This paper describes a preliminary performance evaluation of the implementation of secure hash algorithm (SHA-512) building blocks on a cell-FPGA-like hybrid CMOS/nanodevice architecture. Such circuits will combine a ...
详细信息
ISBN:
(纸本)9781424439676
This paper describes a preliminary performance evaluation of the implementation of secure hash algorithm (SHA-512) building blocks on a cell-FPGA-like hybrid CMOS/nanodevice architecture. Such circuits will combine a semiconductor- transistor (CMOS) stack and a two-level nanowire crossbar with nanoscale two-terminal nanodevices (programmable diodes) formed at each crosspoint. The new design is based on two-cell fabric CMOL FPGA which can be used for mapping any arbitrary circuit. In addition, using a custom set of design automation tools quasi-optimium gate placing, placing, routing and rerouting are provided for SHA-512 fundamental building blocks. It is shown that such a design results in a circuit which is defect tolerant, much faster and strikingly denser than its CMOS counterpart
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th...
详细信息
ISBN:
(纸本)9781538652572
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of the facility it provided. In this, user pays only for the services it uses. Now a days, vast amount of information gets stored over cloud, which include personal file, images, pdf, text, multimedia data etc. So security becomes one of the important issue. Everyone just want to upload, store its data without worrying about the security. IT organization should look after to provide security to the document. Documents content get altered by some outsider attacker, so it is necessary to verify the integrity. This data get duplicated and unnecessary much of the space will get waste. So to avoid this, data must be de-duplicated and uploaded over the cloud server. For this secure hash algorithm is used. It calculates the hash value for chunk of data and store over cloud. Only reducing unnecessary wastage of space is not the solution administrator should look toward the security issue. TPA is used for verification of integrity of the document. This system is proposed for achieving this both issues.
This paper proposes a robust 256-bit hash producer. The underlying motivation is to overcome security-related limitations of pseudo-random number generators embedded in Linux and Windows, which render these widely use...
详细信息
ISBN:
(纸本)9781728151465
This paper proposes a robust 256-bit hash producer. The underlying motivation is to overcome security-related limitations of pseudo-random number generators embedded in Linux and Windows, which render these widely used operating systems vulnerable to security breaches. The proposed approach is called hash Bits Producer-256 (HBP-256). It produces outputs that look like random to an adversary who is unaware of its internal state. In addition, it provides forward and backward security in case its internal state is known to an adversary at any particular time. HBP-256 offers such protection by providing the following capabilities. Firstly, output pseudo-randomness. This is ensured by: (1) seeding and reseeding HBP256 from three sources of entropy input, of which two are non-deterministic hardware sources;and (2) maintaining a high-level entropy input. Secondly, provide forward security. This is ensured by using two one-way irreversible functions: the secure hash algorithm-256 (SHA-256) and SHA-512. Thirdly, provide backward security. This is ensured by: (1) maintaining cumulative entropy;(2) sustaining rapid refreshment rates for the entropy pools;and (3) preserving uniqueness of bits input to the SHA-512 at any particular time. Security analysis is conducted by exposing HBP-256 to external and internal attacks. Based on the security analysis, it is concluded that HBP-256's individual and collaborative defenses successfully address adversaries' attempts to compromise HBP-256 from outside as well as from within its boundary. HBP-256 meets the intended security requirements, and achieves its objective.
Along with the widespread concern of spam problem, at present, there are spam filtering system nowadays about the problem of semantic imperfection and spam filter low effect in the multi-send spam. This paper proposes...
详细信息
ISBN:
(纸本)9783540877332
Along with the widespread concern of spam problem, at present, there are spam filtering system nowadays about the problem of semantic imperfection and spam filter low effect in the multi-send spam. This paper proposes a model of spam filtering which based on latent semantic analysis (LSA) and message-digest algorithm 5 (SHA). Making use of the LSA marks the latent feature phrase in the spare, semantic analysis is led into the spam filtering technique: the "e-mail fingerprint" of multi-send Spain is born with SHA on the LSA analytical foundation, the problem of filtering technique's low effect in the rnulti-send spare is resolved with this kind of method. We have designed a spate filtering system based on this model. Our designed system was evaluated with an optional dataset. The results obtained were compared with KNN algorithm filter experiment results show that system based on Latent Semantic Analysis and SHA performs KNN. The experiments show the expected results obtained, and the feasibility and advantage of the new spam filtering method is validated.
In this paper, a novel multi-scroll memristive chaotic system is designed based on Chua's system via introducing a nonlinear memristor. The dynamics of this system is analyzed based on bifurcation diagrams, Lyapun...
详细信息
ISBN:
(纸本)9781450399449
In this paper, a novel multi-scroll memristive chaotic system is designed based on Chua's system via introducing a nonlinear memristor. The dynamics of this system is analyzed based on bifurcation diagrams, Lyapunov exponents and phase diagrams. Subsequently, an image encryption scheme based on this system is then proposed. First, the proposed chaotic system is used to generate continuously robust chaotic sequences, the hash values of plaintext images are embedded in the generation and selection of chaotic sequences and involved in each step of encryption to establish the coupling relationship between plaintext and ciphertext. Second, Knuth-Durstenfeld algorithm is used to scramble the high four-bit plane of the plain image twice, and the chaotic sequence is used as the index sequence, which greatly improves the efficiency and randomness of the permutation process. Finally, chaotic sequences are involved in DNA coding rules and pixel-level diffusion. The algorithm is highly sensitive to plain images, and it can realize adaptive encryption. Through performance analysis and comparison with recent literature, the proposed algorithm can cope with various attacks and show excellent performance.
This paper summarizes the design of a reprogrammable Application Specific Integrated Circuit capable of performing all members of the secure hash algorithm (SHA) group of hash Functions. The need for high-speed crypto...
详细信息
ISBN:
(纸本)9781424494743
This paper summarizes the design of a reprogrammable Application Specific Integrated Circuit capable of performing all members of the secure hash algorithm (SHA) group of hash Functions. The need for high-speed cryptography is introduced, as well as the SHA-1 and SHA-2 hash Functions and their operation. Work performed at other institutions to improve throughput and power consumption is presented with advantages and disadvantages discussed. The ASIC design is then discussed, with comparisons made to previously published ASIC and FPGA implementations. The possibility of using this ASIC architecture for the SHA-3 candidates, as well as the Message Digest (MD) families of hash Functions is suggested as an area of future work as it is shown the ASIC Architecture designed would be capable of this with only program modifications required.
With the increasing number of electronic based systems being connected to the Internet via wired or wireless connections in the era of the IoT, the importance of security aspects is well recognized. At the same time g...
详细信息
ISBN:
(纸本)9781728119533
With the increasing number of electronic based systems being connected to the Internet via wired or wireless connections in the era of the IoT, the importance of security aspects is well recognized. At the same time growth of available complexity and increasing market share of reconfigurable integrated circuits make integration of whole digital systems feasible at relatively low cost. Placing security functions into reconfigurable logic might be advantageous in case of algorithm changes, bug fixes, or updates for hardening of the core against attacks. In this paper we thus want to give an overview of available open-source hardware security building blocks for basic cryptographic functions and show evaluation results of selected cores in FPGA technology.
This paper introduces a secured and distributed Big Data storage scheme with multiple authorizations. It divides the Big Data into small chunks and distributes them through multiple Cloud locations. The Shamir's S...
详细信息
ISBN:
(纸本)9781728100067
This paper introduces a secured and distributed Big Data storage scheme with multiple authorizations. It divides the Big Data into small chunks and distributes them through multiple Cloud locations. The Shamir's Secret Sharing and secure hash algorithm are employed to provide the security and authenticity of this work. The proposed methodology consists of two phases: the distribution and retrieving phases. The distribution phase comprises three operations of dividing, encrypting, and distribution. The retrieving phase performs collecting and verifying operations. To increase the security level, the encryption key is divided into secret shares using Shamir's algorithm. Moreover, the secure hash algorithm is used to verify the Big Data after retrieving from the Cloud. The experimental results show that the proposed design can reconstruct a distributed Big Data with good speed while conserving the security and authenticity properties.
This paper deals with the design and implementation of the post-quantum public-key algorithm McEliece. Seamless incorporation of a new error generator and new SHA-3 module provides higher indeterminacy and more random...
详细信息
ISBN:
(纸本)9781479934324
This paper deals with the design and implementation of the post-quantum public-key algorithm McEliece. Seamless incorporation of a new error generator and new SHA-3 module provides higher indeterminacy and more randomization of the original McEliece algorithm and achieves CCA2 security standard. Due to the lightweight and high-speed implementation of SHA-3 module the proposed 128-bit secure McEliece architecture provides 6% higher performance in only 0.78 times area of the best known existing design.
Anonymous location schemes classified into reactive routing methods and proactive routing methods and anonymous middleware methods. Reactive routing methods includes hop by hop encryption and redundant traffic analysi...
详细信息
ISBN:
(纸本)9781479938346
Anonymous location schemes classified into reactive routing methods and proactive routing methods and anonymous middleware methods. Reactive routing methods includes hop by hop encryption and redundant traffic analysis which either generates high cost or cannot provide full anonymity to source, destination and routes. An Anonymous Location-based Efficient Routing protocol (ALERT) was used to offer high anonymity protection at a low cost. GPSR protocol is used to transmit message from source to destination. Like other anonymity routing algorithms, ALERT is not completely bulletproof to all attacks. To prevent occurrence of active attacks advanced cryptographic algorithm SHA-2 is used, which provides better security features. Thus it provides full anonymity in Source destination as well as in route.
暂无评论