This paper presents a high-speed SHA-1 implementation. Unlike the conventional unfolding transformation, the proposed unfolding transformation technique makes the combined hash operation blocks to have almost the same...
详细信息
This paper presents a high-speed SHA-1 implementation. Unlike the conventional unfolding transformation, the proposed unfolding transformation technique makes the combined hash operation blocks to have almost the same delay overhead regardless of the unfolding factor. It can achieve high throughput of SHA-1 implementation by avoiding the performance degradation caused by the first hash computation. We demonstrate the proposed SHA-1 architecture on a FPGA chip. From the experimental results, the SHA-1 architecture with unfolding factor 5 shows 1.17 Gbps. The proposed SHA-1 architecture can achieve about 31% performance improvements compared to its counterparts. Thus, the proposed SHA-1 can be applicable for the security of the high-speed but compact mobile appliances.
RFID systems and equipments have many particularities and limitations which will bring a wide range of security issues, especially when the system contains a large number of tags and multiple readers, some of the trad...
详细信息
RFID systems and equipments have many particularities and limitations which will bring a wide range of security issues, especially when the system contains a large number of tags and multiple readers, some of the traditional solutions are to be helpless. This paper presented a hash locks improved method based on multi-reader, and analyzed on this method. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS 2011]
Instant messenger is an IM application that allows communication in a secured manner. A secured private IM is needed to ensure data transmission between sender and recipient more secure. This paper presents a secure I...
详细信息
ISBN:
(纸本)9781457703881
Instant messenger is an IM application that allows communication in a secured manner. A secured private IM is needed to ensure data transmission between sender and recipient more secure. This paper presents a secure IM architecture. A secure architecture is divided into four modules;chat module, transceiver module, secure module, and routing module. In this research, hash algorithm was applied in secure module. The main function of hash algorithm is to encrypt and convert into hash value. The purpose of this encryption is to ensure unauthorized person cannot view the original data or information through the network. IM application was developed and tested. The result indicates this architecture and hash algorithm able to improve level of data security.
Redundant data transfer over a network is one of the important reasons of traffic congestion today. In this paper, we proposed an efficient and secure file sharing model using de-duplication technology to resolve it. ...
详细信息
ISBN:
(纸本)9783642226052
Redundant data transfer over a network is one of the important reasons of traffic congestion today. In this paper, we proposed an efficient and secure file sharing model using de-duplication technology to resolve it. A file sharing based de-duplication system reduce bandwidth and storage at both client and server machine. It does not download duplicate blocks that already have been downloaded. To achieve the security of client data, three-tier architecture is proposed in this work. For this purpose SHA-1 hash function is being used, in which 8KB block of data is converted into a 20 bytes digest. Thus the design presents a dramatic reduction in storage space requirement for various workloads and hence reduces time to perform backup in bandwidth constraint environment.
In this article, a new protocol called REhash has been devised that gracefully integrates the idea of recursive unicast with hash algorithm to achieve scalable multicast for improved performance. In this model, data p...
详细信息
In this article, a new protocol called REhash has been devised that gracefully integrates the idea of recursive unicast with hash algorithm to achieve scalable multicast for improved performance. In this model, data packets have unicast destination addresses. Therefore, REhash supports pure unicast routers transparently. The key idea of the proposed protocol is to simplify address allocation and implements multicast distribution using recursive unicast hash trees. The branching nodes recursively create packet copies to implement the distribution. REhash adopts the source-specific channel abstraction to tackle the address allocation and the sender access control problems. Consequently, it provides best routes and is suitable for including QoS and authentication parameters inside hash tree construction algorithm. Additionally, REhash tree management provides enhanced tree stability in the presence of group dynamics. (c) 2006 Elsevier Ltd. All rights reserved.
RFID systems and equipments have many particularities and limitations which will bring a wide range of security issues, especially when the system contains a large number of tags and multiple readers, some of the trad...
详细信息
RFID systems and equipments have many particularities and limitations which will bring a wide range of security issues, especially when the system contains a large number of tags and multiple readers, some of the traditional solutions are to be helpless. This paper presented a hash locks improved method based on multi-reader, and analyzed on this method.
In order to prevent malicious attacks using spoofed source addresses,a hierarchical source address validation (HSAV) technique based on cryptographically generated address is *** HSAV,the IP addresses are generated ...
详细信息
In order to prevent malicious attacks using spoofed source addresses,a hierarchical source address validation (HSAV) technique based on cryptographically generated address is *** HSAV,the IP addresses are generated using hash algorithm,called hierarchical hash based address (HHBA).HSAV is divided into two *** one is subnet layer validation,and the other is AS-layer *** each layer,part of the HHBA will be validated by the HSAVcomplaint network *** experimental system shows that this technique can validate the source addresses of data packets with a low cost.
Instant messenger is an IM application that allows communication in a secured manner. A secured private IM is needed to ensure data transmission between sender and recipient more secure. This paper presents a secure I...
详细信息
ISBN:
(纸本)9781457703898
Instant messenger is an IM application that allows communication in a secured manner. A secured private IM is needed to ensure data transmission between sender and recipient more secure. This paper presents a secure IM architecture. A secure architecture is divided into four modules;chat module, transceiver module, secure module, and routing module. In this research, hash algorithm was applied in secure module. The main function of hash algorithm is to encrypt and convert into hash value. The purpose of this encryption is to ensure unauthorized person cannot view the original data or information through the network. IM application was developed and tested. The result indicates this architecture and hash algorithm able to improve level of data security.
IP security (IPsec) protocols are widely used to protect sensitive data over the Internet. For equipment linked by high-bandwidth optical fibers, the throughput requirement usually results in the adoption of high-perf...
详细信息
IP security (IPsec) protocols are widely used to protect sensitive data over the Internet. For equipment linked by high-bandwidth optical fibers, the throughput requirement usually results in the adoption of high-performance network security processors. In this paper, we propose a parallel mesh-structured IPsec (MIPsec) processor, which executes the IPsec protocols for Internet security gateway applications. We have developed several area-efficient cryptographic IPs embedded in MIPsec to lower silicon cost. Thanks to structural regularity, the simple deterministic programming of MIPsec guarantees high utilization of the hardware. Also, both handshake and contention issues are solved in the scheme, such that performance can be scaled up. Specifically, the 6.23-million-gate MIPsec achieves 10-Gb/s wire speed for each routing direction. The proposed MIPsec is suitable for transport mode or other crypto mix as well.
This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for ...
详细信息
This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for the key distribution. After the linear transformation, the original chaotic sequence generated by drive system will be combined to chaotic mapping, converted to an encryption key sequence and constructed as hash table for message authentication. The communication experiment used in the letter proves that the combination of combined chaotic encryption and conventional encryption is safe, feasible, and easy to implement by software.
暂无评论