:
(纸本)9781728115085
Reversible data hiding (RDH) schemes provide some capacities in the host image to embed message so that message and the host image can respectively be extracted and restored at the destination with no distortion. This paper presents an encryption procedure that can be combined with a RDH algorithm to improve the security of communication even if the RDH algorithm is disclosed to the public. Referring as the public algorithm in RDH, our algorithm can embed message in a reversible way based on stream cipher. The stream may be generated using an encryption algorithm with an input key that can be easily updated. The recipient at the destination needs the key to extract the message. Experimental results confirm that the proposed public algorithm does not affect marked image quality and guaranty reversibility.
During recent years, various encryption algorithms have been proposed for color image encryption based on DNA encoding. Image encryption is one of the most important areas of research which has taken attentions of res...
详细信息
During recent years, various encryption algorithms have been proposed for color image encryption based on DNA encoding. Image encryption is one of the most important areas of research which has taken attentions of researchers all over the world that is applicable in transmitting medical images over the insecure communication channels. In this study, a systematic review on DNA based encryption algorithms solely developed for RGB color images is performed in the period of 2000 to 2017. The comparison results on 11 included studies in terms of key space, correlation coefficient, NPCR, UACI, and information entropy showed that there were no significant improvements among the encryption algorithms using the Lena image. In conclusion, for assessing the performance of these kinds of encryption algorithms, development of large sets of benchmark image databases along with publicly available source codes or web servers are highly essential. (c) 2018 Elsevier Inc. All rights reserved.
An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, "the graph is the message": its vertices, its edges, and its edge weigh...
详细信息
An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, "the graph is the message": its vertices, its edges, and its edge weights are the information to be concealed. The encryption algorithm is based on an unconventional mapping, conjectured to be a trapdoor one-way function, designed for graphs. This function requires the sender and the receiver to use a secret one-time encryption/decryption key. It is claimed that a malicious eavesdropper with no knowledge of the key will be faced with a computational task requiring exponential time in the size of the input graph in order to extract the original plaintext from the ciphertext carried by the encrypted graph. A number of variants to the main algorithm are also proposed.
In the last few years, with the fleeting progress of quantum computer the traditional encryption technology is being threatened. Lattice based cryptography is a new post quantum cryptography which has been proved the ...
详细信息
ISBN:
(数字)9781728162836
ISBN:
(纸本)9781728162843
In the last few years, with the fleeting progress of quantum computer the traditional encryption technology is being threatened. Lattice based cryptography is a new post quantum cryptography which has been proved the security under the quantum computer attack. However, due to the limitation of communication frequency and power consumption, it is difficult to implement the lattice based cryptographic algorithm on the existing general processor platform. The polynomial multiplication is the most basic and critical operation in these lattice based cryptographic systems. It is also the computationally intensive operation which is more suitable for hardware implement. In this paper, we proposed a small area, low-power polynomial multiplier design in a specific field. Our scheme not only ensures the performance requirements, but also reduces the overhead of area and power consumption. The proposed scheme in this paper need not use the DSP resources on FPGA so that we can maximize the parallel NTT butterfly operators to improve the computing efficiency. It is a low-cost, high-performance implementation scheme.
In the past recent years the idea towards secure data communication is increasing day by day. The secure communication is being achieved by applying various cryptographic algorithms on the data which is to be transfer...
详细信息
ISBN:
(数字)9781728149769
ISBN:
(纸本)9781728149776
In the past recent years the idea towards secure data communication is increasing day by day. The secure communication is being achieved by applying various cryptographic algorithms on the data which is to be transferred over wireless networks. The different cryptographic algorithms that are generally practiced in the current cyber world are Advanced encryption Standard (AES), Data encryption Standard (DES), RSA algorithm, Message Digest 5 (MD5), Secure Hash algorithm (SHA). All these algorithms are highly secured with sound and complex mathematical computations that makes the hacker tedious to breach the data which is protected by these algorithm. The hardware implementation of algorithms enhances the speed, efficiency and reliability of security standards. In this work the Field Programmable Gate Array (FPGA) implementation of various cryptographic algorithms is discussed in details. The main motivation behind the FPGA implementations of Security algorithms is to increase the speed and decrease delays of software implementations. There are millions of logic gates that are clustered in FPGA, this brings new innovations to existing algorithms. This paper surveyss the parameters such as throughput, operating frequency, number of slice registers used and number of clock cycles of FPGA that have the major role in execution process of cryptographic algorithms. Comparative analysis on hardware implementation of security algorithms on different FPGA's is also done.
暂无评论