The new cryptographic standard GOST R 34.12-2015 "Information technology. Cryptographic Data Security. Block ciphers." [7] came into force on January 1st, 2016. The standard contains two encryption algorithm...
详细信息
ISBN:
(纸本)9781450347648
The new cryptographic standard GOST R 34.12-2015 "Information technology. Cryptographic Data Security. Block ciphers." [7] came into force on January 1st, 2016. The standard contains two encryption algorithms. One of those is a former standard encryption algorithm GOST 29147-89 (also known as simply GOST) with fixed S-boxes. This algorithm is denoted as Magma in the new standard. The second algorithm is a new symmetric block cipher based on SP-network, which is denoted as Kuznyechik (also transliterated as "K uznechik"). Nowadays, a lot of attention is paid to the issues of quality of the new cipher, namely its cryptographic strength, performance, portability, implementation, etc. In this paper we are offering to consider the possibility to use parallel computations based on MPI and NVIDIA CUDA technologies for cryptanalysis of Magma and Kuznyechik. We choose slide attack for the implementation. The slide attack is applicable to Magma and Kuznyechik ciphers only with significant weakening modifications to their original descriptions. However, research on applicability of parallel implementation of cryptanalysis is important, because the parallel approach can be applied to other more efficient methods of cryptanalysis. The proposed parallel algorithms implemented for two different technologies demonstrate close to linear growth of analysis speed with the increase of involved processor cores. Also we propose a fast implementation of Kuznyechik data encryption based on precomputed tables.
The need for stream ciphers in communication and information cryptographic systems is rapidly grown in the last twenty years. The stream ciphers usually use a pseudo-random number generator with large period, large li...
详细信息
ISBN:
(纸本)9780780394452
The need for stream ciphers in communication and information cryptographic systems is rapidly grown in the last twenty years. The stream ciphers usually use a pseudo-random number generator with large period, large linear complexity and good statistical properties. At present a small number Of software-oriented stream ciphers are known. Due to this reasons in our paper we suggest a new pseudo random number generator, named P-adic Shrinking - Multiplexing Generator, and give its statistical analysis.
There are many security defects in existing mobile communication systems, such as unidirectional authentication and cipher key transmission in plaintext. With the expansion of the mobile communication services, the mo...
详细信息
ISBN:
(纸本)9780889865921
There are many security defects in existing mobile communication systems, such as unidirectional authentication and cipher key transmission in plaintext. With the expansion of the mobile communication services, the mobile security becomes more and more important, but the existing communication systems can not prevent hostile attacks to supply high-quality service because of their defects in security. To solve these problems, we propose a new Security Architecture for Mobile Communication (SAMC), which employs new authentication protocols, chooses different encryption algorithms for different requirements and implements integrity control mechanism. Good security is developed in an open environment with the collaboration of experts. It has the robust security and the outstanding performance, just a slight and acceptable loss.
In view of the privacy and particularity of power data, this paper proposes a traceability encryption data distribution method based on encryption technology in power system, including data distribution based on encry...
详细信息
ISBN:
(纸本)9783031067914;9783031067907
In view of the privacy and particularity of power data, this paper proposes a traceability encryption data distribution method based on encryption technology in power system, including data distribution based on encryption technology in different storage modes and traceability mechanism suitable for different leak scenarios, so as to improve the traditional data distribution centralized degree, unclear rights allocation, low distribution efficiency and complex traceability conditions. This method uses league chain to construct block chain service, formulates different encrypted data forwarding schemes according to different storage modes of data files in the sender, adapts different data leakage traceability strategies according to different scenarios of data leakage in various forwarding schemes. A traceability, tamper-free, open and transparent shared traceability model is established. It ensures the safe transmission of power data and the traceability of data, and realizes the effective supervision of data sender and data receiver, so as to ensure the integrity of data distribution.
In this work we adapt residue numbering and modular arithmetic, combining them with the intrinsic properties of partial homomorphic encryption algorithms, in order to propose an efficient fault tolerance framework spe...
详细信息
ISBN:
(纸本)9781467365789
In this work we adapt residue numbering and modular arithmetic, combining them with the intrinsic properties of partial homomorphic encryption algorithms, in order to propose an efficient fault tolerance framework specifically tailored to encrypted computation. Our approach can be easily integrated to such systems and protect the individual processing components, such as the ALU, the memory, and the outputs. Experimental results demonstrate that the proposed methodology offers more than 99.9% fault coverage for single bit-flips and clustered multiple bit upsets, incurring a runtime overhead of up to 8%. Compared to resource duplication approaches, our framework incurs approximately 47% less area overhead.
Reversible data hiding (RDH) schemes provide some capacities in the host image to embed message so that message and the host image can respectively be extracted and restored at the destination with no distortion. This...
详细信息
ISBN:
(纸本)9781728115085
Reversible data hiding (RDH) schemes provide some capacities in the host image to embed message so that message and the host image can respectively be extracted and restored at the destination with no distortion. This paper presents an encryption procedure that can be combined with a RDH algorithm to improve the security of communication even if the RDH algorithm is disclosed to the public. Referring as the public algorithm in RDH, our algorithm can embed message in a reversible way based on stream cipher. The stream may be generated using an encryption algorithm with an input key that can be easily updated. The recipient at the destination needs the key to extract the message. Experimental results confirm that the proposed public algorithm does not affect marked image quality and guaranty reversibility.
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of ...
详细信息
ISBN:
(纸本)9781936338184
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This research investigated the processing times of alternative encryption algorithms under specific conditions. The paper presents the architecture of a model multiplatform tool for the evaluation of candidate encryption algorithms based on different data and key sizes. The model software was used to appraise the performance of DES, AES, 3DES, MD5, SHAT, and SHA2 encryption algorithms.
A desktop application providing steganographic data hiding is proposed. The steganographic key secure exchange is realized through the Diffie-Hellman key exchange protocol, and Portable Document Format files are used ...
详细信息
ISBN:
(纸本)9781614997160;9781614997153
A desktop application providing steganographic data hiding is proposed. The steganographic key secure exchange is realized through the Diffie-Hellman key exchange protocol, and Portable Document Format files are used as data containers taking into account their widespread use on the Internet. A permutation cipher for providing original data security has also been applied.
This paper mainly studied how to improve security system by analyzing the current situation and defects of existing encryption security systems. Based on existing studies, optimized GPRS wireless security system (GPRS...
详细信息
ISBN:
(纸本)9783642233203;9783642233210
This paper mainly studied how to improve security system by analyzing the current situation and defects of existing encryption security systems. Based on existing studies, optimized GPRS wireless security system (GPRS-based WSS) based on AES was designed by using principles of designing a security system and basic theories in Cryptography. This new system can increase its query efficiency, accuracy and security.
In this paper, we present an implementation of Russian cryptographic standards using HIP, an open-source technology that allows writing a C++ code, which can be compiled for AMD and NVIDIA GPUs. The details of effecti...
详细信息
ISBN:
(纸本)9781728170411
In this paper, we present an implementation of Russian cryptographic standards using HIP, an open-source technology that allows writing a C++ code, which can be compiled for AMD and NVIDIA GPUs. The details of effective CPU-GPU data copy are considered. The 8 times performance gain over the CPU AVX version is reached.
暂无评论