Filters








587 Hits in 6.0 sec

Fault-Resilient Lightweight Cryptographic Block Ciphers for Secure Embedded Systems

Mehran Mozaffari-Kermani, Kai Tian, Reza Azarderakhsh, Siavash Bayat-Sarmadi
2014 IEEE Embedded Systems Letters  
In this thesis, considering false-alarm resistivity, error detection schemes for the lightweight block ciphers are proposed with the case study of XTEA (eXtended TEA).  ...  To the best of the author's knowledge, there has been no error detection scheme presented in the literature for the XTEA to date.  ...  or efficient implementations of cryptographic primitives and protocols.  ... 
doi:10.1109/les.2014.2365099 fatcat:bmpoyosicbh67bffjc5d2isrou

Lightweight Architectures for Reliable and Fault Detection Simon and Speck Cryptographic Algorithms on FPGA

Prashant Ahir, Mehran Mozaffari-Kermani, Reza Azarderakhsh
2017 ACM Transactions on Embedded Computing Systems  
The proposed low-complexity concurrent error detection schemes are a step forward towards more reliable architectures for Simon and Speck algorithms in lightweight, secure applications.  ...  This paper proposes concurrent error detection schemes to provide reliable architectures for these two families of lightweight block ciphers.  ...  The main objective of the proposed work is towards achieving a low-area and low-power consuming architecture along with 100% fault detection.  ... 
doi:10.1145/3055514 fatcat:qz67z22vw5cjtex4fne76mggey

Securing Named Data Networking: Attribute-Based Encryption and Beyond

Licheng Wang, Zonghua Zhang, Mianxiong Dong, Lihua Wang, Zhenfu Cao, Yixian Yang
2018 IEEE Communications Magazine  
To deal with such issues, the recently developed cryptographic primitives such as attribute-based encryption (ABE) have been applied to NDN.  ...  In particular, security and privacy remain as one of the significant concerns and challenges, due to the fact that most of the traditional cryptographic primitives are no longer suitable for NDN architecture  ...  -After then, OpenFlow is extended by adding cryptographic primitives and new control plane is built thereon.  ... 
doi:10.1109/mcom.2018.1701123 fatcat:k4sjlepfxnervhh7phducjcwtu

CDCL(Crypto) SAT Solvers for Cryptanalysis [article]

Saeed Nejati, Vijay Ganesh
2020 arXiv   pre-print
with domain-specific knowledge about cryptographic primitives.  ...  Specifically, we extend the propagation and conflict analysis subroutines of CDCL solvers with specialized codes that have knowledge about the cryptographic primitive being analyzed by the solver.  ...  Algebraic Fault Attack Fault attack is an invasive attack on the implementation of a cryptographic primitive that has an embedded message or secret key.  ... 
arXiv:2005.13415v1 fatcat:zpbken45vfcunjtzumzvsse6we

Towards security in nano-communication: Challenges and opportunities

Falko Dressler, Frank Kargl
2012 Nano Communication Networks  
In general, the nano-networks will be used to disseminate information among nano-devices with similar strategies like in sensor networks.  ...  Our main observation is that, especially for molecular communication, existing security and cryptographic solutions might not be applicable.  ...  This includes a discussion of related problems from key management, cryptographic primitives, to access control and intrusion detection. • We give some directions for future research towards security in  ... 
doi:10.1016/j.nancom.2012.08.001 fatcat:xwkcgwl2frgzdbbck3jzoftgma

A Survey on RISC-V Security: Hardware and Architecture [article]

Tao Lu
2021 arXiv   pre-print
is not tampered with or leaked.  ...  In order to deal with foreseeable security threats, the RISC-V community is studying security solutions aimed at achieving a root of trust (RoT) and ensuring that sensitive information on RISC-V devices  ...  Cryptographic Primitives.  ... 
arXiv:2107.04175v1 fatcat:hr6avyprj5dvpav2pvnmfmvg2a

Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications

Anju P. Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2017 Microprocessors and microsystems  
However, the use of remote DPR brings with it a number of security threats that could lead to potentially catastrophic consequences in practical scenarios.  ...  security applications -namely, a software implementation of a cryptographic algorithm and a cash dispensing scheme.  ...  This, in turn, compromises the security of one or more cryptographic primitives (e.g.  ... 
doi:10.1016/j.micpro.2017.06.005 fatcat:qwfgj4fawbfhbeexe7n7ce5ybe

Emerging Technology-Based Design of Primitives for Hardware Security

Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, X. Sharon Hu, Michael Niemier, Yier Jin
2016 ACM Journal on Emerging Technologies in Computing Systems  
Last, we present a lightweight SymFET-based XOR for implementing cryptographic functions (see Section 3.4). Preliminary experimental results and  ...  However, the security provided by these primitives comes at the cost of large overheads mostly in terms of area.  ...  However, due to the limited maximum current, the current protector can mainly be applied for relatively lightweight cryptographic circuits to prevent fault injections.  ... 
doi:10.1145/2816818 fatcat:s5ix3zctqfgobiv6fsrcpe4nwm

LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices [article]

Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan
2021 arXiv   pre-print
This paper presents LIRA-V, a lightweight system for performing remote attestation between constrained devices using the RISC-V architecture.  ...  We propose using read-only memory and the RISC-V Physical Memory Protection (PMP) primitive to build a trust anchor for remote attestation and secure channel creation.  ...  ACKNOWLEDGMENTS The authors would like to thank Blake Loring and the IEEE SafeThings reviewers for their helpful reviews towards improving this paper.  ... 
arXiv:2102.08804v3 fatcat:ovadxwrlgvbcxlobktxf3s2alm

The Future of Low-End Motes in the Internet of Things: A Prospective Paper

Daniel Oliveira, Miguel Costa, Sandro Pinto, Tiago Gomes
2020 Electronics  
From sensor to cloud, this giant network keeps breaking technological bounds in several domains, and wireless sensor nodes (motes) are expected to be predominant as the number of IoT devices grows towards  ...  energy needs, keep pulling in opposite directions.  ...  The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.  ... 
doi:10.3390/electronics9010111 fatcat:itfxdzkecfcmplildmfidzb5hu

Proving SIFA Protection of Masked Redundant Circuits [article]

Vedad Hadzic, Robert Primas, Roderick Bloem
2021 arXiv   pre-print
We implemented this new method in a tool called Danira, which can show the SIFA resistance of cryptographic implementations like AES S-Boxes within minutes.  ...  Implementation attacks like side-channel and fault attacks pose a considerable threat to cryptographic devices that are physically accessible by an attacker.  ...  Introduction Cryptographic primitives are primarily designed to withstand mathematical attacks in a black-box setting.  ... 
arXiv:2107.01917v1 fatcat:wwnahrywhfatrp5cfxwa3zr65q

The computer for the 21st century: present security & privacy challenges

Leonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha, Fábio Borges, Michele Nogueira, Michelle Wangham, Min Wu, Jie Liu
2018 Journal of Internet Services and Applications  
Long-term Security: recent advances in cryptanalysis and quantum attacks. 3. Cryptography Engineering: lightweight cryptosystems and their secure implementation. 4.  ...  Identity Management: requirements to identity management with invisibility. 6. Privacy Implications: sensitivity data identification and regulation. 7.  ...  Lightweight cryptography The emergence of huge collections of interconnected devices in UbiComp motivate the development of novel cryptographic primitives, under the moniker lightweight cryptography.  ... 
doi:10.1186/s13174-018-0095-2 fatcat:ictrcm6ahng4hccfqeqh7surti

Securing data provenance in body area networks using lightweight wireless link fingerprints

Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay Jha
2013 Proceedings of the 3rd international workshop on Trustworthy embedded devices - TrustED '13  
We believe this is a promising first step towards using wireless-link characteristics for data provenance in body area networks.  ...  We validate our solution with experiments using bodyworn devices in scenarios approximating actual device deployment, and we present optimization mechanisms.  ...  Theoretically, provenance protocols can be built using cryptographic primitives, but, as we noted earlier, these techniques are not practical for resource-constrained devices and can only be used sparingly  ... 
doi:10.1145/2517300.2517303 dblp:conf/ccs/AliSOJ13 fatcat:vbdjvarj3zhpvipezuu3qdulsu

Securing data provenance in body area networks using lightweight wireless link fingerprints

Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay Jha
2013 Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems - SenSys '13  
We believe this is a promising first step towards using wireless-link characteristics for data provenance in body area networks.  ...  We validate our solution with experiments using bodyworn devices in scenarios approximating actual device deployment, and we present optimization mechanisms.  ...  Theoretically, provenance protocols can be built using cryptographic primitives, but, as we noted earlier, these techniques are not practical for resource-constrained devices and can only be used sparingly  ... 
doi:10.1145/2517351.2517432 dblp:conf/sensys/AliSOJ13 fatcat:sot2ufiukjd6hh6iqs6r3qoowq

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

Simranjeet Sidhu, Bassam J. Mohd, Thaier Hayajneh
2019 Journal of Sensor and Actuator Networks  
These devices must be protected against sophisticated attacks, especially if the groundwork for the attacks is already laid in devices during design or manufacturing process, such as with HTs.  ...  However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security.  ...  B.J.M. was responsible for guiding the hardware security part, helped in the security analysis and writing the paper.  ... 
doi:10.3390/jsan8030042 fatcat:zuzw6sf2hzgdfiz65p2joz2g6a
« Previous Showing results 1 — 15 out of 587 results