Lightweight cryptography is an exciting field which hits the perfect balance between safety, higher performance, low power consumption, and compactness. Many compact algorithms such as PRESENT, HIGHT, LILLIPUT, KLEIN,...
详细信息
ISBN:
(纸本)9781728148274
Lightweight cryptography is an exciting field which hits the perfect balance between safety, higher performance, low power consumption, and compactness. Many compact algorithms such as PRESENT, HIGHT, LILLIPUT, KLEIN, KATAN, SFN, and PICCOLO have made the mark in recent years that can be used as lightweight cryptosystems. The reprogrammable devices are highly attractive solutions for encryption algorithm in hardware implementation. A strong focus is placed on high-throughput implementations, which are required to support security for logistics and tracking applications. In this paper, two pipelined architectures are designed for achieving high throughput. Among them, sub-pipelined implementation achieves a high throughput of 684.06 Mbps and 654.20 Mbps on xc5vlx50t-3ff1136 and xc4vlx25-12ff668 devices, respectively. All results are simulated and verified for different devices of Xilinx in Spartan & Virtex families.
The need for large primes in major cryptographic algorithms has stirred interest in methods for prime generation. Recently, to improve confidence and security, prime number generation in hardware is being considered a...
详细信息
ISBN:
(纸本)9781509063901
The need for large primes in major cryptographic algorithms has stirred interest in methods for prime generation. Recently, to improve confidence and security, prime number generation in hardware is being considered as an alternative to software. Due to time complexity and hardware implementation issues, probabilistic primality tests are generally preferred. The Baillie-PSW primality test is a strong probabilistic test;no known Baillie-PSW pseudoprime exists. In this paper, we discuss different types of cryptographic algorithms and primality tests, and review hardware implementations of the Miller-Rabin and Lucas tests. We also present the implementation of a Verilog-based design of the Baillie-PSW test on an Altera Cyclone IV GX FPGA. To our knowledge, this is the first hardware implementation of this test. The implementation takes an odd random number as input and returns the next immediate probable prime number as output. We analyze the results from our implementation and suggest methods to further improve our results in future.
Cryptography is one of the important sciences in the current era. The importance of cryptography comes from the intensive digital transactions which we daily perform on the internet and other communication channels. I...
详细信息
ISBN:
(纸本)9781467308946
Cryptography is one of the important sciences in the current era. The importance of cryptography comes from the intensive digital transactions which we daily perform on the internet and other communication channels. In this paper, we will discuss the relationship between cryptography and mathematics in the context of Elliptic Curve (EC). ECs are mathematical NP-hard problems, which are proofed to be intractable in term of complexity. Cryptography has efficiently utilized the strength EC in developing several cryptosystems such as key agreement protocols, digital signatures and others. Elliptic Curve Cryptography (ECC) usage is with smaller key to give high security and high speed in a low bandwidth. ECC is considered as the best method for upcoming applications. This paper presents the idea of biometric signature - a new method to combine biometrics with public key infrastructure (PKI), the security can be increased using the ECC in biometric signature creation, because the private and public keys are produced without saving and sending any secret information anywhere.
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th...
详细信息
ISBN:
(纸本)9781538652589;9781538652572
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of the facility it provided. In this, user pays only for the services it uses. Now a days, vast amount of information gets stored over cloud, which include personal file, images, pdf, text, multimedia data etc. So security becomes one of the important issue. Everyone just want to upload, store its data without worrying about the security. IT organization should look after to provide security to the document. Documents content get altered by some outsider attacker, so it is necessary to verify the integrity. This data get duplicated and unnecessary much of the space will get waste. So to avoid this, data must be de-duplicated and uploaded over the cloud server. For this secure hash algorithm is used. It calculates the hash value for chunk of data and store over cloud. Only reducing unnecessary wastage of space is not the solution administrator should look toward the security issue. TPA is used for verification of integrity of the document. This system is proposed for achieving this both issues.
暂无评论