In this letter, a high-speed and low-latency Ron Rivest-4 (rc4) encryption algorithm is designed based on SMIC 14 nm process. Since the key issue of limiting the throughput of rc4 encryption algorithm is the swapping ...
详细信息
In this letter, a high-speed and low-latency Ron Rivest-4 (rc4) encryption algorithm is designed based on SMIC 14 nm process. Since the key issue of limiting the throughput of rc4 encryption algorithm is the swapping operation of S-box, this proposed design is capable of achieving four swapping operations of S-box within a clock cycle by utilizing fully combinational logic designs and advanced computations. All 256 swapping operations of key scheduling algorithm (KSA) can be done in 64 clock cycles. Moreover, the novel design greatly improves the encryption efficiency of rc4 since each clock cycle offers 4 bytes of key stream. The whole area can be further optimized by reusing the existing modules, and a lightweight countermeasure is embedded into the rc4 design to break the correlation between the processed data and power dissipation against differential power analysis (DPA) attacks. Finally, the whole design is assessed by the SMIC 14 nm process design kits (PDK). The corresponding clock frequency, throughput, area, and latency, respectively, are achieved as 1 GHz, 32 Gbps, 51,596 & mu;$$ \upmu $$m(2), and 74 clock cycles.
In the recent years, there has been tremendous growth in the use of IoT based applications. It is making its footprint strong with day to day life uses as well as industrial uses. IoT has vast applications ranging fro...
详细信息
In the recent years, there has been tremendous growth in the use of IoT based applications. It is making its footprint strong with day to day life uses as well as industrial uses. IoT has vast applications ranging from medical, automobile industry, daily task automation, security surveillance and a lot more. Surveillance based IoT system shares images over internet for information exchange between filed experts and technical members for faster analysis about the locations and if it has any unauthorized activity. So these image information exchange should be secured. Thus this paper proposes a new technique for achieving this task in two phases. In first phase the secret/informative image is encrypted using a novel encryption technique. In second phase this encrypted image is shared to receiver team using a highly secured Tangle(latest secured transmission model advanced from Blockchain).Tangle eliminates the drawback of the traditional blockchain while providing its security features like decentralization, high reliability, and low cost to transfer and store users image information data. Tangle can be combined with IoT to make it more stronger. The proposed method has been tested on various images and its performance has been compared using standard metrics such as Correlation, number of pixels change rate (NPCR), the unified average changed intensity(UACI), information entropy analysis, key space analysis, etc. The proposed technique was found to be better than literature methods like the entropy value is near to an ideal value 8, which is considered safe from brute force attack.
Cloud computing is an on-demand availability of computing resources. The current cloud computing environment uses different algorithms for its security; rc4 is one of them. However, due to the serial implementation of...
详细信息
Cloud computing is an on-demand availability of computing resources. The current cloud computing environment uses different algorithms for its security; rc4 is one of them. However, due to the serial implementation of rc4 over cloud computing, the process of encryption and data transmission is badly affected by the factors of poor latency. This research is proposed to cover this factor by implementing a parallel rc4 algorithm in a cloud computing environment. The parallel rc4 model has been developed in web-based architecture relevant to the cloud computing environment. The method processed data simultaneously in four parallel pipelines encrypted through the rc4 algorithm. The proposed method used rc4 algorithms’ parallel implementation to encrypt and decrypt the data. The proposed method increases the efficiency of data encryption and decryption and transmission over a cloud environment using four pipelines at once. These four pipelines receive data and encrypt them using a key and then merge those four streams into a single cipher. These four pipelines enhance the speed of communication over cloud and solve the latency issue majorly. Data sending from node devices to cloud servers is divided into four equal streams and then encrypted using rc4 distinctly but parallel. Then after the roaming, the data are again first combined and then decrypted using the rc4 algorithm. The sample data sets are evaluated on the criteria of the starting time and ending time of the encryption and decryption of data. Results show that the proposed method is able to enhance the speed of the whole process up to average 3.7% due to the implementation of parallel technique and had reduced the time notably. The future work on this research involves enhancement of security process of rc4 algorithm since it can be breached easily.
In this paper, color image encryption algorithm based on improved rc4 and chaotic maps is proposed. In proposed algorithm, the classic rc4 algorithm in cryptography is improved, and then applied to proposed encryption...
详细信息
ISBN:
(纸本)9783319333892;9783319333878
In this paper, color image encryption algorithm based on improved rc4 and chaotic maps is proposed. In proposed algorithm, the classic rc4 algorithm in cryptography is improved, and then applied to proposed encryption algorithm. Firstly, the original image is divided into some sub-blocks. Then, the improved rc4 algorithm is applied to the operation between the adjacent two sub-blocks, thereby changes the value of pixels. Finally, the image is scrambled by logistic map. Experimental results show that the original image has a big change and a flat histogram after encrypted, and that the proposed algorithm has an enough large key space and a very high sensitivity to the key.
The main challenge in any online banking system is to secure information that stored in web server, also providing extra degree of privacy to individual bank client during every transaction. Unfortunately, traditional...
详细信息
ISBN:
(纸本)9781538692424
The main challenge in any online banking system is to secure information that stored in web server, also providing extra degree of privacy to individual bank client during every transaction. Unfortunately, traditional systems do not provide the scope to hide an individual client's transaction information in the server. As a result, there is a chance of being cheated by any bank employee or the authority who are responsible behind running the system. In this work we propose a method to design a secure web server using rc4 algorithm for online banking system. In this system, we have introduced a secure money transaction process by introducing a secrete key during each transaction made by the client or user. Only the valid client or authorized user can able to access his information. For this he has to make a registration to the system by providing some basic information about himself. But it's really important to memorize the encryption key which provides both the encryption & decryption. If a user forgets this key, he will not be able to make any transaction.
The 8-queens problem of placing 8 non-attacking queens on an 8x8 chessboard is used to hide message in an image. The method helps in randomizing the bit selection in a cover image for hiding purpose. Cover image is di...
详细信息
The 8-queens problem of placing 8 non-attacking queens on an 8x8 chessboard is used to hide message in an image. The method helps in randomizing the bit selection in a cover image for hiding purpose. Cover image is divided into blocks of 8x1 bytes and then masked with solutions of the 8-queens problem. Bits from the block are collected corresponding to the 8-queen solution to make a 7 bit string. LSB of the block is not considered. It gives a number in the range of 0 to 127. If a bit string, corresponding to the 8-queens solutions, matches with ASCII code of the first character from message, the corresponding solution number of the 8-queens problem is encrypted using rc4, and the cipher is stored in first block of the cover. This encrypted value works as key. The solution number corresponding to next character is XORED with the key and the resultant value is embedded in the LSB of next block. The algorithm has been tested with cover of different image file formats like BMP, PNG and TIFF. The algorithm provides very good capacity, imperceptibility and robustness.
暂无评论