An order to improve the execution efficiency of rijndael algorithm, starting from the analysis of the transformation of the core part of the rijndael algorithm, a method based on data stream decomposition was proposed...
详细信息
An order to improve the execution efficiency of rijndael algorithm, starting from the analysis of the transformation of the core part of the rijndael algorithm, a method based on data stream decomposition was proposed in the multi-core platform for parallel optimization of rijndael algorithm. The main method adopted is to divide the effect of each component transformation of the wheel transform on the whole state into the effect of each component unit of the state, so that the component transformation can be carried out in parallel. The experimental results show that the average acceleration ratio of the decomposition of rijndael algorithm based on data stream is 1.0674, and the performance is 6.74% higher than before. Therefore, the scheme of parallel optimization of rijndael algorithm based on data flow decomposition is feasible, and the performance improvement brought by parallel optimization of rijndael algorithm basically meets the expected requirements of the experiment.
作者:
Muthamizhan, T.Anna Univ
Sri Sai Ram Inst Technol Dept Elect & Elect Engn Chennai 600044 Tamil Nadu India
A web-based fuzzy-logic direct torque control of induction motor (IM) simulation program in a distributed client/server architecture and its implementation steps are discussed in this paper. The client program is a we...
详细信息
A web-based fuzzy-logic direct torque control of induction motor (IM) simulation program in a distributed client/server architecture and its implementation steps are discussed in this paper. The client program is a web page developed in java software, which accesses remotely simulated IM dynamics program by executing it in the server through the internet. The proposed IM simulation program offers a convenient remotely accessible which can work on any computer platform and simulation environment, implemented in a distributed client/server architecture, for a standalone motor simulation programs. This architecture has two major parts: graphical user interface (GUI) program in the client side and simulation engine in the server side. In the client side, the GUI program is developed in java software typically run in any computer platforms in client, allowing us to access the simulation program in the server using any browser and to send the data's to the server, and to retrieve/exhibit the outputs from the server using different sets of parameters and configurations.
This paper deals with the cryptographic performance of rijndael and RC6 algorithms in real environment. The cryptographic performance of rijndael and RC6 algorithms is evaluated from the diffusion, confusion, and spac...
详细信息
ISBN:
(纸本)9781538605349;9781538605332
This paper deals with the cryptographic performance of rijndael and RC6 algorithms in real environment. The cryptographic performance of rijndael and RC6 algorithms is evaluated from the diffusion, confusion, and space-time complexity of them. The diffusion and confusion of them are quantitatively measured by using the avalanche effect and runs test. The time performance metrics are encryption and decryption speeds while space performance metric is memory utilization. The experimental results show that both rijndael and RC6 have good avalanche properties for the plaintext and key. They are very close to the SAC(Strict Avalanche Criterion). The cipher texts of rijndael and RC6 have good randomness and unpredictability from the results of runs test. However, the encryption speed of RC6 algorithm is much faster than that of rijndael algorithm in the same experimental conditions, and is independent of the key length. The encryption and decryption speed of rijndael are asymmetric although rijndael algorithm is a symmetric block cipher. Meanwhile, RC6 needs more CPU and memory resources than rijndael algorithm. So the use of RC6 is beneficial where high encryption speed is required while rijndael is beneficial where memory resource is key concern.
AES is one of the most widely used cryptographic systems. DNA computing has the high efficiency to solve some NP-problems. Therefore many scientists try to combine DNA computing with cryptography. In this paper, an al...
详细信息
ISBN:
(纸本)9780878492879
AES is one of the most widely used cryptographic systems. DNA computing has the high efficiency to solve some NP-problems. Therefore many scientists try to combine DNA computing with cryptography. In this paper, an algorithm is designed to simulate a plaintext encrypted by DNA biotechnology and modern cryptography. After mapping the plaintext information as DNA chain and handling the base chain with biological genetic technology, we can get the gene codes form, then using the rijndael algorithm to deal with the biological chain with cryptography and get the final result. It makes the DNA-based cryptography more effective and more security.
Based on the analysis of the round transformation and key expansion, the Advanced Encryption Standard (AES) algorithm is optimized through the Look-up Table. And then the optimized rijndael algorithm based on SOPC (Sy...
详细信息
ISBN:
(纸本)9780769539225
Based on the analysis of the round transformation and key expansion, the Advanced Encryption Standard (AES) algorithm is optimized through the Look-up Table. And then the optimized rijndael algorithm based on SOPC (System on a programmable Chip) is designed and implemented through software and hardware. According to the software design flow chart of the optimized rijndael algorithm, the program design of the corresponding B table and key generator are completed. The testing results are: the highest working frequency is 147 MHz;the biggest data flow is 2382 Mbps. The design of the rijndael algorithm based on "NIOS II + FPGA" can achieve a higher data processing speed while it occupies relatively low resources. The design has a big breakthrough compared to the traditional FPGA realization.
The Substitution box (S-Box) forms the core building block of any hardware implementation of the Advanced Encryption Standard (AES) algorithm as it is a non-linear structure requiring multiplicative inversion. This pa...
详细信息
The Substitution box (S-Box) forms the core building block of any hardware implementation of the Advanced Encryption Standard (AES) algorithm as it is a non-linear structure requiring multiplicative inversion. This paper presents a full custom CMOS design of S-Box/Inversion S-Box (Inv S-Box) with low power GF (2(8)) Galois Field inversions based on polynomial basis, using composite field arithmetic. The S-Box/Inv S-Box utilizes a novel low power 2-input XOR gate with only six devices to achieve a compact module implemented in 65 nm IBM CMOS technology. The area of the core circuit is only about 288 mu m(2) as a result of this transistor level optimization. The hardware cost of the S-Box! Inv S-Box is about 158 logic gates equivalent to 948 transistors with a critical path propagation delay of 7.322 ns enabling a throughput of 130 Mega-SubBytes per second. This design indicates a power dissipation of only around 0.09 mu W using a 0.8 V supply voltage, and, is suitable for applications such as RFID tags and smart cards which require low power consumption with a small silicon die. The proposed implementation compares favorably with other existing S-Box designs. (C) 2012 Elsevier B.V. All rights reserved.
By introducing dynamic keys in this paper, we present a new encryption algorithm, which is called dynamic encryption algorithm. The algorithm allows a key to encrypt the plaintext twice, producing two ciphertexts, so ...
详细信息
ISBN:
(纸本)9783037853849
By introducing dynamic keys in this paper, we present a new encryption algorithm, which is called dynamic encryption algorithm. The algorithm allows a key to encrypt the plaintext twice, producing two ciphertexts, so that each of them is different if the time is not same. Thus chosen plaintext attacks and known plaintext attacks will become infeasible.
rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long security evaluation;it is well proven in terms of its strength and efficiency. The substitution box is the back bone of ...
详细信息
rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long security evaluation;it is well proven in terms of its strength and efficiency. The substitution box is the back bone of the cipher and its strength lies in the simplicity of its algebraic construction. The present paper is a study of the construction of rijndael Substitution box and the effect of varying the design components on its cryptographic properties.
According to the design criterion of S-box in rijndael algorithm, a number of S-boxes with good cryptographic properties were constructed, and the avalanche probabilities of these S-boxes were analyzed from variance p...
详细信息
ISBN:
(数字)9783642239939
ISBN:
(纸本)9783642239922;9783642239939
According to the design criterion of S-box in rijndael algorithm, a number of S-boxes with good cryptographic properties were constructed, and the avalanche probabilities of these S-boxes were analyzed from variance point of view. Based on these studies, a key-controlled rijndael algorithm with multiple S-boxes was proposed with the improvement of Sub Bytes algorithm in rijndael. Experimental results show that the improved algorithm has stronger ability to resist differential attack, and the avalanche effect of the algorithm is more reasonable.
According to the design criterion of S-box in rijndael algorithm, a number of S-boxes with good cryptographic properties were constructed, and the avalanche probabilities of these S-boxes were analyzed from variance p...
详细信息
According to the design criterion of S-box in rijndael algorithm, a number of S-boxes with good cryptographic properties were constructed, and the avalanche probabilities of these S-boxes were analyzed from variance point of view. Based on these studies, a key-controlled rijndael algorithm with multiple S-boxes was proposed with the improvement of Sub Bytes algorithm in rijndael. Experimental results show that the improved algorithm has stronger ability to resist differential attack, and the avalanche effect of the algorithm is more reasonable.
暂无评论