In this paper, the results of parallelizing of encryption algorithm based on a chaos system and neural networks are presented. A data dependence analysis of loops was applied in order to parallelize the algorithm. The...
详细信息
ISBN:
(数字)9783642551956
ISBN:
(纸本)9783642551956
In this paper, the results of parallelizing of encryption algorithm based on a chaos system and neural networks are presented. A data dependence analysis of loops was applied in order to parallelize the algorithm. The parallelism of the algorithm is demonstrated in accordance with the OpenMP standard. As a result of my study, it was stated that the most time-consuming loops of the algorithm are suitable for parallelization. The efflciency measurement of a parallel program is showed.
In this paper, inspired by network coding theory we propose an efficient hybrid encryption-coding algorithm that requires using traditional encryption only for the first small amount of data. This amount of data, whic...
详细信息
ISBN:
(纸本)9781424476855
In this paper, inspired by network coding theory we propose an efficient hybrid encryption-coding algorithm that requires using traditional encryption only for the first small amount of data. This amount of data, which we refer to as the first block, is determined by the traditional encryption algorithm to be applied on this first block. In our proposed algorithm, all the rest of the information will then be transmitted securely over the wireless channel, using network coding, without a need for using traditional encryption. Unlike the traditional and opportunistic encryption algorithms, the proposed algorithm achieves higher data rates and less avalanche error effect and at the same time it is as secure as traditional encryption algorithms. Assuming the additive white Gaussian noise (AWGN) channel model employing our proposed algorithm we analyze its performance in terms of throughput and security level. Numerical results of different case studies are provided.
With the high-speed development of mobile terminal device, the mobile information application solution has been more and more common. According to the processing and manufacturing industry MES (Manufacturing Execution...
详细信息
ISBN:
(纸本)9781479987306
With the high-speed development of mobile terminal device, the mobile information application solution has been more and more common. According to the processing and manufacturing industry MES (Manufacturing Execution System) data security and the power consumption for mobile application, this paper studies a kind of lightweight mobile security encryption algorithm, and applies this method in a mobile application of MES in aluminum electrolytic industry. This paper will discuss the key process of the algorithm in detail, and compared with existing algorithms, by comparing the test and analysis, this algorithm has the advantages of high security and low power consumption.
作者:
Guo, YukunHexi Univ
Coll Informat Technol & Commun 846 Beihuan Rd Zhangye Gansu Peoples R China
Because of multimedia information has huge amount of data and high redundancy, traditional encryption technology is not suitable for multimedia information encryption. Multimedia information encryption get great devel...
详细信息
ISBN:
(纸本)9789811079863;9789811079856
Because of multimedia information has huge amount of data and high redundancy, traditional encryption technology is not suitable for multimedia information encryption. Multimedia information encryption get great development when chaos appears. Chaos is very suitable for image encryption because of its many advantages. In this paper, I analysised the shortcomings of color image encryption algorithm based on 3D unified chaotic system, then aiming at the algorithm deficiency, I analysised the algorithm which improved by cat map, the security of the algorithm has been greatly improved.
With the increasing complexity of access and network structure of smart devices, there are many security threats in smart distribution networks. How to ensure the security of smart distribution network communication h...
详细信息
ISBN:
(纸本)9781728114101
With the increasing complexity of access and network structure of smart devices, there are many security threats in smart distribution networks. How to ensure the security of smart distribution network communication has become an important challenge for the safe and stable operation of smart distribution networks in the future. In response to this, this paper proposes an encryption algorithm based on electric emergency communication system. The algorithm uses the random number sequence generated by the two-dimensional mapping to XOR with the plaintext to obtain two ciphertexts. Then, the two ciphertexts are subjected to different scrambling operations, and the two ciphertexts are combined into a matrix according to the parity of the number of loops of the encryption algorithm. The first round of encryption is then completed through column confusion, diagonal interchange, and generation of the next round of keys. Loop through the above steps to get the final encrypted ciphertext. The algorithm is innovative in preventing the attacker from exhausting the key, and the algorithm is simple, the running speed is fast, the encryption is efficient, and the reliability of the data transmission is improved. The algorithm is suitable for application in the electric power emergency communication system to ensure the safe operation of the power communication network, and can effectively improve the security of information transmission and the real-time performance of data transmission in the emergency communication system.
Due to the increased demand on wireless devices and their applications, the necessity for efficient and secure encryption algorithms is critical. A secure encryption algorithm is considered energy efficient if it uses...
详细信息
ISBN:
(纸本)9781479921812
Due to the increased demand on wireless devices and their applications, the necessity for efficient and secure encryption algorithms is critical. A secure encryption algorithm is considered energy efficient if it uses a minimum number of CPU operations. In this paper we use numerical calculations to analyze the energy consumption for a class of encryption algorithms. We compute the number of arithmetic and logical instructions in addition to the number of memory access used by each of the algorithms under study. Given some information about the microprocessor used in encryption, we can compute the energy consumed per each instruction and hence compute the total energy consumed by the encryption algorithm. In addition, we use computer simulations to compare the energy loss of transmitting encrypted information over the Wireless channel. Therefore, in this paper we introduce a comprehensive approach where we use two approaches to analyze the energy consumption of encryption algorithms.
In this paper the results of parallelizing a block cipher based on a spatiotemporal chaotic system and a chaotic neural network are presented. A data dependence analysis of loops was applied in order to parallelize th...
详细信息
In this paper the results of parallelizing a block cipher based on a spatiotemporal chaotic system and a chaotic neural network are presented. A data dependence analysis of loops was applied in order to parallelize the algorithm. The parallelism of the algorithm is demonstrated in accordance with the OpenMP standard. The efficiency measurements of a parallel algorithm working in standard modes of operation are shown.
Wireless sensor networking is an emerging technology having a wide range of potential applications. Since most wireless sensors have significantly limited memory capacity and power consumption, we need to implement fa...
详细信息
ISBN:
(纸本)1880843455
Wireless sensor networking is an emerging technology having a wide range of potential applications. Since most wireless sensors have significantly limited memory capacity and power consumption, we need to implement fast encryption/decryption for real time signal processing with small available memory. The purpose of this paper is to evaluate suitability of Rijndael, selected as Advanced encryption Standard by NIST, for encryption in the case of wireless sensor networks. The performance of Rijndael is compared in terms of the code size and the implementation speed with TEA (Tiny encryption algorithm) which requires a small code size but has security problems. We tested implementation of both algorithms on low power 16-bit microcontroller TI MSP430F149 used in Wireless Sensor Network WISE. According to our experiment, Rijndael requires more code size than TEA but Rijndael is relatively suitable for the wireless sensor networks using 16-bit microprocessors.
With the research and discussion about different kinds of methods generating random number by computer and encryption algorithm, REA is raised from a practical standpoint. REA can make key sequence closer to true rand...
详细信息
ISBN:
(纸本)9781424442270
With the research and discussion about different kinds of methods generating random number by computer and encryption algorithm, REA is raised from a practical standpoint. REA can make key sequence closer to true random sequence, thus it ensures data security. Experiments show that the algorithm has many characteristics: understanding easily, practicality, encrypting faster, increasing the difficulty of deciphering and less spending of the system.
As the concept of blockchain continues to the hype, an increasing number of industries join the ranks of using blockchain, which also leads to privacy leaks becoming a potential hidden danger. Therefore, more secure a...
详细信息
暂无评论