The natural redundancy in video data due to its spatio-temporal correlation of neighbouring pixels require highly complex encryption process to successfully cipher the data. Conventional encryption methods are based o...
详细信息
ISBN:
(纸本)9781538682494
The natural redundancy in video data due to its spatio-temporal correlation of neighbouring pixels require highly complex encryption process to successfully cipher the data. Conventional encryption methods are based on lengthy keys and higher number of rounds which are inefficient for low powered, small battery operated devices. Motivated by the success of lightweight encryption methods specially designed for IoT environment, herein an efficient method for video encryption is proposed. The proposed technique is based on a recently proposed encryption algorithm named Secure IoT (SIT), which utilizes P and Q functions of the KHAZAD cipher to achieve high encryption at low computation cost. Extensive simulations are performed to evaluate the efficacy of the proposed method and results are compared with Secure Force (SF-64) cipher. Under all conditions the proposed method achieved significantly improved results.
To achieve 3D grid models which have a non-uniform size and varying properties, we proposed the algorithm of grid subdivision and encryption by human-computer interaction. This algorithm was the technology based on 3D...
详细信息
ISBN:
(纸本)9783037857519
To achieve 3D grid models which have a non-uniform size and varying properties, we proposed the algorithm of grid subdivision and encryption by human-computer interaction. This algorithm was the technology based on 3D geological modeling, and achieving process has following three steps. Firstly, we converted many 2D cross sections to 3D space, and reconstructed 3D vector models using the algorithm of optimal path suture, and set the property of abnormal body and surrounding rock. Then, achieving 3D grids subdivided according to the relationship between the center of 3D grid and 3D vector models, the properties of 3D grids were determined. Finally, we encrypted grids in the survey area and expansion area, and modified the properties. The results show that the algorithm can realize the conversion from 3D vector models to 3D grid models, and this process is reliable and efficient.
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is logic enc...
详细信息
ISBN:
(纸本)9781467374200
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is logic encryption. Logic encryption modifies an IC design such that it operates correctly only when a set of newly introduced inputs, called key inputs, are set to the correct values. In this paper, we use algorithms based on satisfiability checking (SAT) to investigate the security of logic encryption. We present a SAT-based algorithm which allows an attacker to "decrypt" an encrypted netlist using a small number of carefully-selected input patterns and their corresponding output observations. We also present a "partial-break" algorithm that can reveal some of the key inputs even when the attack is not fully successful. We conduct a thorough evaluation of our attack by examining six proposals for logic encryption from the literature. We find that all of these are vulnerable to our attack. Among the 441 encrypted circuits we examined, we were able to decrypt 418 (95%). We discuss the strengths and limitations of our attack and suggest directions that may lead to improved logic encryption algorithms.
With the development of the Internet of Things, the Wireless Senor Network has been paid increasing attention. It can not only perceive the physical world, collect and transmit information, but also brings new problem...
详细信息
ISBN:
(纸本)9788132225805;9788132225799
With the development of the Internet of Things, the Wireless Senor Network has been paid increasing attention. It can not only perceive the physical world, collect and transmit information, but also brings new problems in the security of information. As the nodes of Wireless Sensor Network are limited by hardware resources and energy, how to select fast and energy-saving encryption algorithms in terms of Wireless Sensor Network is very important. This paper constructs a test framework for comparing the energy consumption, time efficiency, and space efficiency and then tests parameters of multiple algorithms in the same application environment. The results provide a basis for choosing suitable algorithms for the Wireless Sensor Network.
In the design of the proposed ETC scheme, all three major intelligent systems, such as AVC, AVI, and AVE have been included, where in each case some advanced technological features have been introduced. Moreover, incl...
详细信息
ISBN:
(纸本)9783037851555
In the design of the proposed ETC scheme, all three major intelligent systems, such as AVC, AVI, and AVE have been included, where in each case some advanced technological features have been introduced. Moreover, inclusion of two stage security protocols with a robust encryption algorithm for data communication and the SMS based notification make the proposed system unique among all other existing methods. A prototype has been developed based on the proposed design and found to meet the desired performance specifications.
Two algorithms are presented that use the properties of twisted light to construct symmetric encryption schemes. Their possible physical realization is discussed.
ISBN:
(数字)9781510620049
ISBN:
(纸本)9781510620049
Two algorithms are presented that use the properties of twisted light to construct symmetric encryption schemes. Their possible physical realization is discussed.
Several security mechanisms have been introduced to address the need for reliable and efficient security schemes in resource limited Wireless Sensor Networks (WSNs). Limitations in processing speed, battery power, ban...
详细信息
ISBN:
(纸本)9781479933518
Several security mechanisms have been introduced to address the need for reliable and efficient security schemes in resource limited Wireless Sensor Networks (WSNs). Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptographic algorithms in WSNs. Accordingly, it is necessary to assess the performance tradeoffs of the cryptographic algorithms to provide a better understanding of the security cost. In this paper, we have studied three block cipher algorithms: Advanced encryption Standard (AES), RC5, and RC6. We have measured and compared their memory and energy consumption in the Mica2 sensor motes. Experimentation results show that AES has higher memory and energy requirements than RC5 and RC6. RC6 has higher operation time and power consumption while RC5 is the most time-and energy-efficient block cipher and thus the best cipher solution for devices with limited resources.
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man...
详细信息
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man-in-The-Middle (MITM) attack is one of the threats that could impact medical organizations. It happens when unapproved outsiders break into the traffic between two parties that think they are conversing directly. At the same time, the adversary can access, read, and change secret information. Because of that, medical organizations lose confidentiality, integrity, and availability. Data encryption is a solution that changes vital information to unreadable by unauthorized and unintended parties. It could involve protecting data with cryptography, usually by leveraging a scrambled code. Only the individuals with the decoding key can read the information. There is no full protection due to the variety of MITM attacks. Each encryption algorithm has its advantages and disadvantages, like the speed of encryption and decryption, strength of the algorithm, and the cipher type. This research investigates the MITM attacks and comprehensively compares the Rivest Shamir Adleman algorithm and the Elliptic Curve Cryptography algorithm.
The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most efficient ciphers...
详细信息
In this paper, an improved multi-dimensional hyperchaotic system derived from the logistic map and the ICMIC based on closed-loop coupling (LICC hyperchaotic system) is proposed and it is used in the design of selecti...
详细信息
In this paper, an improved multi-dimensional hyperchaotic system derived from the logistic map and the ICMIC based on closed-loop coupling (LICC hyperchaotic system) is proposed and it is used in the design of selective image encryption. The performance analysis shows that the LICC hyperchaotic system with a strong coupling degree has parameters whose value can be set more flexibly and can generate a wider and more uniform distribution of chaotic sequences. Then selective image encryption is proposed. Firstly, an adaptive pseudo-random sequence generator based on hash function is designed to ensure the difference of sequences used in different encryption steps. Second, a novel bit-level scrambling is designed to increase the encryption speed. Finally, an efficient rule to select image blocks with weak security is proposed and the second step of the encryption is performed at the selected blocks of the image to ensure security. The encryption performance and security analysis show that the proposed encryption algorithm based on an improved hyperchaotic system is secure enough to resist several types of attacks.
暂无评论