Filters








140 Hits in 12.4 sec

Cryptographic Agility and Its Relation to Circular Encryption [chapter]

Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash
2010 Lecture Notes in Computer Science  
On the theoretical side our work uncovers new notions and relations and settles stated open questions, and on the practical side it serves to guide developers.  ...  We explain the practical motivations for agility. We provide foundational results that show to what extent it is achievable and practical constructions to achieve it to the best extent possible.  ...  Acknowledgments The third and fourth authors were supported in part by NSF grants CNS-  ... 
doi:10.1007/978-3-642-13190-5_21 fatcat:lra6qk7gsffypan6jkc3uqn46a

SLIM: A Lightweight Block Cipher for Internet of Health Things

Bassam W. Aboshosha, Rabie A. Ramadan, Ashutosh Dhar Dwivedi, Ayman El-Sayed, Mohamed M. Dessouky
2020 IEEE Access  
ANALYSIS OF THE PROPOSED SLIM ALGORITHM In this section, the characteristics of the SLIM related to its cryptographic strength are illustrated as follow, • Block length: The block length should be long  ...  The future work involves the implantation of Agile on a healthcare IoT framework to analyze it for sensitive applications. FIGURE 2 : 2 SLIM encryption chosen.  ... 
doi:10.1109/access.2020.3036589 fatcat:ac54m6emvfdydkpcndwfd62o4u

Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture

Debabrata Samanta, Ahmed h. Alahmadi, M P Karthikeyan, Mohammad zubair Khan, Amit Banerjee, Goutam Kumar Dalapati, Seeram Ramakrishna
2021 IEEE Access  
In case of images, it resists well against statistical and differential attacks.  ...  The main motivation of this application model is to provide computationally secure key generation to protect the data via encryption.  ...  The file contains the sensitive information can encrypted when it is centralized into the servers or transferred over network to protect it from security related issues.  ... 
doi:10.1109/access.2021.3095297 fatcat:u4s7iclnhfhvzmg5ym7fbejoge

Key dependent message security

Tal Malkin, Isamu Teranishi, Moti Yung
2011 Proceedings of the first ACM conference on Data and application security and privacy - CODASPY '11  
An encryption scheme is Key Dependent Message (KDM) secure if it is secure even against an attacker who has access to encryptions of messages which depend on the secret key.  ...  In this paper we review the definition, and survey recent results and applications of KDM security.  ...  Circular security has two meanings: the original definition in [17] is equivalent to clique security, but it sometimes refers to a weaker security notion (Strictly Circular Security): {Enc(ski, sk i+  ... 
doi:10.1145/1943513.1943516 dblp:conf/codaspy/MalkinTY11 fatcat:rtkk3y3kbvch7hdhcymuezmmqi

PPS-ADS: A Framework for Privacy-Preserved and Secured Distributed System Architecture for Handling Big Data

Mohd Abdul Ahad, Ranjit Biswas
2018 International Journal on Advanced Science, Engineering and Information Technology  
Furthermore, we have incorporated "Twofish" cryptographic technique to encrypt the big data in the ADS.  ...  In order to maintain the consistency of data and to eradicate the possible loss of data, the concept of "forward positive" and "backward positive" acknowledgment is proposed.  ...  of Twofish cryptographic technique in order to encrypt and decrypt the data.  ... 
doi:10.18517/ijaseit.8.4.5465 fatcat:dzharbiwjfhkbdr26cobwviogm

A GALS pipeline DES architecture to increase robustness against DPA and DEMA attacks

Rafael Iankowski Soares, Ney Laert Vilar Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine, Lionel Torres
2010 Proceedings of the 23rd symposium on Integrated circuits and system design - SBCCI '10  
It was partially supported by CNPq (under grants PNM 140044/2008-6 and 309255/2008-2), by the CAPES/COFECUB (French-Brazilian Cooperation) under grant no.  ...  BEX1446/07-0 and by the ANR -ICTER Project (French National Research Agency), the International "Secure Communicating Solutions" Cluster.  ...  It may use a circular FIFO to keep the pipeline stages full, independent of the serial communication rate. It is possible to conduct experiments with or without the FIFO.  ... 
doi:10.1145/1854153.1854183 dblp:conf/sbcci/SoaresCLDMT10 fatcat:uowffpjrs5fnbbeo7gfin74bhe

A Novel Model to Overcome Drawbacks of Present Cloud Storage Models using AES 256 CBC Encryption

Steve Boby George, Sanjay Jaimy, Sebin Jose, Edwin Daji, Agnel Antony
2021 International Journal of Computer Applications  
The purpose of this study is to implement a simple cloud storage model, which can help a user to encrypt files using AES 256 CBC and upload them to the cloud server.  ...  In today's age, encrypting data has proven to be one of the most difficult operations.  ...  The first row is left unchanged, a 1-byte circular shift to the left is performed on the second row, a 2-byte circular shift to the left is performed on the third row, and a 3-byte circular shift to the  ... 
doi:10.5120/ijca2021921481 fatcat:rretirlvajbvvaqrld64dr53lm

Towards Dynamic and Partial Reconfigurable Hardware Architectures for Cryptographic Algorithms on Embedded Devices

Arkan Alkamil, Darshika G. Perera
2020 IEEE Access  
In general, cryptographic algorithms are widely used to ensure the security of IoT related applications [8] .  ...  Secondly, the reconfigurable cryptographic module performs the encryption process on the read input data (i.e., the plaintext) VOLUME XX, 2017 9 and transforms it to the ciphertext (i.e., the write output  ... 
doi:10.1109/access.2020.3043750 fatcat:loyavgqwzrffflknefneimyrzi

BRISK: Dynamic Encryption Based Cipher for Long Term Security

Ashutosh Dhar Dwivedi
2021 Sensors  
Knudsen initially proposed dynamic encryption in 2015, where the sender picks a cipher from a large pool of ciphers to encrypt the data and send it along with the encrypted message.  ...  The majority of standard cryptographic algorithms do not fit with these constrained devices due to heavy cryptographic components.  ...  Cryptology The more general term cryptology is related to encrypting information with the help of encryption algorithms and also analysing these algorithms in terms of security margin.  ... 
doi:10.3390/s21175744 pmid:34502635 fatcat:suobfqpiibh2hew7rwvdwe7amy

The New Block Cipher Design (Tigris Cipher)

Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohsen J. Abdul Hossen
2015 International Journal of Computer Network and Information Security  
It operates with block size of 128-bits and with three variable key lengths of 128-bits, 192-bits and 256bits in addition to sixteen rounds or multiples of four rounds.  ...  It has been designed with a good coherent structure that is based on solid algebraic and well mathematical opinions.  ...  ACKNOWLEDGMENT The authors would like to extend special thanks to Dr. Hazim H. Muarich for his great contribution in editing and proof reading this paper from a linguistic point of view.  ... 
doi:10.5815/ijcnis.2015.12.02 fatcat:lpkrfkc65zh5nokghtsvuw4o2e

A new countermeasure against side-channel attacks based on hardware-software co-design

Ruben Lumbiarres-Lopez, Mariano Lopez-Garcia, Enrique Canto-Navarro
2016 Microprocessors and microsystems  
The hardware architecture consists of a microprocessor, which executes the algorithm using a false key, and a coprocessor that performs several operations that are necessary to retrieve the original text  ...  that was encrypted with the real key.  ...  [1] , in the late 1990s, demonstrated the vulnerabilities of cryptographic devices, Side Channel Analysis (SCA) attacks have become the most significant threat related to the security of cryptographic  ... 
doi:10.1016/j.micpro.2016.06.009 fatcat:4hmxm3uxyfhyvbinq4w4vytkvi

LATe: A Lightweight Authenticated Time Synchronization Protocol for IoT

Renzo E. Navas, Laurent Toutain
2018 2018 Global Internet of Things Summit (GIoTS)  
Having a secure source of time is a fundamental problem, and the first step to provide other services for applications.  ...  Our proposal is based on IETF open standards and is agnostic to underlying communication technologies. We also provide a computer-aided proof of the security claims using the Scyther tool.  ...  ACKNOWLEDGMENT The authors would like to thank Göran Selander and Ludwig Seitz for its contributions on the design of the LATe protocol and his efforts on the IETF community.  ... 
doi:10.1109/giots.2018.8534565 dblp:conf/giots/NavasT18 fatcat:b5c7cy55f5fwbot3fid54mudyu

Enhanced Elliptic Curve Cryptography based Secure Transmission in LTE Network

2020 International Journal of Engineering and Advanced Technology  
It is notable that elliptic bend cryptosystem (ECC) based algorithm would be best decision because of their small key sizes and proficient calculations.  ...  Be that as it may, the correspondence must be secured. To accomplish this necessity, in this research OPSO based Elliptic Curve Cryptography (EECC) is exhibited.  ...  Elliptic curve cryptography is a public key encryption process based on the hypothesis of elliptic curve, which is used to generate cryptographic keys that are more efficient, agile, and progressively  ... 
doi:10.35940/ijeat.c5171.029320 fatcat:t2ycxjx3dfhofewtsihz6qitn4

Security Challenges in the IP-based Internet of Things

Tobias Heer, Oscar Garcia-Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, Klaus Wehrle
2011 Wireless personal communications  
Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed.  ...  A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thingto-thing communication in embedded networks.  ...  Moreover, all protocols have been revised in the last years to enable crypto agility, making cryptographic primitives interchangeable.  ... 
doi:10.1007/s11277-011-0385-5 fatcat:qgq2ahp7qbhgnb43mlayxgnjty

New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher

Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen
2017 International Journal of Computer Network and Information Security  
It uses a compact algorithm for encryption and decryption processes, which consists of four main stages that roughly similar in its work to the Advance Encryption Standard (AES) stages.  ...  These four stages designed to reduce the hardware requirements and to produces high efficiency, which keeps the encryption and decryption process at the same speed in the hardware devices and eliminates  ...  ACKNOWLEDGMENT The authors would like to apply special thanks and grateful to those kind people in Computer Science Department-University of Technology for their support and help.  ... 
doi:10.5815/ijcnis.2017.04.04 fatcat:37voddxpwbh65dnwb6koo32kju
« Previous Showing results 1 — 15 out of 140 results