Search results

1 – 10 of 506
Article
Publication date: 8 April 2022

Jai Gopal Pandey, Sanskriti Gupta and Abhijit Karmakar

The paper aims to develop a systematic approach to design, integrate, and implement a set of crypto cores in a system-on-chip SoC) environment for data security applications. The…

Abstract

Purpose

The paper aims to develop a systematic approach to design, integrate, and implement a set of crypto cores in a system-on-chip SoC) environment for data security applications. The advanced encryption standard (AES) and PRESENT block ciphers are deployed together, leading to a common crypto chip for performing encryption and decryption operations.

Design/methodology/approach

An integrated very large-scale integration (VLSI) architecture and its implementation for the AES and PRESENT ciphers is proposed. As per the choice, the architecture performs encryption or decryption operations for the selected cipher. Experimental results of the field-programmable gate array (FPGA) and application-specific integrated circuit (ASIC) implementations and related design analysis are provided.

Findings

FPGA implementation of the architecture on Xilinx xc5vfx70t-1-ff1136 device consumes 19% slices, whereas the ASIC design is implemented in 180 nm complementary metal-oxide semiconductor ASIC technology that takes 1.0746 mm2 of standard cell area and consumes 14.26 mW of power at 50 MHz clock frequency. A secure audio application using the designed architecture on an open source SoC environment is also provided. A test methodology for validation of the designed chip using an FPGA-based platform and tools is discussed.

Originality/value

The proposed architecture is compared with a set of existing hardware architectures for analyzing various design metrics such as latency, area, maximum operating frequency, power, and throughput.

Details

Microelectronics International, vol. 39 no. 2
Type: Research Article
ISSN: 1356-5362

Keywords

Open Access
Article
Publication date: 4 May 2018

C.G. Thorat and V.S. Inamdar

Embedded systems, Internet of Things (IoT) and mobile computing devices are used in various domains which include public-private infrastructure, industrial installation and…

1019

Abstract

Embedded systems, Internet of Things (IoT) and mobile computing devices are used in various domains which include public-private infrastructure, industrial installation and critical environment. Generally, information handled by these devices is private and critical. Therefore, it must be appropriately secured from different attacks and hackers. Lightweight cryptography is an aspiring field which investigates the implementation of cryptographic primitives and algorithms for resource constrained devices. In this paper, a new compact hybrid lightweight encryption technique has been proposed. Proposed technique uses the fastest bit permutation instruction PERMS with S-box of PRESENT block cipher for non-linearity. An arbitrary n-bit permutation is performed using PERMS instruction in less than log (n) number of instructions. This new hybrid system has been analyzed for software performance on Advanced RISC Machine (ARM) and Intel processor whereas Cadens tool is used to analyze the hardware performance. The result of the proposed technique is improved by the factor of eight as compared to the PRESENT-GRP hybrid block cipher. Moreover, PERMS instruction bit permutation properties result a very good avalanche effect and compact implementation in the both hardware and software environment.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 18 October 2011

Bhushan Kapoor, Pramod Pandya and Joseph S. Sherif

This paper seeks to advance research and strategies that lead to a heightened awareness of the need to protect data from disclosure, to guarantee the authenticity of data and…

3357

Abstract

Purpose

This paper seeks to advance research and strategies that lead to a heightened awareness of the need to protect data from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network‐based attacks.

Design/methodology/approach

The paper introduces the necessary mathematics of cryptography: integer and modular arithmetic, linear congruence, Euclidean and extended Euclidean algorithm, Fermat's theorem, and Elliptic curve.

Findings

The results indicate that encryption has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs, and secure computation.

Practical implications

The results of this research show that all forms of e‐commerce activities such as online credit card processing, purchasing stocks, and banking data processing, if compromised, would lead to businesses losing billions of dollars in lost revenues as well as losing confidence in e‐commerce. In the last few years, it had been reported that organizations that store and maintain customers' private and confidential records were compromised on many occasions by hackers breaking into the data networks and stealing the records from the storage media.

Originality/value

This paper tackles one of the most critical problems of securing data networks. Security problems arise among other things to resource and workload sharing; complexity of interconnected networks; authentication of users; fast expandability of networks; threats to networks such as wiretapping and violations of the seven pillars of security: authentication, authorization, privacy, integrity, non‐repudiation, availability, and audit.

Article
Publication date: 1 February 1968

P.J. GALLAGHER

Woodstock Agricultural Research Centre, operated by ‘Shell’ Research Ltd, is one of a number of Shell Company laboratories working in the agricultural chemicals field. One of the…

Abstract

Woodstock Agricultural Research Centre, operated by ‘Shell’ Research Ltd, is one of a number of Shell Company laboratories working in the agricultural chemicals field. One of the main functions of Woodstock is the synthesis of new chemical compounds for testing as potential new pesticides and over twenty thousand compounds have already been screened there since the laboratory was set up. A similar number of compounds have been examined at other Shell laboratories so that both chemical and biological data on nearly fifty thousand compounds are now available and are being augmented at a rate of around four thousand each year.

Details

Aslib Proceedings, vol. 20 no. 2
Type: Research Article
ISSN: 0001-253X

Article
Publication date: 26 October 2012

Li Shouwei and Mei Qiang

This paper attempts to construct a public‐key coding system using grey generation and braid group.

Abstract

Purpose

This paper attempts to construct a public‐key coding system using grey generation and braid group.

Design/methodology/approach

The identification (ID) codes of both sides for communication are public for everyone and considered as public keys. Starting from the ID code of both sides of communication, the temporary secret key of communication can be obtained by the grey 1‐AGO algorithm first. Then the new formal common secret key can be obtained by using the element exchangeability of the braid group during the exchanging process of the temporary secret key between two sides of communication. The paper presents an exchange protocol of secret key based on grey data generation and braid group. It also constructs a cipher communication system by using Hash function based on the exchange protocol of secret key last.

Findings

The exchange protocol of secret key and the system of cipher communication which are proposed in this paper make use of the difficult problem of resolving disper se logarithm from generated code to ID code and the conjugate problem which is not ever resolved in braid group, which can ensure the security of the algorithm theoretically.

Practical implications

The main steps of the exchange protocol and cipher communication system in this paper can be achieved through a computer program. They can be used in many communication processes on the internet.

Originality/value

The paper succeeds in realising both secret key generation and exchanging protocol of communication by using grey systems theory and braid group properties.

Details

Grey Systems: Theory and Application, vol. 2 no. 3
Type: Research Article
ISSN: 2043-9377

Keywords

Article
Publication date: 1 January 1949

G. MALCOLM DYSON

There is a wide range of opinion as to the purpose for which chemical abstracts are prepared, varying from the view that they should be little more than a record of the title…

Abstract

There is a wide range of opinion as to the purpose for which chemical abstracts are prepared, varying from the view that they should be little more than a record of the title, author and reference, to that which vaguely hopes that they will contain ‘everything of importance’ from the original communication, and in some way, thereby, save the reader the trouble of consulting that original. There is an element of justification for both views, and it is of value to define the purpose of the chemical abstract in some detail.

Details

Aslib Proceedings, vol. 1 no. 1
Type: Research Article
ISSN: 0001-253X

Book part
Publication date: 19 January 2024

Adem Yavuz Elveren

The goal of this chapter is to reexamine the nature and structure of the military–industrial complex (MIC) through the works of John Kenneth Galbraith. MIC, or military power as…

Abstract

The goal of this chapter is to reexamine the nature and structure of the military–industrial complex (MIC) through the works of John Kenneth Galbraith. MIC, or military power as he prefers, is a coalition of vested interests within the state and industry that promoted the military power in the name of “national security” for their interests. Galbraith’s theory of giant corporations helps us understand the role of military corporations in the MIC. Moreover, he is a critical scholar in examining this topic because he was a political insider in the Roosevelt, Kennedy, and Johnson administrations and a prominent public intellectual against the Vietnam War. Against this background, this chapter has three parts. After explaining the development of military Keynesianism with respect to the main economic thoughts, it examines the history of the MIC and its impact on economic priorities during and after the Cold War through Galbraith’s works. Finally, this chapter discusses MIC’s relevancy today and evaluates Galbraith’s prophecies.

Details

Research in the History of Economic Thought and Methodology: Including a Symposium on John Kenneth Galbraith: Economic Structures and Policies for the Twenty-first Century
Type: Book
ISBN: 978-1-80455-931-4

Keywords

Article
Publication date: 5 October 2022

Mohan Naik R., H. Manoj T. Gadiyar, Sharath S. M., M. Bharathrajkumar and Sowmya T. K.

There are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in…

Abstract

Purpose

There are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.

Design/methodology/approach

This paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.

Findings

The results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.

Originality/value

The proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 29 September 2021

Zongda Wu, Shigen Shen, Huxiong Li, Haiping Zhou and Dongdong Zou

First, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the…

Abstract

Purpose

First, the authors analyze the key problems faced by the protection of digital library readers' data privacy and behavior privacy. Second, the authors introduce the characteristics of all kinds of existing approaches to privacy protection and their application limitations in the protection of readers' data privacy and behavior privacy. Lastly, the authors compare the advantages and disadvantages of each kind of existing approaches in terms of security, efficiency, accuracy and practicality and analyze the challenges faced by the protection of digital library reader privacy.

Design/methodology/approach

In this paper, the authors review a number of research achievements relevant to privacy protection and analyze and evaluate the application limitations of them in the reader privacy protection of a digital library, consequently, establishing the constraints that an ideal approach to library reader privacy protection should meet, so as to provide references for the follow-up research of the problem.

Findings

As a result, the authors conclude that an ideal approach to reader privacy protection should be able to comprehensively improve the security of all kinds of readers' privacy information on the untrusted server-side as a whole, under the premise of not changing the architecture, efficiency, accuracy and practicality of a digital library system.

Originality/value

Along with the rapid development of new network technologies, such as cloud computing, the server-side of a digital library is becoming more and more untrustworthy, thereby, posing a serious threat to the privacy of library readers. In fact, the problem of reader privacy has become one of the important obstacles to the further development and application of digital libraries.

Details

Library Hi Tech, vol. 40 no. 6
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 11 October 2011

Linden Dalecki

This paper is a companion piece to the short documentary Breakin' Away. The paper aims to touch on Texas b‐boy culture and tourism, the hip‐hop industry at large, book publishing…

Abstract

Purpose

This paper is a companion piece to the short documentary Breakin' Away. The paper aims to touch on Texas b‐boy culture and tourism, the hip‐hop industry at large, book publishing, intra‐industry media‐synergy, the Hollywood film industry and related aspects of pop culture.

Design/methodology/approach

Part ethnographic memoir, part confessional, part anecdotal how‐to, the article is written in the first person and fits within the tradition of autoethnography.

Findings

Given its autoethnographic focus, the paper follows several unique cases rather than attempting to abstract generalizable principles.

Originality/value

The paper provides an inside view of Texas b‐boy subculture and reveals specific aspects of the hip‐hop industry.

Details

International Journal of Culture, Tourism and Hospitality Research, vol. 5 no. 4
Type: Research Article
ISSN: 1750-6182

Keywords

1 – 10 of 506