Conduct and sponsor research to provide information assurance for national security systems. Enabling safe operation in risky or compromised environments. Research into cryptographic algorithms and protocols, system a...
详细信息
Conduct and sponsor research to provide information assurance for national security systems. Enabling safe operation in risky or compromised environments. Research into cryptographic algorithms and protocols, system analysis and design methods, trust mechanisms, and systems behavior. Creators of SE Linux, Xen Security Modules, Linux Kernel Integrity Monitor, and SE Android.
The gyrator transform has been proposed in optics a few years ago. By using the theory of quaternion numbers, this paper presents the quaternion gyrator transform (QGT). It is shown that the QGT can be computed via th...
详细信息
ISBN:
(纸本)9781479923427
The gyrator transform has been proposed in optics a few years ago. By using the theory of quaternion numbers, this paper presents the quaternion gyrator transform (QGT). It is shown that the QGT can be computed via the left-side type of quaternion Fourier transforms. The new transform is applied to color image encryption for validation, where the rotation angles are used as encryption keys making it more secure compared to a recent method using discrete quaternion Fourier transforms (DQFTs). Experimental results show that the proposed encryption algorithm for color image performs as well as the DQFTs method in terms of noise robustness, so that it could be a useful tool for color image encryption.
The cloud is an emerging field in the IT. It is a way of delivering IT-enabled services in the form of software, platform and infrastructure. Cloud computing in recent times has become a trend among all walks of life ...
详细信息
ISBN:
(纸本)9781467362429
The cloud is an emerging field in the IT. It is a way of delivering IT-enabled services in the form of software, platform and infrastructure. Cloud computing in recent times has become a trend among all walks of life to store and retrieve data from anywhere around the globe. With the rising cost for the data storage devices and data retrieval process;enterprises have moved to centralized storage for cost efficiency. This proves a greater task to the service providers in terms of security and consistency. As shared systems are prone to be attacked, various counter measures have been proposed by experts to secure the stored data. Here the data is being encrypted by the advanced encryption algorithm which is considered to be the most competent in the present security scenario. A symmetric key is generated to the stored file. To further enhance the trust of the service provider the trust certificate of the company is being sent along with the keys to the client. All the communication process is taken place using the Key Exchange protocol. These techniques are performed to ensure the client that the stored data is being secured, integrated and a total control over the route in which the data is being communicated. In this paper, a new efficient technique is proposed which indicates the effectiveness, flexibility of the storage and retrieval process by a generic framework. This framework fills the gap between the security needs and challenges.
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PR...
详细信息
ISBN:
(纸本)9781467325271
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PRESENT encryption algorithm. To minimize power consumption, subthreshold CMOS logic is adopted. To implement robust combinational logic (S-Boxes) in PRESENT at subthreshold, a multiplexor-tree architecture based on CMOS transmission gates is proposed. Our post-layout simulations show that our PRESENT core consumes around 50 nW at 0.35V supply voltage at 25 kHz clock frequency, proving the feasibility of ultra-low power encryption.
Adoption of the Advanced encryption Standard (AES) as a symmetric encryption algorithm for numerous applications requires a low cost and low power design. Presented is a new 8-bit stream cipher architecture core for a...
详细信息
Adoption of the Advanced encryption Standard (AES) as a symmetric encryption algorithm for numerous applications requires a low cost and low power design. Presented is a new 8-bit stream cipher architecture core for an application specific integrated circuit AES crypto-processor. The chip area and power are optimised along with high throughput. It is implemented in a 130nm CMOS process and supports both encryption and decryption using 128-bit keys with a throughput of 0.05 Gbit/s (at 100 MHz clock). This design utilises 3152 gate equivalents including an on-the-fly key scheduling unit along with 4.23 mu W/MHz power consumption. Compared to other 8-bit implementations, the proposed design achieves a smaller chip size along with higher throughput and lower power dissipation.
With the research and discussion about different kinds of methods generating random number by computer and encryption algorithm, REA is raised from a practical standpoint. REA can make key sequence closer to true rand...
详细信息
ISBN:
(纸本)9781424442270
With the research and discussion about different kinds of methods generating random number by computer and encryption algorithm, REA is raised from a practical standpoint. REA can make key sequence closer to true random sequence, thus it ensures data security. Experiments show that the algorithm has many characteristics: understanding easily, practicality, encrypting faster, increasing the difficulty of deciphering and less spending of the system.
Message-Digest algorithm 5, a hash function which is widely used in the field of computer security, can provide the message integrity protection. But to the field following certain rules, for example, by date of birth...
详细信息
ISBN:
(数字)9783642340383
ISBN:
(纸本)9783642340376
Message-Digest algorithm 5, a hash function which is widely used in the field of computer security, can provide the message integrity protection. But to the field following certain rules, for example, by date of birth as a password, using the MD5 encryption algorithm, can still quickly decipher by MD5 decoding procedures of list form. In view of this situation, on the basis of MD5, putting forward a improved algorithm which has greatly security in data safety, and the improved algorithm is applied to the online shopping system based on ajax framework, for digital signature function of users on the system provides powerful safety security.
The paper presents a novel chaotic encryption algorithm which can be used to improve the communication security. An uncomplicated process of chaotic substitution permutation network (SPN) with variable control paramet...
详细信息
ISBN:
(纸本)9781467353250;9781908320087
The paper presents a novel chaotic encryption algorithm which can be used to improve the communication security. An uncomplicated process of chaotic substitution permutation network (SPN) with variable control parameters is proposed to form a robust chaotic cryptosystem. A new chaotic generator, firstly proposed by Lozi, is used for this purpose. For the new cryptosystem, the results of the statistical NIST tests for pseudo-randomness showed to be successful. The system performances are significantly improved after a chaotic under-sampling of the output signal.
In general, all kinds of aircrafts have the flight data storage systems such as DTS, Black-box and etc. Data to be stored in such equipment contains very important information that is related to the flight performance...
详细信息
ISBN:
(纸本)9781467317009
In general, all kinds of aircrafts have the flight data storage systems such as DTS, Black-box and etc. Data to be stored in such equipment contains very important information that is related to the flight performance and security. For effective storing of the critical information that is included in the flight data, the compression or encryption is essentially required. In present, the flight data is stored without compression unlike voice data, but the compression and secure processing are needed to the efficient storing and the security of flight data in case of the fighter. In this paper, we propose a real-time data storage system that is composed of the compression of the flight and voice data based on DPCM, the encryption of the compressed data using AES encryption algorithm and the re-arrangement of the encrypted data by shuffling technique. The proposed system is implemented in hardware using Verilog HDL and we tested the performance of the system with the simulation flight and voice data. As a result, we found that the proposed system compress the data efficiently and enhances security characteristics.
We present a method and tool for examining an FPGA-based circuit, in particular an implementation of a cryptographic algorithm, subjected to a fault injection attack based on clock glitching. The proposed approach off...
详细信息
ISBN:
(纸本)9781467311854
We present a method and tool for examining an FPGA-based circuit, in particular an implementation of a cryptographic algorithm, subjected to a fault injection attack based on clock glitching. The proposed approach offers some unique features that allow us to thoroughly analyse the impact of injected faults on the operation of the circuit. In particular, through precise adjustment of the frequency of an external clock generator, the number of faults occurring at the output of the circuit under test can be observed and controlled. The effectiveness of the proposed approach has been assessed for the AES implementation, leading to a number of practical guidelines that may be essential when planning experimental studies on fault injection in FPGA-based circuits.
暂无评论