In this paper, we investigate the inner encryption principles of Truecrypt volumes including cryptographic algorithms, encryption mode, key derivation way and password verifying process. Besides, we explain the forens...
详细信息
In this paper, we investigate the inner encryption principles of Truecrypt volumes including cryptographic algorithms, encryption mode, key derivation way and password verifying process. Besides, we explain the forensic operation by password cracking with concrete data instances. Our research could be helpful in twoscenarios of Truecrypt application:one is toenable a personal user toretrieve his forgotten password, the other is toprovide computer forensic analysis of criminal activity. Tothe best of our knowledge, this is the first time that the complete and explicit password cracking details are presented publicly and finally we alsogive some suggestion toenhance the security of Truecrypt encryption.
Data security is an important issue in today's computer networks. This paper presents the improved IDEA chip, which implements a new version of the IDEA cryptographic algorithm. Improved IDEA is oriented towards c...
详细信息
ISBN:
(纸本)9780769508436
Data security is an important issue in today's computer networks. This paper presents the improved IDEA chip, which implements a new version of the IDEA cryptographic algorithm. Improved IDEA is oriented towards computer network applications demanding high throughput. Its architecture was based on architecture of the HIPCrypto chip, which exploits both the spatial and the temporal parallelism available in the IDEA algorithm. These new versions can encrypt/decrypt at data rates up to 6.5 Gbps.
Power grid is the most involved human-made system. Designing energy efficient security protocol first requires an understanding of and data related to the energy consumption of common encryption schemes. Providing tim...
详细信息
ISBN:
(纸本)9781467356039
Power grid is the most involved human-made system. Designing energy efficient security protocol first requires an understanding of and data related to the energy consumption of common encryption schemes. Providing time-synchronized data of power system operating states, WAMS will play a vital role in next generation smart grid protection and control. WAMS helps efficient energy transmission as well as reliable and optimal grid management. Security algorithms for power grid need to consider both performance and energy efficiency through code optimization techniques on encryption and decryption. In this paper, we take power nodes (sites) as platforms to experimentally study ways of energy consumptions in different security algorithms. First, we measure energy consumptions of various security algorithms on Cross Bow and Ember sensor nodes. Second, we propose an array of novel code optimization methods to increase energy consumption efficiency of different security algorithms. And then, we compare the results of first experiments (AES) and RC4, two energy efficient symmetric key algorithms that are commonly suggested or used in WLANs. Our results show that RC4 is more suitable for large packets and AES for small packets. Finally, based on careful analysis of measurement results.
We exploit transient and permanent error control methods to address Hardware Trojan (HT) issues in Network-on-Chip (NoC) links. The use of hardware-efficient error control methods on NoC links has the potential to red...
详细信息
ISBN:
(纸本)9781479915842
We exploit transient and permanent error control methods to address Hardware Trojan (HT) issues in Network-on-Chip (NoC) links. The use of hardware-efficient error control methods on NoC links has the potential to reduce the overall hardware cost for security protection, with respect to cryptographic-based rerouting algorithms. An error control coding method for transient errors is used to detect the HT-induced link errors. Regarding the faulty links as permanently failed interconnects, we propose to reshuffle the links and isolate the HT-controlled link wires. Rather than rerouting packets via alternative paths, the proposed method resumes the utilization of partially failed links to improve the bandwidth and the average latency of NoCs. Simulation results show that our method improves the average latency by up to 44.7% over the rerouting approach. The reduction on latency varies from 20% to 41% for three traffic patterns on a 5×5 mesh NoC. The impact of different HT locations on NoC links was examined, as well. Our method is not sensitive to HT locations and can improve the effective bandwidth by up to 29 bits per cycle with minor overhead.
暂无评论