Along with the continuous growth and improvement of computer and communication technologies, wireless sensors are needed in more and more places to fulfil specific tasks. A lightweight data encryption mechanism is des...
详细信息
Along with the continuous growth and improvement of computer and communication technologies, wireless sensors are needed in more and more places to fulfil specific tasks. A lightweight data encryption mechanism is designed for the limited processing power, storage space and energy of wireless sensor networks. The mechanism improves the rc6 algorithm and adds the "symmetric layer" operation. In order to further improve the security of the ciphertext and the strength of the data encryption, the AES-128 encryption algorithm is used in the data link layer, the network layer, and the application layer, respectively. The experiment is based on the STM32L series of ultra-low-power ARM processors, and the operating frequency of the STM32L controller is tuned to 64 MHz to obtain faster efficiency;three groups of experiments on the encryption mechanism are carried out by using the original rc6 algorithm and the improved algorithm, and the lengths of the keys used in the experiments are 16 bytes, 24 bytes, and 32 bytes, respectively, and the data-receiving and transmitting functions are tested separately. This avoids the delay of transceiver mode switching when using a single module for communication, and improves the quality and stability of multi-machine bidirectional communication.
Several modifications and analysis on encryption performance and security were studied and evaluated by several researchers to measure the efficiency and quality of the proposed enhancement in the encryption method. I...
详细信息
ISBN:
(纸本)9781450366427
Several modifications and analysis on encryption performance and security were studied and evaluated by several researchers to measure the efficiency and quality of the proposed enhancement in the encryption method. In this paper, the authors evaluated the performance of the image encryption using the enhanced rc6 permutation-diffusion operation integrating the concept of cyclic-shift permutation. Statistical analysis, key space analysis, and runtime execution analysis were conducted based on considered metrics such as key sensitiveness, histogram and maximum deviation, mean squared error, mean value analysis and the speed measurement of encryption and decryption process. Based on the numerical and visual results, the good qualities of encryption using this method were achieved.
Paper comes with design of various event data recorder designed using microcontrollers & microprocessors. Data of various events are recorder by considering events of extreme condition. Analysis was made case wise...
详细信息
ISBN:
(纸本)9781728135069
Paper comes with design of various event data recorder designed using microcontrollers & microprocessors. Data of various events are recorder by considering events of extreme condition. Analysis was made case wise while moving vehicle through different geographical locations. Graphical and tabular analysis was made to explain various cases. To analyze data, four cases are consider. Each case elaborates and focuses on certain aspects while traveling vehicle from location A to location B. Case wise analysis is also provided to know the exact cause of accident. Data analysis is done by measuring the mismatch between previous and current reading. This table will show delta changes in sensor values from which prediction regarding accident can be done.
rc6 is considered one of the encryption strategies being utilized and modified to be suited for image protection. However, the rc6 encryption algorithm is still prone to statistical and differential attack which is on...
详细信息
rc6 is considered one of the encryption strategies being utilized and modified to be suited for image protection. However, the rc6 encryption algorithm is still prone to statistical and differential attack which is one of the major concerns whenever open networks are to be used. In this paper, we proposed a modification of rc6 algorithm for image encryption. A new technique of permutationdiffusion architecture based on a modified concept of cyclic shift is integrated to increase the degree of permutation and diffusion mechanism of rc6 for image encryption. The security level, processing time and diffusion rate were tested using image evaluation metrics such as correlation coefficient test, number of pixel change rate(NPCR) test, unified average change intensity(UACI) test, and run-time analysis to measure its efficiency along with the simulation process. Results show that the proposed method illustrates a lower value of correlation among pixels and higher value of NPCR and UACI which makes the proposed method highly resistant to statistical and differential attacks. Increased security level with minimal time consumption is achieved in our approach.
This paper deals with the cryptographic performance of Rijndael and rc6 algorithms in real environment. The cryptographic performance of Rijndael and rc6 algorithms is evaluated from the diffusion, confusion, and spac...
详细信息
ISBN:
(纸本)9781538605349;9781538605332
This paper deals with the cryptographic performance of Rijndael and rc6 algorithms in real environment. The cryptographic performance of Rijndael and rc6 algorithms is evaluated from the diffusion, confusion, and space-time complexity of them. The diffusion and confusion of them are quantitatively measured by using the avalanche effect and runs test. The time performance metrics are encryption and decryption speeds while space performance metric is memory utilization. The experimental results show that both Rijndael and rc6 have good avalanche properties for the plaintext and key. They are very close to the SAC(Strict Avalanche Criterion). The cipher texts of Rijndael and rc6 have good randomness and unpredictability from the results of runs test. However, the encryption speed of rc6 algorithm is much faster than that of Rijndael algorithm in the same experimental conditions, and is independent of the key length. The encryption and decryption speed of Rijndael are asymmetric although Rijndael algorithm is a symmetric block cipher. Meanwhile, rc6 needs more CPU and memory resources than Rijndael algorithm. So the use of rc6 is beneficial where high encryption speed is required while Rijndael is beneficial where memory resource is key concern.
We analyze the X2 cryptanalysis, one of the most successful cryptanalysis technique against the rc6 algorithm. We apply this type of cryptanalysis as distinction cryptanalysis as well as key-recovery crypt-analysis. W...
详细信息
ISBN:
(纸本)9781920682798
We analyze the X2 cryptanalysis, one of the most successful cryptanalysis technique against the rc6 algorithm. We apply this type of cryptanalysis as distinction cryptanalysis as well as key-recovery crypt-analysis. We present a modified version of rc6 by introducing a very simple data-dependent swapping function in its structure. The conclusions inferred by statistical experiments is that this modified version is stronger against the X2 cryptanalysis technique.
暂无评论