Filters








11 Hits in 5.3 sec

Rijndael for Sensor Networks: Is Speed the Main Issue?

Andrea Vitaletti, Gianni Palombizio
2007 Electronical Notes in Theoretical Computer Science  
For this reason, in our opinion the main focus on the implementation of encryption algorithms for wireless sensor networks should move from speed, to memory occupation and energy efficiency.  ...  Furthermore, we observe that nowadays MAC and routing protocols for wireless sensor networks, exhibit latencies up to few seconds, and thus the few milliseconds required by Rijndael to encrypt a TinyOS  ...  For this reason we used Cipher Text Stealing (CTS) mode of operation. The CTS mode behaves like the CBC mode for all, but it produces ciphertext whose length matches the plaintext length.  ... 
doi:10.1016/j.entcs.2006.11.010 fatcat:zwhnjyttzzeqraklmiydvdyste

Delay aware, reconfigurable security for embedded systems

Tammara Massey, Philip Brisk, Foad Dabiri, Majid Sarrafzadeh
2007 Proceedings of the Second International Conference on Body Area Networks BodyNets  
Coupled with the security costs in system performance and power consumption, embedded systems are also restricted by the type of security that can fit in their limited memory.  ...  A delayaware heuristic based on throughput and encryption decides when the level of security should be changed under various timing constraints.  ...  The CBC algorithm uses Cipher Text Stealing (CTS) as described in Schneir's Applied Cryptography and RFC-2040 [26] .  ... 
doi:10.4108/bodynets.2007.172 dblp:conf/bodynets/MasseyBDS07 fatcat:gb5xqn4kifg6xnqlappz2mxqmq

Statistical Analysis of One Time Pad Encryption Using Variable Chaotic Key for Medical Data Transmission & Storage

Mohammadreza Naeemabadi, Alireza Dehnavi, Hossein Rabbanni, Kambiz Bahaadinbeigy, Hassan Khajehpour
2015 unpublished
Currently there are several algorithms that function as data encryption methods. These algorithms often use a predetermined constant key of minimum 128 bits long.  ...  Quasiperiodic characteristics of medical data and same encryption keys lead to periodic behavior of the encrypted data, which undermines the security.  ...  The proposed algorithm is faster, less noise sensitive and also better keeps the data pattern hidden in comparison to Rijndael method.  ... 
fatcat:5aucaugzlbcolhqnz5k6pbktjy

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The user thereof uses the information at its sole risk and liability. References  ...  Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  RC4, RC5, Skipjack, IDEA, AES) was evaluated, concluding that the most effective algorithms such as RC4 and Skipjack have an overhead (energy, bandwidth, latency, and memory consumption) less than 10%.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
Out with pilots, in with pibots in our national airspace (R 21 96), and flocking algorithms (R 22 01) Rail, Bus, and Other Public Transit !  ...  the happy99.exe infection; Virus Scan misses it (R 20 40) Sfff Discussion by Bruce Schneier on Why Computers are Not Secure (S 25 2:18, R 20 67,69) Srf DVD CSS encryption algorithm cracked with  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
Out with pilots, in with pibots in our national airspace (R 21 96), and flocking algorithms (R 22 01) Rail, Bus, and Other Public Transit !  ...  the happy99.exe infection; Virus Scan misses it (R 20 40) Sfff Discussion by Bruce Schneier on Why Computers are Not Secure (S 25 2:18, R 20 67,69) Srf DVD CSS encryption algorithm cracked with  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
Out with pilots, in with pibots in our national airspace (R 21 96), and flocking algorithms (R 22 01) Rail, Bus, and Other Public Transit !  ...  the happy99.exe infection; Virus Scan misses it (R 20 40) Sfff Discussion by Bruce Schneier on Why Computers are Not Secure (S 25 2:18, R 20 67,69) Srf DVD CSS encryption algorithm cracked with  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Evaluierung der Energie-Effizienz von Sicherheitsmechanismen in drahtlosen Sensornetzen

Christian Haas
2014
In: NIST FIPS PUB 197 (2001) [31] R IVEST, R. ; B ALDWIN, R. : The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms, RFC 2040. http://tools.ietf.org/html/ rfc2040 [32] R IVEST, R.  ...  In: Proceedings of the 4th Safety and Security Systems in Europe.  ... 
doi:10.5445/ir/1000040033 fatcat:mqigefsqqvh37onbcb3rdrbtom

Project Da CaPo++, volume II: implementation documentation

Burkhard Stiller, Germano Caronni, Christina Class, Christian Conrad, Bernhard Plattner, Marcel Waldvogel
1997
Basic building blocks, in particular protocol functions and their mechanisms, form the basis for the process of configuration.  ...  The result is defined as an adapted and best possible communication protocol under well-defined circumstances.  ...  The available modules are 'ECB' and 'CBC', offering DES, RC5 and IDEA, and 'MD' offering MD4 and MD5 as hashing algorithms and optionally authentication via RSA.  ... 
doi:10.3929/ethz-a-004292980 fatcat:jpssagoa3vcztb4yvqsatfikm4

Illustrative Risks To The Public In The Use Of Computer Systems And Related Technology

P.G. Neumann
Symposium Record Policy Issues in Information and Communication Technologies in Medical Applications  
Out with pilots, in with pibots in our national airspace (R 21 96), and flocking algorithms (R 22 01) Rail, Bus, and Other Public Transit !  ...  the happy99.exe infection; Virus Scan misses it (R 20 40) Sfff Discussion by Bruce Schneier on Why Computers are Not Secure (S 25 2:18, R 20 67,69) Srf DVD CSS encryption algorithm cracked with  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1109/ictma.1988.669591 fatcat:wkl3mbqyjbdmfhy4wezuzx4juq

Resource control attacks against encrypted virtual machines

Robert Buhren, Technische Universität Berlin, Jean-Pierre Seifert
2022
However, the higher-privileged hypervisor is still responsible for managing the resources of a virtual machine, such as the memory and CPU time.  ...  The cloud provider has full access to all applications that use its infrastructure; hence, it is necessary to fully trust the cloud provider and its security measures.  ...  using AES-CBC.  ... 
doi:10.14279/depositonce-15264 fatcat:lb44g2rdbbfwnehkyur3avfu3q