Aiming at the problem that mobile nodes in Wireless Sensor Network (WSN) lack credibility verification, a Sink node trusted access authentication protocol using packet cipheralgorithm for mobile WSN is proposed based...
详细信息
Aiming at the problem that mobile nodes in Wireless Sensor Network (WSN) lack credibility verification, a Sink node trusted access authentication protocol using packet cipheralgorithm for mobile WSN is proposed based on the Internet of Things (IoT) environment. Firstly, the mobile Sink node is utilized to authenticate the sensor node and verify the platform's credibility of the mobile node. Secondly, pre-stored pseudonyms and corresponding public and private keys of mobile nodes are utilized to realize the anonymity of mobile nodes, and the security proof is given under CK (Canetti-Krawczyk) model. Finally, the block cipher algorithm is introduced, and the advantages of the two algorithms are fused. The correctness and security of the proposed protocol have been proved by the verification experiments. In addition, compared with other authentication protocols, the proposed protocol has lower communication overhead.
The existing research on Amdahl's law is limited to multi/many-core processors, and cannot be applied to the important parallel processing architecture of coarse-grained reconfigurable arrays. This paper studies t...
详细信息
The existing research on Amdahl's law is limited to multi/many-core processors, and cannot be applied to the important parallel processing architecture of coarse-grained reconfigurable arrays. This paper studies the relation between the multi-level parallelism of block cipher algorithms and the architectural characteristics of coarse-grain reconfigurable arrays. We introduce the key variables that affect the performance of reconfigurable arrays, such as communication overhead and configuration overhead, into Amdahl's law. On this basis, we propose a performance model for coarse-grain reconfigurable blockcipher array (CGRBA) based on the extended Amdahl's law. In addition, this paper establishes the optimal integer nonlinear programming model, which can provide a parameter reference for the architecture design of CGRBA. The experimental results show that: (1) reducing the communication workload ratio and increasing the number of configuration pages reasonably can significantly improve the algorithm performance on CGRBA;(2) the communication workload ratio has a linear effect on the execution time.
As the most commonly used side-channel analysis method, Correlation Power Analysis (CPA) usually uses the divide-and-conquer strategy to guess the single-byte key in the scenario of blockcipher parallel implementatio...
详细信息
As the most commonly used side-channel analysis method, Correlation Power Analysis (CPA) usually uses the divide-and-conquer strategy to guess the single-byte key in the scenario of blockcipher parallel implementation. However, this method cannot effectively use the power consumption information, resulting in a large number of power consumption traces. Therefore, genetic algorithm-based CPA is proposed, which can efficiently extract keys by multi-byte power analysis. However, genetic algorithm-based CPA tends to sacrifice computational cost to achieve a high key guessing success rate. To solve the above problems, this article focuses on bitwise linear leakage and proposes a multi-byte power analysis architecture based on the raindrop ripple algorithm. First, we propose to complete the key initialization by multiple linear regression. Second, we propose a novel swarm intelligence algorithm, the raindrop ripple algorithm, tailored for multibyte power analysis based on the principles of "family planning" and "eugenics," which greatly improves the probability of producing individuals with high fitness values. Third, we further enhance the possibility of the correct key being recovered by traversing the candidate key space in specific conditions. To verify the key guessing efficiency of the multi-byte power analysis architecture based on the raindrop ripple algorithm, comparative experiments are conducted on SAKURA-G with three power analysis methods based on genetic algorithms. Experimental results show that our proposal not only has the efficient power information utilization of multi-byte power analysis but also has a convergence speed comparable to or even faster than that of single-byte CPA. Its efficiency of key guessing is improved by 85.64% compared to EfficiencyGa-CPA, and its convergence speed is even faster than that of single-byte CPA at 725 power traces, and 83.87% faster than single-byte CPA at 1000 power traces, which is astonishing as a multi-byte power
As a common nonlinear component in blockcipher, S-box plays a role of confusion and determines the security strength of the whole block cipher algorithm. How to generate a high-performance S-box has always been a hot...
详细信息
As a common nonlinear component in blockcipher, S-box plays a role of confusion and determines the security strength of the whole block cipher algorithm. How to generate a high-performance S-box has always been a hot research issue. Based on four new proposed theorems, a new proposed chaotic map and artificial jellyfish optimization algorithm, a three-layer optimization method for generating high-performance S-box is proposed in this paper. In the first layer, a S-box with high nonlinearity satisfying bijection is generated by combining the new chaotic map. In the second layer, the differential uniformity of S-box is optimized without reducing the nonlinearity of S-box. In the third layer, based on the artificial jellyfish optimization algorithm, a multi-objective optimization algorithm with nonlinearity and differential uniformity as constraints is proposed to optimize other criteria of the S-box. Finally, a block cipher algorithm is designed by using high-performance S-box, chaotic map, improved generalized Feistel structure, etc. Many tests are carried out for the algorithm including key sensitivity analysis, key space size analysis, confusion and diffusion test and ciphertext statistical analysis, and good results are obtained.
Based on some recent results derived from the Shannon theory of secrecy systems, this paper develops a new mathematical model for an infinite cryptosystem with perfect secrecy, and establishes a sufficient condition f...
详细信息
Based on some recent results derived from the Shannon theory of secrecy systems, this paper develops a new mathematical model for an infinite cryptosystem with perfect secrecy, and establishes a sufficient condition for a cryptosystem of perfect secrecy with non-uniformly distributed keys based on several groups of orthogonal Latin squares. The new model has the following features and advantages. First, the model with non-uniformly distributed keys, where the number of keys can be many more than the number of messages in a secrecy system, greatly improves the common one with finite perfect secrecy based on modulo additions in the current literature. Second, the model can be regraded as a theoretical base for designing practical block cipher algorithms. Third, since the number of basic cryptosystems in the new model is many more than that of the basic cryptosystems available in the current literature, it helps design new stream and block cipher algorithms with practical security and better resistance to known plaintext attacks. Finally, the present research on infinite secrecy systems of the new model is theoretically valuable and practically useful, as illustrated by an example of designing new basic cryptosystems under the conditions of the new model.
The growth of billions of devices functioning in resource-constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and...
详细信息
The growth of billions of devices functioning in resource-constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced Encryption Standard (AES) are sometimes too resource-intensive for these devices. Lightweight cryptography has become a crucial field as a remedy, created especially to maintain security while maximizing energy efficiency and reducing resource usage. With an emphasis on contrasting well-known lightweight blockciphers and pointing out areas for future research, this paper examines the most recent developments in lightweight cryptographic methods. In order to synthesize insights into present issues and future goals, it explores cutting-edge methods that improve performance, security, and energy efficiency. Among the main trends that were covered were the trade-offs between resource limitations and security strength, hardware–software co-optimization, block and stream cipher optimization, and hybrid encryption techniques. The study’s conclusion emphasizes how urgently more research is needed to create cryptographic solutions that can sufficiently safeguard IoT devices.
A virtual private network (VPN) extends a private network across a public network, such as the Internet. The purpose of this research study is to implemented ATHS3 stream cipher and VEA block cipher algorithm as the a...
详细信息
ISBN:
(纸本)9781509023264
A virtual private network (VPN) extends a private network across a public network, such as the Internet. The purpose of this research study is to implemented ATHS3 stream cipher and VEA block cipher algorithm as the addition of TLS ciphersuites in an SBC Raspberry Pi Model B+ as a personal VPN gateway. It consists three main processes, namely the initialization process, key generation process, and encryption process to secure data that are sent through the VPN. The personal VPN Gateway will obtain cryptographic algorithms, TLS ciphersuites supply from OpenSSL library, and VEA algorithm implementation ciphersuites as the addition of TLS ciphersuites. Implementation of VEA algorithm source code will be made in both of the OpenSSL library and the cryptographic library. This comparative study will be conducted by implementing not only a stream algorithm, but also block cipher algorithm on the same VPN gateway and analyze its performances in order to get the most efficient algorithm to secure data that are sent through the VPN. Not only data transfer rate, but also memory usage measurement in SBC Raspberry Pi Model B+ as personal VPN gateway. The personal VPN gateway works as a bridge between the user's PC and network to secure its communication to internal resources, so data that is transmitted is prevented from attacks. The result of performances analysis will recommend the most efficient cipheralgorithm, data transfer rate and memory usage to be implemented in an SBC Raspberry Pi Model B+ as a personal VPN gateway on OpenVPN.
Interconnection network plays an important role in Coarse-Grained Reconfigurable Arrays and it has a significant influence on the performance,area overhead and power *** make the interconnection network adapt to the m...
详细信息
ISBN:
(纸本)9781509066261;9781509066254
Interconnection network plays an important role in Coarse-Grained Reconfigurable Arrays and it has a significant influence on the performance,area overhead and power *** make the interconnection network adapt to the mapping of cryptographic algorithms with lower area overhead,an area-efficient interconnection network based on the Mesh topology structure is proposed,and a new kind of routing node is *** on the 55 nm CMOS standard cell library to design,the throughput of the interconnection network is 37.5 GB/s,and the area is 0.37 mm,which is 4.9% of the total area of the *** with the related classes,the area ratio is decreased obviously;structure dynamic reconstruction rate is 5-150 times higher;and the utilization rate of the reconfigurable cryptographic processing blocks is also improved greatly.
Interconnection network plays an important role in Coarse-Grained Reconfigurable Arrays and it has a significant influence on the performance, area overhead and power consumption. To make the interconnection network a...
详细信息
Interconnection network plays an important role in Coarse-Grained Reconfigurable Arrays and it has a significant influence on the performance, area overhead and power consumption. To make the interconnection network adapt to the mapping of cryptographic algorithms with lower area overhead, an area-efficient interconnection network based on the Mesh topology structure is proposed, and a new kind of routing node is constructed. Based on the 55 nm CMOS standard cell library to design, the throughput of the interconnection network is 37.5 GB/s, and the area is 0.37 mm~2, which is 4.9% of the total area of the system. Compared with the related classes, the area ratio is decreased obviously;structure dynamic reconstruction rate is 5-150 times higher;and the utilization rate of the reconfigurable cryptographic processing blocks is also improved greatly.
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and ba...
详细信息
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and backup. In cloud computing, protection of data in server and while in media is a challenging issue. Our proposed encryption algorithm Hybrid DESCAST has been designed to provide the security of huge volume of data sent through the media and the same will remain encrypted in the cloud sever. This cipher text will be decrypted only when the same is required to be used by the authenticated user. Problems of individual DES and CAST block cipher algorithm have been tackled by our proposed encryption algorithm. Complexity and Computation time for encryption and decryption for our proposed algorithm is higher than the individual DES and CAST algorithm. This paper is focused to provide security of data in cloud server, as well as for the data while transferring from client to cloud server and vice versa. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://***/licenses/by-nc-nd/4.0/).
暂无评论