In this paper we propose a novel Crypto-System with Embedded Error Control (CSEEC). The system supports data security and reliability using forward error correction codes (FEC). Security is provided through the use of a new symmetric encryption algorithm, while reliability is provided through the support of FEC codes. The system also supports joint security and reliability in which encryption and encoding are performed in a single step. The system aims at speeding up the encryption and encoding operations and reduces the hardware dedicated to each of these operations.In addition, the proposed system allows users to achieve secure and reliable communication in which they can alternate between a priority onsecurity and reliabilityand scale their choice to the desired level in order to attain communication quality and fulfill application needs. The system targets resource constrained nodes such as remote sensor nodes operating in noisy environments.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
This document summarizes a research paper that proposes a mediated certificateless public key encryption (mCL-PKE) scheme for secure data sharing in cloud storage. The key points are:
1) The mCL-PKE scheme solves problems of key escrow and certificate revocation without using computationally expensive bilinear pairing operations.
2) It uses a security mediator to instantly revoke compromised users and enforce access policies. The mediator also supports partial decryption to preserve data confidentiality.
3) The scheme extends mCL-PKE with an access control list to allow the data owner to encrypt data only once for multiple authorized users, improving efficiency over previous pairing-based schemes.
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
This document summarizes a study that evaluates the performance of four symmetric key cryptography algorithms: DES, 3DES, Blowfish, and AES. The study considers criteria like file size, file type, encryption and decryption time, and block size. It finds that Blowfish has the best performance, encrypting and decrypting data faster than the other algorithms. AES also performs well, while 3DES has the lowest performance due to its longer key length. The document reviews related literature comparing the performance of symmetric key cryptography algorithms and techniques that combine cryptography with steganography for enhanced security.
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
The document describes a pairwise key establishment scheme for ad hoc networks. It proposes using cellular automata rules to dynamically establish shared keys between two nodes. Each node sends either a cellular automata rule or the initialization parameters to the other node. The receiving node then uses the rule and parameters along with cellular automata computations to independently derive the shared key. This allows keys to be established dynamically without transmitting the actual keys or requiring an online server. The scheme aims to provide secure communication through pairwise key establishment while being computationally efficient and not relying on predistributed keys.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
This document summarizes a research paper that proposes a mediated certificateless public key encryption (mCL-PKE) scheme for secure data sharing in cloud storage. The key points are:
1) The mCL-PKE scheme solves problems of key escrow and certificate revocation without using computationally expensive bilinear pairing operations.
2) It uses a security mediator to instantly revoke compromised users and enforce access policies. The mediator also supports partial decryption to preserve data confidentiality.
3) The scheme extends mCL-PKE with an access control list to allow the data owner to encrypt data only once for multiple authorized users, improving efficiency over previous pairing-based schemes.
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
This document summarizes a study that evaluates the performance of four symmetric key cryptography algorithms: DES, 3DES, Blowfish, and AES. The study considers criteria like file size, file type, encryption and decryption time, and block size. It finds that Blowfish has the best performance, encrypting and decrypting data faster than the other algorithms. AES also performs well, while 3DES has the lowest performance due to its longer key length. The document reviews related literature comparing the performance of symmetric key cryptography algorithms and techniques that combine cryptography with steganography for enhanced security.
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
The document describes a pairwise key establishment scheme for ad hoc networks. It proposes using cellular automata rules to dynamically establish shared keys between two nodes. Each node sends either a cellular automata rule or the initialization parameters to the other node. The receiving node then uses the rule and parameters along with cellular automata computations to independently derive the shared key. This allows keys to be established dynamically without transmitting the actual keys or requiring an online server. The scheme aims to provide secure communication through pairwise key establishment while being computationally efficient and not relying on predistributed keys.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Randomness evaluation framework of cryptographic algorithmsijcisjournal
Nowadays, computer systems are developing very rapidly and become more and more complex, which
leads to the necessity to provide security for them. This paper is intended to present software for testing
and evaluating cryptographic algorithms. When evaluating block and stream ciphers one of the most basic
property expected from them is to pass statistical randomness testing, demonstrating in this way their
suitability to be random number generators. The primary goal of this paper is to propose a new framework
to evaluate the randomness of cryptographic algorithms: based only on a .dll file which offers access to the
encryption function, the decryption function and the key schedule function of the cipher that has to be tested
(block cipher or stream cipher), the application evaluates the randomness and provides an interpretation of
the results. For this, all nine tests used for evaluation of AES candidate block ciphers and three NIST
statistical tests are applied to the algorithm being tested. In this paper, we have evaluated Tiny Encryption
Algorithm (block cipher), Camellia (block cipher) and LEX (stream cipher) to determine if they pass
statistical randomness testing.
EVALUATING GALOIS COUNTER MODE IN LINK LAYER SECURITY ARCHITECTURE FOR WIRELE...IJNSA Journal
Due to the severe resource constraints in the Wireless Sensor Networks (WSNs), the security protocols therein, should be designed to optimize the performance maximally. On the other hand a block cipher and the mode of operation in which it operates, play a vital role in determining the overall efficiency of a security protocol. In addition, when an application demands confidentiality and message integrity, the overall efficiency of a security protocol can be improved by using the Authenticated Encryption (AE) block cipher mode of operation as compared to the conventional sequential encryption and authentication. Amongst the AE block cipher modes, the Galois Counter mode (GCM) is the latest recommended AE mode by the NIST. In this paper, we attempt at evaluating the performance of the GCM mode in the link layer security protocol for a WSN viz. TinySec and compare it with the default conventional block cipher modes of operation used therein. To the best of our knowledge ours is the first experimental evaluation of Galois Counter Mode with Advanced Encryption Standard Cipher at the link layer security architecture for WSNs.
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksIJTET Journal
Abstract— Mobile knots now armed atmospheres such equally battlefield or aggressive area remain expected toward smart after irregular net connectivity and regular panels. Disruption Tolerant Network (DTN) tools stay attractive positive keys that agree knots toward connect with each other in these dangerous interacting atmospheres.The problem of applying the security mechanisms to DTN introduces several security challenges.Since nearly handlers could modification their related characteristics by approximately argument and reliability of data should be changed otherwise around isolated secrets power remain bargained significant reversal aimed at respectively characteristic is essential in command toward create organisms safe in this research a novel approaches are used to overcome the above mentioned problems called secure data sharing algorithm. This algorithm calculate hash importance aimed at coded documents which is used to check the reliability of encrypted confidential data.
Efficient Data Mining Of Association Rules in Horizontally Distributed Databasesijircee
This document proposes a protocol to securely mine association rules from horizontally distributed databases in a privacy-preserving manner. The key aspects of the protocol are:
1) It uses a novel secure multi-party protocol to compute the union of private subsets held by different players, improving on prior work by avoiding commutative encryption and oblivious transfer.
2) It includes a protocol to test if an element held by one player is contained within a private subset held by another player.
3) Experimental results show the protocol has significantly lower communication and computation costs than prior work, while still protecting individual player's privacy beyond just the final mining results.
This is the presentation of my training program for junior managers. The program is based on a model that encompasses diversified areas of a supervisor or junior manager - from setting goals to their execution and to the development of their people.
Image encryption using jumbling saltingMauryasuraj98
In this project we have implemented the modified JS algorithm and later compared it with other similar functioning algorithms such as AES, DES and Jumbling Salting Algorithm.
Also we have done this by using a throughput value that is considered as measure for comparing the effectiveness of these algorithms. Basically the throughput value indicates the number of Megabytes of image encrypted with respect to time taken to encrypt the image.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
This document proposes a hierarchical key agreement protocol for wireless sensor networks that uses both symmetric and asymmetric cryptographic techniques. Specifically, it uses probabilistic key pre-distribution for sensor nodes within clusters to establish secure communication with low computational overhead. It uses identity-based asymmetric key distribution between cluster heads and the base station to achieve secure communication with low communication overhead. The goal is to balance security, resilience, and resource overhead of the key management protocol for the constrained sensor nodes. It provides mathematical background on bilinear pairings and elliptic curves needed to implement the identity-based cryptographic techniques.
A comprehensive study of fhe schemes ijact journalMajedahAlkharji
This document provides a comprehensive survey of homomorphic encryption (HE) and fully homomorphic encryption (FHE) schemes. It begins with definitions of HE, including its key functions and properties. HE allows computations to be performed on encrypted data without decrypting it first. The document then reviews the history and examples of partially homomorphic encryption (PHE) schemes that support either addition or multiplication but not both. It also discusses definitions and security assumptions related to FHE, which enables an unlimited number of operations on encrypted data. The survey analyzes advances in FHE and discusses semantic security and future work in the field.
This document summarizes techniques for securing mobile ad hoc networks (MANETs) against security threats. It discusses cryptographic approaches using keys, a trusted certificate server approach, and node-capture attack detection methods. Cryptographic solutions use encryption but are resource-intensive, while other approaches use trust, observation or reputation but are still vulnerable to some attacks. The document surveys these security methods, outlining their capabilities and limitations to provide researchers an overview of the challenges and potential solutions in securing MANETs.
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
Providing user security guarantees in public infrastructure cloudsKamal Spring
The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants – insulated from the minutiae of hardware maintenance – rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating operations to IaaS platforms due to security concerns. In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection. We continue with an extensive theoretical analysis with proofs about protocol resistance against attacks in the defined threat model. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
Secure Network Discovery for Risk-Aware Framework in ManetIOSR Journals
This document summarizes a research paper that proposes an adaptive risk-aware response mechanism for secure network discovery in mobile ad hoc networks (MANETs). The mechanism uses an extended Dempster-Shafer theory that introduces importance factors to combine multiple evidence sources, like intrusion detection alerts and routing table changes, and assess overall risk. It then employs adaptive decision making to dynamically isolate malicious nodes and recover routing tables. The proposed approach aims to address limitations of existing binary and naive fuzzy isolation techniques by enabling more flexible and weighted responses to routing attacks in MANETs.
Lightweight secure scheme for detecting provenance forgery and packet drop at...Pvrtechnologies Nellore
The document proposes a lightweight secure scheme to detect packet forgery and loss attacks in wireless sensor networks. It relies on in-packet Bloom filters to encode data provenance. The scheme introduces efficient mechanisms for provenance verification and reconstruction at the base station. Key generation, encryption, and signature techniques are used to securely transmit provenance information and detect suspicious data packets. The proposed technique is evaluated analytically and empirically, proving its effectiveness and efficiency in detecting attacks.
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...chennaijp
We are good IEEE java projects development center in Chennai and Pondicherry. We guided advanced java technologies projects of cloud computing, data mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing and Service Computing (Web Service).
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/java-projects/
This document discusses image cryptography using the RSA algorithm. It begins with an abstract that provides an overview of encrypting images through a combination of RSA encryption and a 2-bit rotation mechanism. The document then reviews literature on modifications made to the original RSA algorithm. It discusses current applications of RSA, including uses in email encryption, cloud services, and digital signatures. The design architecture and working of the RSA algorithm are explained. The document concludes that image encryption using RSA is efficient and secure, though further research is needed to develop quantum-resistant encryption systems.
Исследование Hays Leading Women. Гендерная диверсификация в мире какрьеры и б...Hays Russia
В своем исследовании мы выяснили мнения мужчин и женщин, проживающих в разных странах относительно существования гендерной диверсификации в мире карьеры, проанализировали на предмет гендерного превосходства различные сферы деятельности, а также выявили основные причины, которые смогли бы повлиять на данную ситуацию.
Developing The Global Executive I - Public Speaking,Communication,Interperson...FriendliNet
The document discusses developing global executives. It focuses on a training program held on August 21st, 2010 at Excel World in Sri Lanka. The program aimed to provide skills and knowledge to help managers succeed in international business environments.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Randomness evaluation framework of cryptographic algorithmsijcisjournal
Nowadays, computer systems are developing very rapidly and become more and more complex, which
leads to the necessity to provide security for them. This paper is intended to present software for testing
and evaluating cryptographic algorithms. When evaluating block and stream ciphers one of the most basic
property expected from them is to pass statistical randomness testing, demonstrating in this way their
suitability to be random number generators. The primary goal of this paper is to propose a new framework
to evaluate the randomness of cryptographic algorithms: based only on a .dll file which offers access to the
encryption function, the decryption function and the key schedule function of the cipher that has to be tested
(block cipher or stream cipher), the application evaluates the randomness and provides an interpretation of
the results. For this, all nine tests used for evaluation of AES candidate block ciphers and three NIST
statistical tests are applied to the algorithm being tested. In this paper, we have evaluated Tiny Encryption
Algorithm (block cipher), Camellia (block cipher) and LEX (stream cipher) to determine if they pass
statistical randomness testing.
EVALUATING GALOIS COUNTER MODE IN LINK LAYER SECURITY ARCHITECTURE FOR WIRELE...IJNSA Journal
Due to the severe resource constraints in the Wireless Sensor Networks (WSNs), the security protocols therein, should be designed to optimize the performance maximally. On the other hand a block cipher and the mode of operation in which it operates, play a vital role in determining the overall efficiency of a security protocol. In addition, when an application demands confidentiality and message integrity, the overall efficiency of a security protocol can be improved by using the Authenticated Encryption (AE) block cipher mode of operation as compared to the conventional sequential encryption and authentication. Amongst the AE block cipher modes, the Galois Counter mode (GCM) is the latest recommended AE mode by the NIST. In this paper, we attempt at evaluating the performance of the GCM mode in the link layer security protocol for a WSN viz. TinySec and compare it with the default conventional block cipher modes of operation used therein. To the best of our knowledge ours is the first experimental evaluation of Galois Counter Mode with Advanced Encryption Standard Cipher at the link layer security architecture for WSNs.
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksIJTET Journal
Abstract— Mobile knots now armed atmospheres such equally battlefield or aggressive area remain expected toward smart after irregular net connectivity and regular panels. Disruption Tolerant Network (DTN) tools stay attractive positive keys that agree knots toward connect with each other in these dangerous interacting atmospheres.The problem of applying the security mechanisms to DTN introduces several security challenges.Since nearly handlers could modification their related characteristics by approximately argument and reliability of data should be changed otherwise around isolated secrets power remain bargained significant reversal aimed at respectively characteristic is essential in command toward create organisms safe in this research a novel approaches are used to overcome the above mentioned problems called secure data sharing algorithm. This algorithm calculate hash importance aimed at coded documents which is used to check the reliability of encrypted confidential data.
Efficient Data Mining Of Association Rules in Horizontally Distributed Databasesijircee
This document proposes a protocol to securely mine association rules from horizontally distributed databases in a privacy-preserving manner. The key aspects of the protocol are:
1) It uses a novel secure multi-party protocol to compute the union of private subsets held by different players, improving on prior work by avoiding commutative encryption and oblivious transfer.
2) It includes a protocol to test if an element held by one player is contained within a private subset held by another player.
3) Experimental results show the protocol has significantly lower communication and computation costs than prior work, while still protecting individual player's privacy beyond just the final mining results.
This is the presentation of my training program for junior managers. The program is based on a model that encompasses diversified areas of a supervisor or junior manager - from setting goals to their execution and to the development of their people.
Image encryption using jumbling saltingMauryasuraj98
In this project we have implemented the modified JS algorithm and later compared it with other similar functioning algorithms such as AES, DES and Jumbling Salting Algorithm.
Also we have done this by using a throughput value that is considered as measure for comparing the effectiveness of these algorithms. Basically the throughput value indicates the number of Megabytes of image encrypted with respect to time taken to encrypt the image.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
This document proposes a hierarchical key agreement protocol for wireless sensor networks that uses both symmetric and asymmetric cryptographic techniques. Specifically, it uses probabilistic key pre-distribution for sensor nodes within clusters to establish secure communication with low computational overhead. It uses identity-based asymmetric key distribution between cluster heads and the base station to achieve secure communication with low communication overhead. The goal is to balance security, resilience, and resource overhead of the key management protocol for the constrained sensor nodes. It provides mathematical background on bilinear pairings and elliptic curves needed to implement the identity-based cryptographic techniques.
A comprehensive study of fhe schemes ijact journalMajedahAlkharji
This document provides a comprehensive survey of homomorphic encryption (HE) and fully homomorphic encryption (FHE) schemes. It begins with definitions of HE, including its key functions and properties. HE allows computations to be performed on encrypted data without decrypting it first. The document then reviews the history and examples of partially homomorphic encryption (PHE) schemes that support either addition or multiplication but not both. It also discusses definitions and security assumptions related to FHE, which enables an unlimited number of operations on encrypted data. The survey analyzes advances in FHE and discusses semantic security and future work in the field.
This document summarizes techniques for securing mobile ad hoc networks (MANETs) against security threats. It discusses cryptographic approaches using keys, a trusted certificate server approach, and node-capture attack detection methods. Cryptographic solutions use encryption but are resource-intensive, while other approaches use trust, observation or reputation but are still vulnerable to some attacks. The document surveys these security methods, outlining their capabilities and limitations to provide researchers an overview of the challenges and potential solutions in securing MANETs.
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
Providing user security guarantees in public infrastructure cloudsKamal Spring
The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants – insulated from the minutiae of hardware maintenance – rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating operations to IaaS platforms due to security concerns. In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection. We continue with an extensive theoretical analysis with proofs about protocol resistance against attacks in the defined threat model. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
Secure Network Discovery for Risk-Aware Framework in ManetIOSR Journals
This document summarizes a research paper that proposes an adaptive risk-aware response mechanism for secure network discovery in mobile ad hoc networks (MANETs). The mechanism uses an extended Dempster-Shafer theory that introduces importance factors to combine multiple evidence sources, like intrusion detection alerts and routing table changes, and assess overall risk. It then employs adaptive decision making to dynamically isolate malicious nodes and recover routing tables. The proposed approach aims to address limitations of existing binary and naive fuzzy isolation techniques by enabling more flexible and weighted responses to routing attacks in MANETs.
Lightweight secure scheme for detecting provenance forgery and packet drop at...Pvrtechnologies Nellore
The document proposes a lightweight secure scheme to detect packet forgery and loss attacks in wireless sensor networks. It relies on in-packet Bloom filters to encode data provenance. The scheme introduces efficient mechanisms for provenance verification and reconstruction at the base station. Key generation, encryption, and signature techniques are used to securely transmit provenance information and detect suspicious data packets. The proposed technique is evaluated analytically and empirically, proving its effectiveness and efficiency in detecting attacks.
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...chennaijp
We are good IEEE java projects development center in Chennai and Pondicherry. We guided advanced java technologies projects of cloud computing, data mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing and Service Computing (Web Service).
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/java-projects/
This document discusses image cryptography using the RSA algorithm. It begins with an abstract that provides an overview of encrypting images through a combination of RSA encryption and a 2-bit rotation mechanism. The document then reviews literature on modifications made to the original RSA algorithm. It discusses current applications of RSA, including uses in email encryption, cloud services, and digital signatures. The design architecture and working of the RSA algorithm are explained. The document concludes that image encryption using RSA is efficient and secure, though further research is needed to develop quantum-resistant encryption systems.
Исследование Hays Leading Women. Гендерная диверсификация в мире какрьеры и б...Hays Russia
В своем исследовании мы выяснили мнения мужчин и женщин, проживающих в разных странах относительно существования гендерной диверсификации в мире карьеры, проанализировали на предмет гендерного превосходства различные сферы деятельности, а также выявили основные причины, которые смогли бы повлиять на данную ситуацию.
Developing The Global Executive I - Public Speaking,Communication,Interperson...FriendliNet
The document discusses developing global executives. It focuses on a training program held on August 21st, 2010 at Excel World in Sri Lanka. The program aimed to provide skills and knowledge to help managers succeed in international business environments.
El documento describe las ventajas del aprendizaje colaborativo, incluyendo que promueve la construcción de conocimiento, mejora las habilidades sociales y de comunicación, y aumenta la motivación y satisfacción. También genera interdependencia positiva entre los miembros del grupo y estimula el desarrollo de habilidades personales y de grupo.
Saxons Learning Solutions offers virtual instructor-led training (VILT) using Yammer to enhance the learning experience for students. Express Data, an Australian Microsoft distributor, engaged Saxons to provide VILT courses to help 9 partners achieve their Microsoft Communications Silver Competency within 1 month. Saxons delivered the required courses over Lync in 3-hour blocks over 4 weeks and used Microsoft Labs Online for hands-on labs, allowing partners to complete training remotely without impacting work. All partners passed their exams and achieved certification on time.
Este documento ofrece requisitos y expectativas para ser parte del ministerio de alabanza de una iglesia. Se enfatiza la importancia de la espiritualidad, motivación y preparación de los miembros individuales, así como que el grupo en general sea lleno del Espíritu Santo, viva lo que predica y sirva como ejemplo para la congregación. También se destacan aspectos como la vestimenta adecuada, puntualidad y flexibilidad.
Participer à ces conférence à destination avec Denis Dubord, Francois Charron & Marc Fisher et Tirez le meilleur de vous même, vos employés et vos associés !! Faites Vite, Places limités.
IT to IoT: The Journey to Nextgen - By Rajesh BatraRahul Neel Mani
IoT is the newest buzzword in the healthcare sector. The use of sensors, IoT and wearables tends to be on the rise and is radically changing the way patient care has been delivered.
Este documento introduce los recursos disponibles en el Sistema de Bibliotecas de la PUCP para encontrar información. Ofrece dos tipos de recursos: recursos internos como el catálogo en línea, bases de datos, revistas electrónicas y repositorios; y recursos externos como préstamo interbibliotecario y portales de revistas de acceso abierto. El objetivo es aprender dónde buscar la información necesaria.
El documento habla sobre la importancia de tener una relación personal con Jesucristo que vaya más allá de las acciones religiosas. Sugiera que los cristianos planifiquen "citas" regulares con Dios apartando tiempo a solas en un lugar tranquilo y sin distracciones para orar sinceramente y disfrutar de una amistad íntima con el Espíritu Santo. Recomienda establecer un horario y lugar privado para estas citas con Dios de manera que se pueda prestar atención completa a la oración y a la comunicación con el Se
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Extended of TEA: A 256 bits block cipher algorithm for image encryption IJECEIAES
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Key aggregate cryptosystem for scalable data sharing in cloud storage using pairng based cryptography. We used JPBC tool to implement Key Aggregate cryptosystem.
Advanced approach for encryption using advanced encryption standard with chao...IJECEIAES
At present, security is significant for individuals and organizations. All information need security to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms to the information. Encipherment is the method that changes plaintext to a secure form called cipherment. Encipherment includes diverse types, such as symmetric and asymmetric encipherment. This study proposes an improved version of the advanced encryption standard (AES) algorithm called optimized advanced encryption standard (OAES). The OAES algorithm utilizes sine map and random number to generate a new key to enhance the complexity of the generated key. Thereafter, multiplication operation was performed on the original text, thereby creating a random matrix (4×4) before the five stages of the coding cycles. A random substitution-box (S-Box) was utilized instead of a fixed S-Box. Finally, we utilized the eXclusive OR (XOR) operation with digit 255, also with the key that was generated last. This research compared the features of the AES and OAES algorithms, particularly the extent of complexity, key size, and number of rounds. The OAES algorithm can enhance complexity of encryption and decryption by using random values, random S-Box, and chaotic maps, thereby resulting in difficulty guessing the original text.
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
This document discusses secure data deduplication and auditing for cloud data storage. It proposes using the UR-MLE2 scheme for secure data deduplication checking and a data auditor to check data integrity. To improve system performance, a dynamic binary decision tree is used to efficiently check for data deduplication as user data is modified or deleted. The proposed framework aims to provide secure data deduplication and auditing while evaluating the system based on execution time.
This is my Capstone Project for my Masters in Computer Science 2023 at the Rochester Institute of Technology. I want to fully thank Dr. M. Mustafa Rafique and Dr. Hans-Peter Bischof for their guidance and support throughout this process.
This paper talks about how to improve and build upon existing data distribution algorithms for a fog computing environment. It implements libraries from AES, Reed Solomon to improve the existing architecture.
This paper is also based off the existing research: ian Wang et al. A Three-Layer Privacy Preserving Cloud Storage Scheme
Based on Computational Intelligence in Fog Computing in IEEE TETCI, vol.
2, no. 1, pp. 3-12, Feb. 2018 .
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are considering the important performance of these algorithms like CPU time consumption, memory usage and battery usage. This research tries to demonstrate a fair comparison between the most common algorithms and with a novel method called Secured Watermark System (SWS) in data encryption field according to CPU time, packet size and power consumption. It provides a comparison the most known algorithms used in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the compared encryption algorithms with different parameters.
Towards secure multi keyword top-k retrieval over encrypted cloud dataJPINFOTECH JAYAPRAKASH
The document proposes a two-round searchable encryption scheme to enable secure multi-keyword top-k retrieval over encrypted cloud data. Existing searchable encryption schemes only support boolean keyword search and do not consider relevance. The proposed Two-Round Searchable Encryption scheme uses homomorphic encryption and a vector space model to enable users to participate in ranking while most computation is done on the server side ciphertext only. This guarantees security without sacrificing efficiency.
This document discusses securely mining data stored in the cloud using encryption techniques. It proposes using k-means clustering on the data, then encrypting it with AES. Homomorphic encryption is then performed using Paillier cryptosystem to allow computations on the encrypted data while preserving privacy. The key advantages discussed are that this approach allows for secure data mining and analysis in the cloud without revealing private information to unauthorized parties. It also analyzes related work on encryption and homomorphic techniques for secure cloud computing and big data analysis.
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
This document proposes a secure communication framework for embedded networking. The framework aims to be platform neutral and hardware independent. It incorporates a secured database containing all possible system events. Embedded systems can authenticate and access this database. The framework also protects the communication channel by encrypting transmissions, secure handshaking, and using self-adaptive frame structures. It references event indexes from the database rather than transmitting actual information. The database is dynamically recreated on each power-on to change event indexes and improve security. The framework is designed to be easily implemented using proven security technologies while providing modest protection for embedded network devices.
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
This document proposes a double key encryption method using artificial neural networks for securely storing and retrieving data in cloud computing. The method uses a backpropagation neural network for key generation and to transform plaintext into an encrypted form for storage. Encryption occurs in two stages - first using a transformation key to produce encrypted input, then a second encryption key to generate ciphertext. For retrieval, the process is reversed - decrypting with keys then transforming back to plaintext. The goal is to enhance cloud data security even if an intruder obtains the ciphertext, as they could not decrypt without both keys.
The document describes a secure cloud storage system that supports data forwarding without retrieving data. It uses a threshold proxy re-encryption scheme combined with a decentralized erasure code. This allows storage servers to directly re-encrypt and forward encrypted data to another user, without having the plaintext. The system has four phases: setup, storage, forwarding, and retrieval. It discusses parameters for the number of storage servers and key shares to provide security and robustness. The scheme supports encoding and forwarding of encrypted data in a distributed manner across independent servers.
The document discusses secure data sharing in cloud storage using a key-aggregate cryptosystem (KAC) which allows efficient delegation of decryption rights for any set of ciphertexts. KAC produces constant size ciphertexts and allows any set of secret keys to be aggregated into a single key encompassing the power of the keys being aggregated. This aggregate key can then be sent to others for decryption of the ciphertext set while keeping files outside the set confidential.
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
The document proposes improvements to the reliability and load balancing of an existing CP-ABE encryption scheme for secure data sharing in distributed networks. The existing scheme addresses key escrow and revocation issues but lacks reliability factors and load balancing. The proposed approach aims to improve security and efficiency by introducing reliability factors like multiple key generation centers and distributed data storage. It also aims to balance load across the network to avoid overloading any single node. The document reviews related work and outlines the proposed framework, including use of an access structure to define user attributes and access policies for decryption.
Several Data Security Methodology has been noticed, with recent adoption and spreading of data sharing. One of the most interesting and definitive approach is Cipher text-Policy Attribute-Based Encryption (CP-ABE).CP-ABE provides us with the indulgement of the access policies and its updates. It is used to set or control outsourcing of data sharing; it deals with the issues in CP-ABE. This solution allows encryptor to deals with the access control with respect to the access formula. The lacking of reliability factor lead to weaken the system, therefore we will amplify CB-ABE by introducing some factor. Key Generation center (KGC) and data storing center are the highlighted factors. KGC deals with the drawback of Key escrow problem. As KGC can decrypt the users data as per KGC`s concerns, causing threat to the data sharing Systems. This is not favorable for the distributed scheme where KGC is not trustworthy. Along with the key escrow problem, we will be concerning with the problem of key-revocation that is degradation because of windows of vulnerability. These issues are solved by exploiting the features characteristics of Architecture. The problem of key-escrow is resolved using 2-pc protocol. And Key-revocation is proceeding by using proxy encryption.
Similar to A Crypto-System with Embedded Error Control for Secure and Reliable Communication (20)
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
A Crypto-System with Embedded Error Control for Secure and Reliable Communication
1. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 48
A Crypto-System with Embedded Error Control for Secure and
Reliable Communication
Ranya Alawadhi ralawadhi@smu.edu
HACNet Labs, Bobby B. Lyle School of Engineering
Southern Methodist University
Dallas, TX, 75275, US
Suku Nair nair@smu.edu
HACNet Labs, Bobby B. Lyle School of Engineering
Southern Methodist University
Dallas, TX, 75275, US
Abstract
In this paper we propose a novel Crypto-System with Embedded Error Control (CSEEC). The
system supports data security and reliability using forward error correction codes (FEC). Security
is provided through the use of a new symmetric encryption algorithm, while reliability is provided
through the support of FEC codes. The system also supports joint security and reliability in which
encryption and encoding are performed in a single step. The system aims at speeding up the
encryption and encoding operations and reduces the hardware dedicated to each of these
operations.In addition, the proposed system allows users to achieve secure and reliable
communication in which they can alternate between a priority onsecurity and reliabilityand scale
their choice to the desired level in order to attain communication quality and fulfill application
needs. The system targets resource constrained nodes such as remote sensor nodes operating
in noisy environments.
Keywords: Joint Encryption and Error Correction, Data Security, Data Reliability, Erasure
Coding, Forward Error Correction.
1. INTRODUCTION
Data security and reliability are integral aspects of modern communication systems. They are
achieved through encryption and forward error correction (FEC). Conventional encryption
schemes provide a high level of protection at the expense of processing time and energy. These
methods force devices with constrained resources to settle for either low or no strength schemes.
Security and reliability operations have always been dealt with separately due to their
contradicting objectives. There have been some efforts to combine them by joining encryption
and coding into a single step. The aim was to have a faster more efficient communication in terms
of time, energy, and area[1]. However, many efforts [2]–[5]did not get a lot of attention due to their
large key size, high overhead or inefficient correction capability, while others[2], [4], [6]–[8]did not
achieve enough strength to compete with conventional encryption schemes.
With consideration to the work that has been done previously in the area of joint security and
reliability, we propose a novel Crypto-System with Embedded Error Control (CSEEC) for secure
and reliable communication. Thissystem supports data security and reliability. In addition to the
support of these functions separately, the systemalso supports the joint functionality when
encryption and encoding are combined in a single process. CSEEC provides all these
functionsusing forward error correction (FEC) codes. FEC codes are commonly used to achieve
data reliability. However in this system, they are combined with specially designed operations
thatallow them achieve data security as well.
2. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 49
To achieve data security we propose a new symmetric encryption scheme with a 128-bit key. The
idea is based on the ability of erasure codes to recover from errors only when the exact locations
of these errors are determined. Thus to encrypt a block of data, it is first encoded using the FEC
code, then an amount equal to the amount of added redundancy is intentionally deleted. The
deletion process is controlled by the encryption key. Thus, only those who possess the key are
able to recover the original data. However, the idea of deletion by itself is not enough to achieve
confusion and diffusion, the two properties that characterize a secure system[9]. Hence the
deletion operation is combined with other operations,as well as permutation and randomization.
Permutation rearranges the bits within a block while mixing combines the processed data with a
random sequence. The proposed encryption scheme is not a strict block encryption sinceit does
not have a traditional S-box. It is not a strict stream encryption either sinceit processes the stream
of bits in fixed-sized blocks.
The support of data reliability or error control capability intuitively comes from the support of
forward error correction code. This capability can be used to detect errors, correct errors, or
correct erasures. The exact function will be determined by the application, the channel, and the
amount of redundancy added. To achieve joint security and reliability, we extend the encryption
scheme by making the amount of redundancy deleted less than the amount of redundancy
added. Thus, the extra amount can be used to control the errors introduced by the channel. Due
to our ability to range the amount of data deleted, the security and reliability levels are easily
scaled.
CSEEC is different from previous proposals [3], [4], [11]. It does not incur any communication
overhead when FEC codes are used as a mean of security. This is due to the notion of erasures,
as opposite to errors. Erasure allows CSEEC to maintain the ciphertext size equal to the plaintext
size. It also uses dynamic random permutations in which each processed block is permuted
differently. In addition, it has a reasonable key size(128-bit)from whichall components are
initialized or derived.
The rest of the paper is organized as follows. In Section 2 we discuss related work. In Section3
we describe the proposed encryption scheme. In Section 4 we present the joint reliability and
security scheme. In Section 5 we provide an analysis of results showing the superiority of our
method. And finally, in Section 6, we conclude the paper and describe directions for future work.
2. RELATED WORK
The first effort in the field of joint encryption and error correction was contributed by McElience[2].
McEliece introduced a public key cryptosystem based on algebraic coding theory. His idea was
based on the fact that the decoding problem for an arbitrary linear code is NP-complete. The
system was based on a class of error correcting code known as the Goppa code. The McEliece
system is inefficient in terms of error correction capability because it requires very large public
keys and large block sizes to correct the large number of errors,which result in high
computational overhead. Also, the original system has been shown to be vulnerable to chosen-
ciphertext attacks [12]. More work, with mixed results,have been done to extend theMcEliece
system. However, the large key size remains an unsolved problem for McEliece-based systems.
A general encryption scheme based on MDS codes was proposed by Xu[13]. Xu proposed
combining cryptographically strong random key stream generators with erasure correction codes.
In general, the scheme makes use of any ሺ݊, ݇ሻMDS code, where ݊ ب ݇. A ciphertext
corresponding to ݇ symbols plaintext is chosen to be ݇ symbols selected from the ݊ symbols
codeword generated from encoding the plaintext. The symbols are selected based on a sequence
generated from the random number generator each time a plaintext block is to be encrypted.
Clearly, as in stream ciphers, the security of the scheme depends on the strength of the random
number generator. Further analysis is required to assess the system.
3. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 50
Another scheme that makes use of erasure codes was proposed in [4], a secure erasure coding
scheme(SEC) for peer-to-peer storage systems. The scheme aims at ensuring the confidentiality
of long term archive data through the use of the proposed encryption scheme along with fragment
naming and placement procedures. SEC uses a customized version of the Reed-Solomon
erasure code in whicha secret generator matrix is constructed from a user specified key by
customizing the Cauchy matrix. The encryption scheme is susceptible to known plaintext attack
when used in stand-alone mode.
In [3], a symmetric encryption scheme based on erasure correction codes is presented. The
scheme starts by compressing and permuting the plaintext. Then, the result was encoded using
an erasure correction code. The encoding phase was followed by intentional data loss through
which a number of columns were removed from the block. Finally, another transposition was
applied. This scheme, however, suffers from a couple of problems. The first one is the use of
compression. Although compression removes redundancy, it does not add randomness [14]. In
addition, compression may increase the data size when encrypting previouslycompressed data.
The second issue is the key that includes all encryption parameters. This results in a large and
variable key size.
An error correction cipher calleda High Diffusion (HD) cipher is presented in[5]. They used the
Advanced Encryption Standard (AES) structure and replaced its diffusion layer with an error
correcting code. They proposed usingHD codes that possess maximum diffusion and achieve
optimal error correction. The cipher is composed of multiple iterations of the round function and
key mixing operations. Though the system provides both data security and reliability, it is highly
complex.
A more recent work is presented in [11], Error Correction-Based Cipher (ECBC). It is a scheme
that combines error correction and security. ECBC is hardware based and designed for wireless
networks. It is based on the McEliece scheme and employs a block chaining technique. The
ciphertext is generated by adding a randomly generated error vector to a permuted block where
the permuted block is the result of multiplying a nonlinearly transformed encoded plaintext viaa
permutation matrix. In [15], it was found that ECBC is vulnerable to chosen plaintext attacks.
3. THE ENCRYPTION SCHEME
We propose symmetric encryption with a 128-bit key. The idea is to make use of the fact that a
plaintext block can be recovered from a subset of the encoded block provided that enough
information is available. Based on that, we intentionally introduce erasures by deleting part of the
encoded block in the encryption process and later use the decoding algorithm to recoverthe
deleted values from those erasures. The success of the decryption process depends on the
knowledge of how erasures are introduced in the first place. Thus to prevent anyone from
decrypting the data, erasures are introduced in a way known only to communicating parties.
3.1. System Parameters
Before processing the data, the sender and receiver must agree on a number of parameters. The
parameters are: the error correction code ԧ, block size determined by the number of rows ݎ and
columns ܿ, number of parity columns ܲ, number of parity columns used toward reliability ܴ, and a
pseudo random number generator PRNG.
ԧcan be any correction code with erasure correction capability. The erasure correction codes can
correct any number of erasures up to the number of added redundancy. Usually, the error
correction code supports specific block sizes. Therefore, the sender and receiver must choose a
suitable block size and, accordingly, determine ݎand ܿ. For example, in Linear codes for Erasure
error Correction (LEC) [16],ܿ has to be prime and ݎ is set atܿ െ 1. The selected size will depend
on the application and the supported hardware capabilities and it should be chosen for fast
decoding and high throughput.
4. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 51
ܲrepresents the number of extra columns that will be generated by the error correction code. Out
of these ܲcolumns, ܴ columns will be used toward reliability. Thus, ܲ െ ܴ columns will be
intentionally discarded and will not be included in the output. When the system is used for
encryption only, ܴ is set to zero. This means that an amount equal to the amount of added
redundancywill be deletedfrom the encoded block. However, what is deleted does not necessary
have to be part of the original block; it could be part of the added redundancy. This is determined
by the key.
PRNG is used to generate a random sequence that is added to the processed block. This
component is used to achieve the desired confusion. The selected generator will be initialized
with a secret key and an initialization vector (IV). Overall, the generator should be selected with
speed, efficiency, and security in mind.
3.2. Initialization
The initialization process is the same for encryption and decryption. In this process, the system
state is determined and the necessary components are initialized with the shared secret key. The
two main components are PRNG and a number of random permutation arrays.
The PRNGisused to generate random sequences ݍ݁ܵݎ that will be mixed with the encoded block.
The initialization process is dependent on the generator in use. Generally, this process ismade
sensitive to key changes such that small changes in the key will be reflected in the generator
output. It is also necessary to use a different initialization vector (IV) every time the PRNG is
initialized. This is a measure taken to make sure that no relationships can be deduced from
ciphertexts encrypted with same key at different sessions.
The random permutation arrays have two purposes. They are used to shuffle or arrange bits
within a block and identify the columns that will be deleted from the encoded block. For these
purposes three random permutations are required:
1. ܲ1: is a bit permutation that will enable permuting bits within a block of sizeݎ ൈ ܿ.
2. ܲ2: is another bit permutation that will enable permuting bits within a block of sizeݎ ൈ ሺܿ
ܴሻ.
3. ܲ3: is a column permutation that will specify the order ofܿ ܲ columns within a block.
We propose using a modified version ofthe RC4 key scheduling algorithm to derive these
permutations. We are not restricted to this specific algorithm; any other algorithm maybe used as
1 procedure permutations-initialization(key,KeyLen,c,r,P,R)
2 forifrom 0 to (r*c)-1
3 P1[i] ←←←←i
4 enfor
5 forifrom 0 to (r*(c+R))-1
6 P2[i] ←←←←i
7 enfor
8 forifrom 0 to c+P-1
9 P3 [i] ←←←←i
10 enfor
11 j ←←←← 0
12 forifrom 0 to (r*(c+R))-1
13 j ←←←←(j+Key[i mod KeyLen]+P1[i mod(r*c)])mod (r*c)
14 SWAP(P1[imod (r*c)], P1[j])
15 j ←←←←(j+Key[i mod KeyLen]+P2[i])
16 SWAP(P2[i] , P2[j])
17 j ←←←←(j+Key[i mod KeyLen]+P3[i mod c+P])modc+P
18 SWAP(P3[imodc+P], P3 [j])
19 enfor
20 return (P1,P2,P3)
FIGURE 1: Permutation Generation Pseudo Code.
5. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 52
long as it can achieve the desired results and it is sensitive to small changes in the key. In other
words, two keys that differ in a very small number of bits will produce two completely different
sets of random permutation arrays. Furthermore, the algorithm must not be known to have any
structural weaknesses that could be used later to attack the system.
To generate these arrays, we start by filling each one of them with the identity permutation and
then permute them according to a key in the same way RC4 uses its key to setup its internal
state. Specifically, weuse two indices and loop over all positionsand, at each iteration, swap the
contents pointed by these two indices. One of these indices is incremented as a counter, while
the other is incrementedrandomly using the key. To generate multiple permutation arrays, we
chain them together instead of generating each one independently from the other as describe in
Figure 1.
3.3. Encryption
As mentioned earlier the main idea of encryption is the partial deletion of the encoded block.
However, the deletion by itself is not enough to achieve the two properties identified by Shannon
[9]: diffusion and confusion. For that purpose we use dynamic permutations combined with
randomization. The encryption process is described in Figure 2.
To encrypt, start by permuting the bits of the input block ܤ using the permutation array ܲ1.
Figure 3 illustrates how a permutation array is applied to a small input block of size 3 ൈ 3.
ܵ ൌ ܤܲ1
Then, encode the permuted block ܵ using the agreed on ԧ. The encoding process will generate ܲ
parity columns, thus extending the size of the output block ܶtoݎ ൈ ሺܿ ܲሻ:
ܶ ൌ ԧሺܵሻ
Next, the encoded block ܶ is randomized by XORing it with the random sequence ݍ݁ܵݎ from
PRNG. The block in this step is processed row by row to make the maximum continuous
sequence available from the PRNG after deletion is no more than ܿ െ ܲ bits.
ܷ ൌ ܶ۩ݍ݁ܵݎ
FIGURE 2: Encryption.
Pre-permution
Encode
Delete
Post-permution
Block B
i
Ciphertext C
i
P1
i
P3
i
P2
i
S
i
V
i
T
i
U
i
rSeq
i
PRNG
Updatepermutation
6. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 53
Data Block
D
Permutation Array
M
Permuted Block
D`
D0 D3 D6
D1 D4 D7
D2 D5 D8
5 7 2
1 8 0
6 4 3
D5 D7 D2
D1 D8 D0
D6 D4 D3
D’= D M
*
ሾ0ܦ 1ܦ 2ܦ 3ܦ 4ܦ 5ܦ 6ܦ 7ܦ 8ܦ ሿ
ۏ
ێ
ێ
ێ
ێ
ێ
ێ
ێ
ۍ
0 0 0 0 0 0 0 1 0
0 1 0 0 0 0 0 0 0
0 0 0 0 0 0 1 0 0
0 0 0 0 0 0 0 0 1
0 0 0 0 0 1 0 0 0
1 0 0 0 0 0 0 0 0
0 0 1 0 0 0 0 0 0
0 0 0 1 0 0 0 0 0
0 0 0 0 1 0 0 0 0ے
ۑ
ۑ
ۑ
ۑ
ۑ
ۑ
ۑ
ې
= ሾ5ܦ 1ܦ 6ܦ 7ܦ 8ܦ 4ܦ 2ܦ 0ܦ 3ܦሿ
FIGURE 3: Permutation Example.
This is followed by the delete step whereܲ out of the ܿ ܲ columns are selected and removed
from the randomized block. The selection is determined using ܲ3. The first ܲ entries of ܲ3specify
the ids of the columns that will be removed. Figure 4 illustrates this step. It shows the deletion of
two columns from a 3 ൈ 4data block using a permutation array.
ܸ ൌ ܷܲ3
The objective of performing the XOR operation after encoding and before deletion is to increase
the complexity of the PRNG cryptanalysis. In this case, part of the generator output will be
deleted and there is no way to recover what is deleted especially when is not protected by the
correction code. Thus, an attacker will not have a continuous output sequence from the PRNG.
Therefore, he will not have reliable knowledge as a basis for his cryptanalysis.
Data Block
D
Column Permutation
M
Block After Deletion
D`
D0 D3 D6 D9
D1 D4 D7 D10
D2 D5 D8 D11
3 1 0 2
2 columns to
delete
D0 D6
D1 D7
D2 D8
D`= D M
*
ൌ ሾ0ܦ 1ܦ 2ܦ 3ܦ 4ܦ 5ܦ 6ܦ 7ܦ 8ܦ 9ܦ 01ܦ 11ܦሿ
ۏ
ێ
ێ
ێ
ێ
ێ
ێ
ێ
ێ
ێ
ێ
ۍ
1 0 0 0 0 0 0 0 0
0 1 0 0 0 0 0 0 0
0 0 1 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0
0 0 0 1 0 0 0 0 0
0 0 0 0 1 0 0 0 0
0 0 0 0 0 1 0 0 0
0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0ے
ۑ
ۑ
ۑ
ۑ
ۑ
ۑ
ۑ
ۑ
ۑ
ۑ
ې
ൌ ሾ0ܦ 1ܦ 2ܦ 6ܦ 7ܦ 8ܦሿ
FIGURE 4: Delete Step Illustration.
7. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 54
Finally, generate the ciphertextܥ by performing another bit permutation:
ܥ ൌ ܸܲ2
At the end of processing each block, a new set of permutation is generated. This new set allows
different columns to be deleted as well as different bit permutations to be performed every time a
block is encrypted. The new set is derived from the existing set using the encryption key. For that
purpose, a slightly modified version of the permutation generation algorithm is used. In this
version, start with the existing permutations and loop over the key bytes rather than the array
entries. This means that, for those arrays with a number of entries more than the number of bytes
in the key, common or fixed entries may be found in the initial set and the derived one. However,
that should not affect the security of the system as a whole since the key and the initial and
derived permutations are all kept secret. The update permutation algorithm is described in
Figure 5.
FIGURE 5: Update Permutations Pseudo Code.
3.4. Decryption
The success of the decryption is based on theability to identify the exact positions of the deleted
data for the decoding algorithm. It is not necessary to decrypt previous blocks successfully.
However, it is necessary to be synchronized with the encryption process to maintain the right
system state in terms of the permutation arrays and the PRNG state. The decryption process is
described in Figure 6.
To decrypt, start by reversing the post-permutation:
ܸ ൌ ܥܲ2
்
Then, identify deleted columns using ܲ3 and rearrange them into their proper order. This step will
expand the block to include the deleted columns. This is an important step for successful
decryption for a number of reasons:(1) to ensure that the XORing with the random sequence is
performed correctly and (2)because the order of symbols is as important as the value of symbols
to decoding.
ܷ
ᇱ
ൌ ܸܲ3
்
Once the columns are put in order, the data can be extracted by adding ݍ݁ܵݎ:
ܶ
ᇱ
ൌ ܷ
ᇱ
۩ݍ݁ܵݎ
Next, reconstruct the ܲ deleted columns using the decoding algorithm of ԧ:
ܵ ൌ ԧିଵ
ሺܶ
ᇱ
ሻ
1 procedure Update-Permutations(key,KeyLen,c,r,P,R,P1,P2,P3)
2 j=0
3 forkfrom 0 to keyLen-1
4 j ←←←← (j+Key[k]+P1[k])modc+P
5 SWAP(P1[k], P1[j])
6 j ←←←← (j+Key[k]+P2[k]) mod r*(c+R)
7 SWAP(P2[k] , P2[j])
8 j ←←←← (j+Key[k]+P3[kmod r])modc+P
9 SWAP(P3[kmodc+P], P3 [j])
10 endfor
11 return(P1,P2,P3)
8. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 55
Finally, recover the plaintextܤ by reversing the bit permutation:
ܤ ൌ ܵܲ1
்
As in encryption, after processing a block, a new set of permutation arrays are generated. They
are derived from the existing one using the algorithm described in Figure 3. The permutation
update function in decryption must be identical to the one in theencryption ifupcoming blocksare
to be decrypted successfully.
4. JOINT SECURITY AND RELIABILITY
Joint securityand reliability allows us to perform encryption and error control simultaneously in a
single process. This process is an extension ofencryption where the number of deleted columns
is less than the number of added parity. In this scenario, when determining ܲ one needs to
consider how many columns will be deleted and how many will be added for error control
purposes.
The number of deleted columns is set with the amount of securitythat is required in mind. The
more columns deleted the more complex the attacks on the system get, and the more columns
need to be reconstructed. Generally, the decoding process is more expensive than the encoding
one,which means the more columns recovered the more delay one may expect. Overall, the
number of columns deleted should not affect the system performanceand, at the same time,
should achieve the desired security level.
As to those columns added for error control, one needs to determine what type of error control is
required: error detection vs. error correction. This will be determined by application needs and
thecommunication channel. Based on the channel, the type and number of errors expected may
beidentified. Consequently, ܴ is determined suitably. In case ܴ is set to be equal to ܲ, then no
columns will be removed and the securityof the data will be maintained only by the randomization
and permutations.
P2
i
P3
i
P1
i
V
i
S
i
U`
i
T`
i
rSeq
i
Updatepermutation
Post-permution
-1
IdentifyDeleted
Decode
Pre-permution
-1
Ciphertext C
i
Block B
i
PRNG
FIGURE 6: Decryption.
9. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 56
Once the system parameters are determined, the initialization process can be followed as in
Section 3.2. In this process the key is used to set up the system by initializing the PRNG and
deriving the random permutations. Upon successful initialization the blocks can be processed,
essentially, as in the encryption case(Figure 2). First, the bits of ܤ are permuted within the whole
block. Then, the permuted block is encoded by ԧ where ܲ extra columns are generated. Next, the
encoded block is XORedwith a random sequence generated from the PRNG. This is followed by
the deletion step where the encryption and the joint functions differ. In this case, ܲ െ ܴ columns
are deleted using ܲ3 where the first ܲ െ ܴentries determine the ids of those columns. Finally,
coded ciphertext is generated by permuting the bits within the whole block where the masked
parity and data bits are mixed together. The encoded ciphertext ܥ is expressed as follows:
ܥ ൌ ൫ԧ൫ܤܲ1 ൯ ۩ ݍ݁ܵݎ൯ܲ3 ܲ2
Error control can only be performed by those who possess the key. To be able to at least detect
channel errors, the permutation and XOR steps must be reversed first before applying the
decoding process. Those two operations—although performed on data as well as parity bits—do
not propagate errors when they occur.
To decrypt an encoded ciphertext ܥ, proceed as in Figure 6. First, the bit permutation is
reversed. Then, the deleted columns are identified and the remaining ones are rearranged in their
proper order with the use of ܲ3. Next, the random sequence is extracted by XORing it back with
the block. The decoding algorithm is then applied to recover the deleted columns and detect or
correct communication errors. Communication errors can only be handled if they are within the
capability of the correction code. Finally, the bit permutation is reversed to obtain the plaintext
block ܤ back.
ܤ ൌ ԧିଵሺܥܲ2
்
ܲ3
்
۩ ݍ݁ܵݎሻ ܲ1
்
4.1. Data Reliability
Data reliability, where no security measures are required, is achieved through the use of forward
correction codes. These codes are used to detect errors, correct errors, or correct erasures. The
exact functionality is determined by the application and communication channel. These two
factors also determine the number of parity added to the data. In this case, ܴ is set to be equal to
ܲand only the correction code is used without the other operations.
For reliable communication, data is encoded using the agreed on error correction code. The
encoding process generates ܲ parity columns. Then, the data along with the parity are sent to the
destination. At the other end, the decoding algorithm is executed to detect errors and if possible
correct them, or, in case of erasures, if they are identified, they are corrected in orderto recover
the original data.
5. ANALYSIS
This section provides an assessment of the proposed scheme in terms of security, randomness,
and highlights the system performance. In terms of the correction capability, the analysis is the
same as the analysis applied to the error correction code as no modification is applied on the
code itself. However, when considering the correction capabilities of the code with respect to
communication errors, one needs to consider the amount of redundancy assigned to the reliability
rather than the amount of redundancy generated from the code.
5.1. Security
The security of the system depends on how hard it is to find the encryption key. CSEEC key is
used in two ways: to initialize the PRNG and to derive the random permutations. Extracting the
key from the random permutation is a very challenging task for a number of reasons. First, these
permutations are kept secret. Second, the permutations are updated every time a block is
10. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 57
processed, which means there will not be enough blocks that use the same permutations for
analysis. Third, the randomization and deletion add an extra burden on the process of extracting
the key. Thus, extracting the key from the PRNG output sequence isa more applicable approach
in determiningthe key.
For known PRNGs, there are a set of attacks that can be applied to determine the key used to
initialize the PRNG state. However, any attack can only be applied on reliable knowledge of the
output sequence, which is not the case here. All the PRNG sequences used to encrypt any
ciphertext are randomly permuted and partially deleted. Thus, before applying any attack, the
effect of the random permutation and deletion need to be reversed first to be able to identify the
PRNG sequence. These operations are guided by the unknown key that we want to find and the
only way to reverse these operations is by trying every possibilityin which these operations can
be performed.
For known plaintext attacks, the number of possible PRNG sequences used in randomizing a
single block is determined by the number of possible pre-permutations, post-permutations,
number of ways to select deleted columns, andthe values ofthe deleted columns. These
possibilities are determined as follows:
• The number of permutations that result in unique sequences is determined by the
number of ones or zeros in a sequence, and that number is maximal when the sequence
is balanced. Thus, the maximum number of possible pre-permutations is ቀ
ݎ ൈ ܿ
ݎ ൈ ܿ 2⁄ ቁ and
post-permutations is ൬
ݎ ൈ ሺܿ ܴሻ
ݎ ൈ ሺܿ ܴሻ 2⁄
൰.
• The number of possible ways to select P-R columns from a block with ܿ ܲ columns is
ቀ
ܿ ܲ
ܲ െ ܴ
ቁ.
• The number of possible values that can be assigned toܲ െ ܴ deleted columns is 2כሺିோሻ
.
Using the above possibilities brings the number of possible sequences generated from the PRNG
for a single block to
ቀ
ݎ ൈ ܿ
ݎ ൈ ܿ 2⁄ ቁ כ ቀ
ܿ ܲ
ܲ െ ܴ
ቁ כ 2כሺିோሻ
כ ൬
ݎ ൈ ሺܿ ܴሻ
ݎ ൈ ሺܿ ܴሻ 2⁄
൰ 1
Fora chosen plaintext attack, the ability to customize a plaintext can reduce the number of
possible PRNG sequences. In this case, the effectof the pre-permutation can be eliminated by
setting the plaintext to all zeros or all ones. Thus, the number of possible PRNG sequences is
reduced to:
ቀ
ܿ ܲ
ܲ െ ܴ
ቁ כ 2כሺିோሻ
כ ൬
ݎ ൈ ሺܿ ܴሻ
ݎ ൈ ሺܿ ܴሻ 2⁄
൰ 2
Once the possible sequences are determined, then an attack is applied on each candidate
sequence until the right key is determined. However if the attack in consideration requires a long
sequence of size ܳthat expands multiple blocks, then the above enumeration is repeated for each
block until a sequence with the desired length is obtained.This sums up the total number of
possible candidates for known plaintext attacks to:
ቆቀ
ݎ ൈ ܿ
ݎ ൈ ܿ 2⁄ ቁ כ ቀ
ܿ ܲ
ܲ െ ܴ
ቁ כ 2כሺିோሻ
כ ൬
ݎ ൈ ሺܿ ܴሻ
ݎ ൈ ሺܿ ܴሻ 2⁄
൰ቇ
ೂ
ೝൈሺశೃሻ
3
11. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 58
And for chosen plaintext attacks to:
ቆቀ
ܿ ܲ
ܲ െ ܴ
ቁ כ 2כሺିோሻ
כ ൬
ݎ ൈ ሺܿ ܴሻ
ݎ ൈ ሺܿ ܴሻ 2⁄
൰ቇ
ೂ
ೝൈሺశೃሻ
4
The above formulas are used to express how much it takes just to prepare the data before
applying an attack. This is the amount by which the complexity of an attack is increased.
It is clear that the security of CSEEC depends on the security of the PRNG. The level of security
also depends on the combination of parameters. This dependence allowsusing less secure more
efficient PRNG without compromising the confidentiality of information. Therefore, when setting
these parameters one should consider the effect of these choices on the overall security of the
system and whether these choices result in reachingthe targeted security level.
If it is necessary to use the same key again, then a distinct initialization vector must be used for
every PRNG initialization process. This is a necessary condition to ensure the following:
ܥଵ۩ܥଶ ് ܥଵ
ᇱ
۩ܥଶ
ᇱ
where ܥଵ, ܥଶ, ܥଵ
ᇱ
and ܥଶ
ᇱ
are the ciphertexts that correspond to the following plaintexts ܤଵ, ܤଶ, ܤଵ
ᇱ
and
ܤଶ
ᇱ
respectively and the plaintexts satisfy the following:
ܤଵ۩ܤଶ ൌ ܤଵ
ᇱ
۩ܤଶ
ᇱ
5.2. Randomness
One of the criteria used to evaluate any cipher is the assessment of its suitability as a source of
randomness. A good cipher is a cipher that can be considered a true random number generator.
Randomness testing is used for that purpose. Such tests do not guarantee that the generator is
indeed random, however, the more tests the generator passes, the more confidence they give in
its randomness.
We used the National Institute of Standard and Technology (NIST) statistical test suite for random
number generators [17]. The suite consists of 15 core tests that are extended to 188 tests under
different parameter inputs [18].
For the purpose of evaluation, we selectedthe Reed-Solomon code with two stream ciphers as
random number generators, Grain-128 [19] and A5/1. Grain-128 is a 128-bit stream cipher
designed for highly restricted environments. A5/1 is a 64-bit stream cipher used in GSM
communications. The key setup process for A5/1 is extended to incorporate all the 128 key bits
used by CSEEC. Both of these selections have good statistical properties and are chosen for
their efficient hardware evaluations.
To evaluate the system against randomness, we developed two data sets. The first data set
evaluated the randomness of the ciphertexts. A sequence in this set wasthe result of
concatenating ciphertexts formed from encrypting random plaintexts and one random key
wasused per sequence. The second one evaluated the correlation between plaintexts and
ciphertexts. Each sequence in this set consisted of blocks formed from XORing a plaintext with
the corresponding ciphertext.One random key was used per sequence.
As for the system parameters, ݎwas set to 8, ܿ to 16 and ܲ to 3. We ranged ܴ from zero to ܲ for
each data set. A total of 16 samples were generated, each with300 sequences. Then, all the 188
tests were applied with the default parameters.
12. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 59
R 0 1 2 3
Ciphertext block Size 128 136 144 152
Sequence Length 1,048,576 1,048,696 1,048,608 1,048,648
Data Set 1 0/188 0/188 0/188 0/188
Data Set 2 0/188 0/188 0/188 0/188
TABLE 1: NIST Tests Result for Grain-128 and A5/1.
The results of the two generators were the same: all tests were passed. Table 1 shows the
number of failed tests for each data set and the range of values for ܴ. The results obviously
depend on the randomness of the PRNG in use. As expected, the randomness of CSEEC output
depends heavily on the randomness of the random number generator. However, the goal of these
tests is to examine the effect of the other operations: permutations and, specifically, deletion on
the output of the PRNG and whether these operations change the statistical properties of the
output sequence. Asthe results indicate, the permutations and deletion do not affect the
randomness of the PRNG in use.
5.3. Implementation
The scheme was implemented in software and hardware as a proof of concept. The goal of the
software implementation was to verify the correctness of the algorithm and to generate the data
for randomness testing. On the other hand, the goal of the hardware implementation was to
understand the complexity associated with each operation.
An RTL implementation was made for the described algorithm and Altera Quartus II was used to
simulate the design using a Stratix III device (EP35E50F780C2). The implementation generates 3
parity symbols using Reed-Solomon (RS) encoding for each block of size 8 ൈ 8. Thus, up to 3
columns can be deleted from a block. The implementation results are shown in Table 2. The
numbers in this table do not include the area dedicated to the PRNG nor the error correction code
because it is assumed that a system that implements CSEEC will already have these two
functions implemented. The throughput of encryption is 96 Mbps and decryption is 95 Mbps.
Comparingthese numbers with other encryption schemes indicates that CSEEC has good
processing speed. However, comparing the joint functionality of CSEEC with encryption schemes
combined with error correction codes shows that CSEEC exceeds them since the time it takes to
process a block does not change whether the scheme is used for security or for joint security and
reliability. On the other hand, when any encryption scheme is combined with error correction code
then the time to process a block isincreased by the amount it take to encode or decode a block.
Operation Encryption Decryption
Frequency 53.75 MHz 79.28 MHz
Logic Utilization 14% 21%
Combinational ALUTs 3,964 6,279
TABLE 2: Hardware Implementation Results.
6. CONCLUSION AND FUTURE WORK
A novel systemthat provides data reliability and security using FEC is proposed. The user is given
the option to choose both or either services depending on his/her needs. Data security is
achieved through a new encryption scheme based on intentional deletion. Joint securityand
reliability is achieved through the extension of the encryption scheme by intentionally deleting an
amount less than the amount of added redundancy.
The system was implemented withthe Reed-Solomon code and two possible PRNGs, Grain-128
and A5/1. The system design is general enough that it can use any forward error correction code
13. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 60
and any PRNG. Thus, users have the ability to use existing implementations with minimum
additional operations. It is shown that the system security depends on the strength of the
combination of its components, not on the individual security of each one of them. Moreover, the
randomness of the PRNG is preserved and reflected in the system output. Also the
implementations show the applicability and superiority of the scheme.
Currently, the hardware implementation is being optimized and possible enhancements to the
algorithm are being investigated. It is expected that processing speed can be further enhanced.
7. REFERENCES
[1] O. Adamo and M. R. Varanasi, “Hardware based encryption for wireless networks,”
presented at the Military Communication Conference, 2010, pp. 1800–1805.
[2] R. J. McEliece, “A Public-Key Cryptosystem Based On Algebraic Coding Theory,” Deep
Space Network Progress Report, vol. 44, pp. 114–116, Jan. 1978.
[3] S. Nair, E. Celikel, and M. Marchetti, “Adaptive Security and Reliability using Linear Erasure
Correction Codes,” in Proceedings of 7th International Business Information Management
Conference, Brescia, Italy, 2006.
[4] J. Tian, Y. Dai, and Z. Yang, “SEC: A practical secure erasure coding scheme for peer-to-
peer storage system,” 14th Symposium on Storage System and Technology, pp. 210–222,
2006.
[5] C. H. Mathur, “A Mathematical Framework for Combining Error Correction and Encryption,”
Ph.D. Dissertation, Stevens Institute of Technology, Hoboken, NJ, USA, 2007.
[6] R. Ma, L. Xing, and H. E. Michel, “Fault-Intrusion Tolerant Techniques in Wireless Sensor
Networks,” in 2nd IEEE International Symposium on Dependable, Autonomic and Secure
Computing, 2006, pp. 85 –94.
[7] W. Godoy Jr and D. Pereira Jr, “A proposal of a cryptography algorithm with techniques of
error correction,” Computer Communications, vol. 20, no. 15, pp. 1374–1380, 1997.
[8] T. Hwang and T. R. N. Rao, “Secret error-correcting codes (SECC),” in Proceedings on
Advances in cryptology, New York, NY, USA, 1988, pp. 540–563.
[9] C. E. Shannon, “Communication Theory of Secrecy Systems,” Bell Systems Technical
Journal, vol. 28, pp. 656–715, 1949.
[10] C. E. Shannon, “A mathematical theory of communication,” Bell Systems Technical Journal,
vol. 27, pp. 379–423, 1948.
[11] O. Adamo, E. Ayeh, and M. Varanasi, “Joint encryption error correction and modulation
(JEEM) scheme,” in 2012 IEEE International Workshop Technical Committee on
Communications Quality and Reliability (CQR), 2012, pp. 1–5.
[12] T. A. Berson, “Failure of the McEliece Public-Key Cryptosystem Under Message-Resend
and Related-Message Attack,” in Proceedings of the 17th Annual International Cryptology
Conference on Advances in Cryptology, London, UK, 1997, pp. 213–220.
14. RanyaAlawadhi & Suku Nair
International Journal of Computer Science and Security (IJCSS), Volume (7) : Issue (2) : 2013 61
[13] L. Xu, “A general encryption scheme based on MDS code,” in Information Theory, 2003.
Proceedings. IEEE International Symposium on, 2003, p. 19.
[14] W. Chang, B. Fang, X. Yun, S. Wang, and X. Yu, “Randomness Testing of Compressed
Data,” Journal of Computing, vol. 2, no. 1, Jan. 2010.
[15] Q. Chai and G. Gong, “Differential Cryptanalysis of Two Joint Encryption and Error
Correction Schemes,” in 2011 IEEE Global Telecommunications Conference (GLOBECOM
2011), 2011, pp. 1 –6.
[16] Z. Alkhalifa, “Application and system layer techniques for hardware fault tolerance,” Ph.D.
Dissertation, Southern Methodist University, Dallas, TX, USA, 1999.
[17] “NIST.gov - Computer Security Division - Computer Security Resource Center.” [Online].
Available: http://csrc.nist.gov/groups/ST/toolkit/rng/index.html.
[18] A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Aandel, D.
Banks, A. Heckert, J. Dray, and S. Vo, “A Statistical Test Suite for Random and
Pseudorandom Number Generators for Cryptographic Applications,” National Institute of
Standards and Technology, Apr. 2010.
[19] M. Hell, T. Johansson, A. Maximov, and W. Meier, “The Grain Family of Stream Ciphers,” in
New stream cipher designs the eSTREAM finalists, vol. 4986, Berlin; New York: Springer,
2008, pp. 179–190.