Electric power information system is related with the safe operation of power grid. To ensure the data of electric power information will not be eavesdropped or deciphered, we need a strict way of encryption. With the...
详细信息
ISBN:
(纸本)9788996865094
Electric power information system is related with the safe operation of power grid. To ensure the data of electric power information will not be eavesdropped or deciphered, we need a strict way of encryption. With the improvement of computing capacity, traditional encryption algorithms are at high risk of crack. Quantum communication technology is an absolute security encryption mode, which can significantly improve the safety of electric power information system. For the particularity of electric power production and management data by analysing the principle of quantum communication technology, we have put forward implementation plan of electric power information system data encryption scheme and quantum communication network.
This paper presents an overview of cyber maneuvers and their roles in cyber security. As the cyber war escalates, a strategy that preemptively limits and curtails attacks is required. Such a proactive strategy is call...
详细信息
ISBN:
(纸本)9781479967704
This paper presents an overview of cyber maneuvers and their roles in cyber security. As the cyber war escalates, a strategy that preemptively limits and curtails attacks is required. Such a proactive strategy is called a cyber maneuver and is a refinement of the concept of a moving-target defense, which includes both reactive and proactive network changes. The major advantages of cyber maneuvers relative to other moving-target defenses are described. The use of maneuver keys in making cyber maneuvers much more feasible and affordable is explained. As specific examples, the applications of maneuver keys in encryption algorithms and as spread-spectrum keys are described. The integration of cyber maneuvers into a complete cyber security system with intrusion detection, identification of compromised nodes, and secure rekeying is presented. An example of secure rekeying despite the presence of compromised nodes is described.
Digital Rights Management (DRM) systems try to protect copyrights and digital contents by limiting access by users to contents. They provide facilities for electronic publishers to distribute their precious contents t...
详细信息
ISBN:
(纸本)9781424414895
Digital Rights Management (DRM) systems try to protect copyrights and digital contents by limiting access by users to contents. They provide facilities for electronic publishers to distribute their precious contents to prevent any illegal distribution and usage. Existing DRM systems fall short in protecting data ownerships in its life cycle (creation, distribution and updates), providing DRM systems for current software and systems, data/license distribution and hassles for users. This paper proposes a new system for management of digital rights. It supports the enforcement of a wide range of limitations on accessing protected files and advanced digital right management system to protect ownerships while new files are created from protected files. The main novelty of the proposed DRM system lies in using a self local license management system instead of license/content distribution servers, so that users are able to access protected contents offline. This system also enables us to implement DRM systems for current software and data types without need to make any changes in their codes and structures. An implementation based on this system has been developed for and applied to Adobe Acrobat Reader (as the sample target software) and PDF files (as the sample data type). Our evaluations demonstrated that, unlike current DRM architectures and implementations, SLDRM satisfies owner rights as well as user rights by license server independency, data output authorization, data lifecycle protection, machine dependency, virtual machine detection, ability to apply DRM without changes in target software codes and data type/structures.
This paper is aimed at constructing RFID-based food safety supervision system, conducting hardware construction and RFID carrier design, building RFID middleware model, and putting forward RFID information encryption ...
详细信息
ISBN:
(纸本)9783037859469
This paper is aimed at constructing RFID-based food safety supervision system, conducting hardware construction and RFID carrier design, building RFID middleware model, and putting forward RFID information encryption algorithm, to ensure that this system can realize collection, transmission, processing, and security management of food information, achieve scientific and transparent management of food, and improve the food safety supervision mechanism in China.
In November 2001, the National Institute of Standards and Technology (NIST) of the United States chose the Rijndael algorithm as the suitable Advanced encryption Standard (AES) to replace the Data encryption Standard ...
详细信息
ISBN:
(纸本)0780388348
In November 2001, the National Institute of Standards and Technology (NIST) of the United States chose the Rijndael algorithm as the suitable Advanced encryption Standard (AES) to replace the Data encryption Standard (DES) algorithm. Since then, many hardware implementations have been proposed in literature. We present a hardware-efficient design increasing throughput for the AES algorithm using a high-speed parallel pipelined architecture. By using an efficient inter-round and intra-round pipeline design, our implementation achieves a high throughput of 29.77 Gb/s in encryption whereas the highest throughput reported in literature is 21.54 Gb/s.
Wireless Sensor Network (WSN) is a system used to conduct a remote monitoring in a wide monitoring area. It has a sensor node - a sampling point - which communicate each other to passing their data to central node for...
详细信息
ISBN:
(纸本)9781509034772
Wireless Sensor Network (WSN) is a system used to conduct a remote monitoring in a wide monitoring area. It has a sensor node - a sampling point - which communicate each other to passing their data to central node for recapitulation or transmit it to data center. Because of that, communication system is a crucial thing for WSN. However, WSN may be deployed in a environment that far from ideal condition. Placed in an unattended area with far distance between nodes, WSN is very vulnerable with security threats. To overcome that, the good combination between communication protocol and encryption algorithm for WSN is needed to gather an accurate and representative data with high transmission speed. This research focused on finding those combination for our own-made low-cost sensor node for CO2 monitoring. In this research, two routing protocols (AODV and TARP) and several encryption algorithms (AES, ChaCha, and Speck) tested to determine which combination is give the best result. As the result, combination between routing protocol AODV and encryption algorithm Speck give the best result in the term of performance.
Recently, following the work pioneered by Kocher [1], using cache behavior as a timing side-channel to leak critical system information has received lots of attentions because of its easy-to-implement nature and amazi...
详细信息
ISBN:
(纸本)9781467371667
Recently, following the work pioneered by Kocher [1], using cache behavior as a timing side-channel to leak critical system information has received lots of attentions because of its easy-to-implement nature and amazingly good results. Recent attacks have been demonstrated to successfully leak the full key from many commonly used encryption algorithms including RSA, AES, etc. These attacks pose great threats to applications that depend on these encryption methods such as banking systems, military systems, etc. To mitigate the increasing threat, numerous countermeasures, mostly software patches, have been proposed. Hardware mitigations, however, have been less pursued. In this paper, we show that emerging 3D integration technology offers new opportunities in defense against these attacks. We propose two cache design mechanisms that can make the attacker's job harder, even impossible. Experimental results show that using our cache design, the side-channel leakage is significantly reduced while still achieving performance gains over a conventional 2D system.
Recent advances in encrypted outsourced databases support the direct processing of queries on encrypted data. Depending on functionality (i.e. operators) required in the queries the database has to use different encry...
详细信息
ISBN:
(纸本)9781450329392
Recent advances in encrypted outsourced databases support the direct processing of queries on encrypted data. Depending on functionality (i.e. operators) required in the queries the database has to use different encryption schemes with different security properties. Next to these functional requirements a security administrator may have to address security policies that may equally determine the used encryption schemes. We present an algorithm and tool set that determines an optimal balance between security and functionality as well as helps to identify and resolve possible conflicts. We test our solution on a database benchmark and business-driven security policies.
A stream cipher is an important class of encryption algorithms. Its safety depends on the structure of the pseudo-random number generator used. There are various types of pseudo-random number generators in existence, ...
详细信息
ISBN:
(纸本)9784885522673
A stream cipher is an important class of encryption algorithms. Its safety depends on the structure of the pseudo-random number generator used. There are various types of pseudo-random number generators in existence, and attack algorithms used on them have been studied individually. In this paper, we express the problem of attacks on a general stream cipher as a probabilistic inference problem, and formulate the optimal key estimation. We also propose a unified framework of attack algorithms that can be applied to a wide variety of stream ciphers. The optimal key estimation, however, has computational complexity. To reduce the complexity, an approximation algorithm based on a probabilistic inference is proposed. We also describe some attack algorithms used on practical pseudo-random number generators. Finally, the proposed algorithm is evaluated by through a computer simulation.
In order to improve the efficiency of the existing homomorphic encryption method, based on the DGHV scheme, an improved fully homomorphic scheme over the integer is proposed. Under the premise of ensuring data owner a...
详细信息
ISBN:
(纸本)9781450353526
In order to improve the efficiency of the existing homomorphic encryption method, based on the DGHV scheme, an improved fully homomorphic scheme over the integer is proposed. Under the premise of ensuring data owner and user data security, the scheme supports the addition and multiplication operations of ciphertext, and ensures faster execution efficiency and meets the security requirements of cloud computing. Security analysis shows that our scheme is safe. Performance assessment demonstrates that our scheme can more efficiently implement data than DGHV scheme.
暂无评论