Search results
1 – 10 of 506Jai Gopal Pandey, Sanskriti Gupta and Abhijit Karmakar
The paper aims to develop a systematic approach to design, integrate, and implement a set of crypto cores in a system-on-chip SoC) environment for data security applications. The…
Abstract
Purpose
The paper aims to develop a systematic approach to design, integrate, and implement a set of crypto cores in a system-on-chip SoC) environment for data security applications. The advanced encryption standard (AES) and PRESENT block ciphers are deployed together, leading to a common crypto chip for performing encryption and decryption operations.
Design/methodology/approach
An integrated very large-scale integration (VLSI) architecture and its implementation for the AES and PRESENT ciphers is proposed. As per the choice, the architecture performs encryption or decryption operations for the selected cipher. Experimental results of the field-programmable gate array (FPGA) and application-specific integrated circuit (ASIC) implementations and related design analysis are provided.
Findings
FPGA implementation of the architecture on Xilinx xc5vfx70t-1-ff1136 device consumes 19% slices, whereas the ASIC design is implemented in 180 nm complementary metal-oxide semiconductor ASIC technology that takes 1.0746 mm2 of standard cell area and consumes 14.26 mW of power at 50 MHz clock frequency. A secure audio application using the designed architecture on an open source SoC environment is also provided. A test methodology for validation of the designed chip using an FPGA-based platform and tools is discussed.
Originality/value
The proposed architecture is compared with a set of existing hardware architectures for analyzing various design metrics such as latency, area, maximum operating frequency, power, and throughput.
Details
Keywords
Embedded systems, Internet of Things (IoT) and mobile computing devices are used in various domains which include public-private infrastructure, industrial installation and…
Abstract
Embedded systems, Internet of Things (IoT) and mobile computing devices are used in various domains which include public-private infrastructure, industrial installation and critical environment. Generally, information handled by these devices is private and critical. Therefore, it must be appropriately secured from different attacks and hackers. Lightweight cryptography is an aspiring field which investigates the implementation of cryptographic primitives and algorithms for resource constrained devices. In this paper, a new compact hybrid lightweight encryption technique has been proposed. Proposed technique uses the fastest bit permutation instruction PERMS with S-box of PRESENT block cipher for non-linearity. An arbitrary n-bit permutation is performed using PERMS instruction in less than log (n) number of instructions. This new hybrid system has been analyzed for software performance on Advanced RISC Machine (ARM) and Intel processor whereas Cadens tool is used to analyze the hardware performance. The result of the proposed technique is improved by the factor of eight as compared to the PRESENT-GRP hybrid block cipher. Moreover, PERMS instruction bit permutation properties result a very good avalanche effect and compact implementation in the both hardware and software environment.
Details
Keywords
Bhushan Kapoor, Pramod Pandya and Joseph S. Sherif
This paper seeks to advance research and strategies that lead to a heightened awareness of the need to protect data from disclosure, to guarantee the authenticity of data and…
Abstract
Purpose
This paper seeks to advance research and strategies that lead to a heightened awareness of the need to protect data from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network‐based attacks.
Design/methodology/approach
The paper introduces the necessary mathematics of cryptography: integer and modular arithmetic, linear congruence, Euclidean and extended Euclidean algorithm, Fermat's theorem, and Elliptic curve.
Findings
The results indicate that encryption has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs, and secure computation.
Practical implications
The results of this research show that all forms of e‐commerce activities such as online credit card processing, purchasing stocks, and banking data processing, if compromised, would lead to businesses losing billions of dollars in lost revenues as well as losing confidence in e‐commerce. In the last few years, it had been reported that organizations that store and maintain customers' private and confidential records were compromised on many occasions by hackers breaking into the data networks and stealing the records from the storage media.
Originality/value
This paper tackles one of the most critical problems of securing data networks. Security problems arise among other things to resource and workload sharing; complexity of interconnected networks; authentication of users; fast expandability of networks; threats to networks such as wiretapping and violations of the seven pillars of security: authentication, authorization, privacy, integrity, non‐repudiation, availability, and audit.
Details
Keywords
Woodstock Agricultural Research Centre, operated by ‘Shell’ Research Ltd, is one of a number of Shell Company laboratories working in the agricultural chemicals field. One of the…
Abstract
Woodstock Agricultural Research Centre, operated by ‘Shell’ Research Ltd, is one of a number of Shell Company laboratories working in the agricultural chemicals field. One of the main functions of Woodstock is the synthesis of new chemical compounds for testing as potential new pesticides and over twenty thousand compounds have already been screened there since the laboratory was set up. A similar number of compounds have been examined at other Shell laboratories so that both chemical and biological data on nearly fifty thousand compounds are now available and are being augmented at a rate of around four thousand each year.
Li Shouwei and Mei Qiang
This paper attempts to construct a public‐key coding system using grey generation and braid group.
Abstract
Purpose
This paper attempts to construct a public‐key coding system using grey generation and braid group.
Design/methodology/approach
The identification (ID) codes of both sides for communication are public for everyone and considered as public keys. Starting from the ID code of both sides of communication, the temporary secret key of communication can be obtained by the grey 1‐AGO algorithm first. Then the new formal common secret key can be obtained by using the element exchangeability of the braid group during the exchanging process of the temporary secret key between two sides of communication. The paper presents an exchange protocol of secret key based on grey data generation and braid group. It also constructs a cipher communication system by using Hash function based on the exchange protocol of secret key last.
Findings
The exchange protocol of secret key and the system of cipher communication which are proposed in this paper make use of the difficult problem of resolving disper se logarithm from generated code to ID code and the conjugate problem which is not ever resolved in braid group, which can ensure the security of the algorithm theoretically.
Practical implications
The main steps of the exchange protocol and cipher communication system in this paper can be achieved through a computer program. They can be used in many communication processes on the internet.
Originality/value
The paper succeeds in realising both secret key generation and exchanging protocol of communication by using grey systems theory and braid group properties.
Details
Keywords
There is a wide range of opinion as to the purpose for which chemical abstracts are prepared, varying from the view that they should be little more than a record of the title…
Abstract
There is a wide range of opinion as to the purpose for which chemical abstracts are prepared, varying from the view that they should be little more than a record of the title, author and reference, to that which vaguely hopes that they will contain ‘everything of importance’ from the original communication, and in some way, thereby, save the reader the trouble of consulting that original. There is an element of justification for both views, and it is of value to define the purpose of the chemical abstract in some detail.
The goal of this chapter is to reexamine the nature and structure of the military–industrial complex (MIC) through the works of John Kenneth Galbraith. MIC, or military power as…
Abstract
The goal of this chapter is to reexamine the nature and structure of the military–industrial complex (MIC) through the works of John Kenneth Galbraith. MIC, or military power as he prefers, is a coalition of vested interests within the state and industry that promoted the military power in the name of “national security” for their interests. Galbraith’s theory of giant corporations helps us understand the role of military corporations in the MIC. Moreover, he is a critical scholar in examining this topic because he was a political insider in the Roosevelt, Kennedy, and Johnson administrations and a prominent public intellectual against the Vietnam War. Against this background, this chapter has three parts. After explaining the development of military Keynesianism with respect to the main economic thoughts, it examines the history of the MIC and its impact on economic priorities during and after the Cold War through Galbraith’s works. Finally, this chapter discusses MIC’s relevancy today and evaluates Galbraith’s prophecies.
Details
Keywords
Mohan Naik R., H. Manoj T. Gadiyar, Sharath S. M., M. Bharathrajkumar and Sowmya T. K.
There are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in…
Abstract
Purpose
There are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.
Design/methodology/approach
This paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.
Findings
The results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.
Originality/value
The proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.
Details
Keywords
Zongda Wu, Shigen Shen, Huxiong Li, Haiping Zhou and Dongdong Zou
First, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the…
Abstract
Purpose
First, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the characteristics of all kinds of existing approaches to privacy protection and their application limitations in the protection of readers' data privacy and behavior privacy. Lastly, the authors compare the advantages and disadvantages of each kind of existing approaches in terms of security, efficiency, accuracy and practicality and analyze the challenges faced by the protection of digital library reader privacy.
Design/methodology/approach
In this paper, the authors review a number of research achievements relevant to privacy protection and analyze and evaluate the application limitations of them in the reader privacy protection of a digital library, consequently, establishing the constraints that an ideal approach to library reader privacy protection should meet, so as to provide references for the follow-up research of the problem.
Findings
As a result, the authors conclude that an ideal approach to reader privacy protection should be able to comprehensively improve the security of all kinds of readers' privacy information on the untrusted server-side as a whole, under the premise of not changing the architecture, efficiency, accuracy and practicality of a digital library system.
Originality/value
Along with the rapid development of new network technologies, such as cloud computing, the server-side of a digital library is becoming more and more untrustworthy, thereby, posing a serious threat to the privacy of library readers. In fact, the problem of reader privacy has become one of the important obstacles to the further development and application of digital libraries.
Details
Keywords
This paper is a companion piece to the short documentary Breakin' Away. The paper aims to touch on Texas b‐boy culture and tourism, the hip‐hop industry at large, book publishing…
Abstract
Purpose
This paper is a companion piece to the short documentary Breakin' Away. The paper aims to touch on Texas b‐boy culture and tourism, the hip‐hop industry at large, book publishing, intra‐industry media‐synergy, the Hollywood film industry and related aspects of pop culture.
Design/methodology/approach
Part ethnographic memoir, part confessional, part anecdotal how‐to, the article is written in the first person and fits within the tradition of autoethnography.
Findings
Given its autoethnographic focus, the paper follows several unique cases rather than attempting to abstract generalizable principles.
Originality/value
The paper provides an inside view of Texas b‐boy subculture and reveals specific aspects of the hip‐hop industry.
Details