encryption algorithms are widely used to enhance the data confidentiality and integrity in software systems. Most of the conventional encryption algorithms are designed based on mathematical methods. Sometimes there a...
详细信息
ISBN:
(纸本)9781509035397
encryption algorithms are widely used to enhance the data confidentiality and integrity in software systems. Most of the conventional encryption algorithms are designed based on mathematical methods. Sometimes there are traces left behind, which can be possibly detected and utilised by attackers. Based on the ideas of knowledge combination derived from Creative Computing, in order to provide a safer user experience, this paper attempts to introduce a creative encryption approach based on Pataphysics. Pataphysics is widely known as the science of imaginary solutions and laws, governing exceptions. One of the most important advantages of Pataphysics is the novel or innovative methods to understand and explore the surrounding world. It is believed that based on the key concepts provided by Pataphysics, Clinamen, something new might be discovered for traditional encryption design. The creative approach aims to utilise the ambiguity in language to enhance the confidentiality of encryption algorithms. We hope the proposed approach could provide a promising direction for software and information security.
One of the major sources of information in recent times is the internet, which facilitates the exchange of information between thousands of people at any instant. The transmission of sensitive data such as passwords m...
详细信息
ISBN:
(纸本)9781467397810
One of the major sources of information in recent times is the internet, which facilitates the exchange of information between thousands of people at any instant. The transmission of sensitive data such as passwords must be accompanied by some form of robust protection to ensure prevention of unauthorized access. The requirement of strong encryption algorithms is of utmost importance. In this paper we present the Verilog description and hardware implementation on Altera DE2115 board of password encryption using Blake 256 cryptographic hash function coupled and parallel CRC for high performance, transmission error control.
A smart grid is a modernized electrical grid that uses distribution networks to deliver electricity. It aims to gather and act on information, such as information about the behaviors of grid entities, in an automated ...
详细信息
ISBN:
(纸本)9781479999644
A smart grid is a modernized electrical grid that uses distribution networks to deliver electricity. It aims to gather and act on information, such as information about the behaviors of grid entities, in an automated fashion to improve the efficiency, security and reliability. It is important that the sensitive information should be shared securely among the grid entities. In smart grid, smart devices (e.g., smart meters) usually have limited computational capability. In this paper, we propose an online/offline attribute based encryption (ABE) scheme based ***'s ABE scheme with hidden policy. In our scheme, the advantages of ***'s scheme are kept. Thus, the data privacy and policy privacy are all preserved well. The computational overhead of encryptors are reduced by splitting the computation for encryption algorithm into two phases: online/offline. Most of the laborious decryption operations are delegated to the offline phase. The online phase can then rapidly assemble an ABE ciphertext when the message and the attribute control policy become known.
In this paper we present an encryption module included in the Subsidiary Communication Channel (SCC) System we are developing for video-on-FM radio broadcasting. This module is aimed to encrypt by symmetric key the vi...
详细信息
ISBN:
(纸本)0819444898
In this paper we present an encryption module included in the Subsidiary Communication Channel (SCC) System we are developing for video-on-FM radio broadcasting. This module is aimed to encrypt by symmetric key the video image archive and real-time database of the broadcaster, and by asymmetric key the video broadcasting to final users. The module includes our proprietary Techniteia encryption Library (TEL), that is already successfully running and securing several e-commerce portals in Europe. TEL is written in C-ANSI language for its easy exportation onto all main platforms and it is optimized for real-time applications. It is based on the blowfish encryption algorithm and it is characterized by a physically separated sub-module for the automatic generation/recovering of the variable sub-keys of the blowfish algorithm. In this way, different parts of the database are encrypted by different keys, both in space and in time, for granting an optimal security.
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PR...
详细信息
ISBN:
(纸本)9781467325271
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PRESENT encryption algorithm. To minimize power consumption, subthreshold CMOS logic is adopted. To implement robust combinational logic (S-Boxes) in PRESENT at subthreshold, a multiplexor-tree architecture based on CMOS transmission gates is proposed. Our post-layout simulations show that our PRESENT core consumes around 50 nW at 0.35V supply voltage at 25 kHz clock frequency, proving the feasibility of ultra-low power encryption.
When cryptographic products chat employ different key recovery mechanisms need to interoperate with one another, one of che major obstacles is the inability of the decryptor product to recognize, and optionally valida...
详细信息
When cryptographic products chat employ different key recovery mechanisms need to interoperate with one another, one of che major obstacles is the inability of the decryptor product to recognize, and optionally validate, the key recovery information generated by the encryptor product. In this paper, a common Key Recovery Block (KRB) format is being proposed to facilitate interoperability between heterogeneous key recovery systems. The KRB serves as a container for mechanism-specific key recovery information, and supports techniques to identify and optionally validate the contained key recovery information. This specification provides an extensible set of KRB validation techniques - however, it makes no attempt to set a preference for one technique over the others. The choice of validation technique(s) used is determined by the policies (with respect to the use of cryptography and key recovery) that apply to the encryptor and decryptor produces. It may be noted chat the KRB format specification is independent of the encryption algorithm used to protect the confidentiality of the data, and independent of the communication or storage protocol used co carry the encrypted data. It should also be recognized that the KRB format proposed in this payer is of limited scope. It assumes that the key recovery information can be made available to interested parties along with the encrypted data. There are a number of open issues regarding the techniques that allow key recovery information to be associated with encrypted data (whether the key recovery information and the encrypted data are transmitted over the same channel or separate channels) - these issues are beyond the scope of this proposal.
A generic, parameterisable key scheduling core is presented, which can be utilised in pipelinable private-key encryption algorithms. The data encryption standard (DES) algorithm, which lends itself readily to pipelini...
详细信息
A generic, parameterisable key scheduling core is presented, which can be utilised in pipelinable private-key encryption algorithms. The data encryption standard (DES) algorithm, which lends itself readily to pipelining, is utilised to exemplify this novel key scheduling method and the broader applicability of the method to other encryption algorithms is illustrated. The DES design is implemented on Xilinx Virtex FPGA technology. Utilising the novel method, a 16-stage pipelined DES design is achieved, which can run at an encryption rate of 3.87 Gbit/s. This result is among the fastest hardware implementations and is a factor 28 times faster than software implementations.
The soft set theory offers a wide range of applications in a variety of domains. The soft set is more general and has more capabilities in controlling unpredictable data than other current apparatuses, such as fuzzy s...
详细信息
The soft set theory offers a wide range of applications in a variety of domains. The soft set is more general and has more capabilities in controlling unpredictable data than other current apparatuses, such as fuzzy set theory. On the other hand, at whatever point we come over the term cryptography, the primary thing and probably the only thing that comes to our intellect could be private communication. This paper's important reason is to present a new cryptosystem in which both the key and the plaintext are of a soft set environment. We have proposed the definitions of the soft cryptosystem. At that point, we introduced symmetric and asymmetric cryptosystem in a soft set environment. We have created two new theorems. Utilizing this concept, we have arranged two algorithms to encrypt the plaintext and decrypt the ciphertext. Besides, a numerical illustration to solve a banking problem with our proposed cryptosystem has been displayed.
We discuss recent developments in the area of conventional cryptographic primitives: encryption algorithms (block ciphers and stream ciphers),MAC algorithms, and hash functions. The security level and software perform...
详细信息
We discuss recent developments in the area of conventional cryptographic primitives: encryption algorithms (block ciphers and stream ciphers),MAC algorithms, and hash functions. The security level and software performance of these primitives is compared. A summary is given of the status of the development of the AES (Advanced encryption Standard), which will replace DES in the near future.
encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and ba...
详细信息
encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and bandwidth-constrained channel, it is customary to compress the data first and then encrypt it. In this paper, a novel algorithm, the new compression with encryption and compression (CEC), is proposed to secure and compress the data. This algorithm compresses the data to reduce its length. The compressed data is encrypted and then further compressed using a new encryption algorithm without compromising the compression efficiency and the information security. This CEC algorithm provides a higher compression ratio and enhanced data security. The CEC provides more confidentiality and authentication between two communication systems.
暂无评论