75,362 research outputs found

    Personal Data Security: Divergent Standards in the European Union and the United States

    Get PDF
    This Note argues that the U.S. Government should discontinue all attempts to establish EES as the de facto encryption standard in the United States because the economic disadvantages associated with widespread implementation of EES outweigh the advantages this advanced data security system provides. Part I discusses the EU\u27s legislative efforts to ensure personal data security and analyzes the evolution of encryption technology in the United States. Part II examines the methods employed by the U.S. Government to establish EES as the de facto U.S. encryption standard. Part III argues that the U.S. Government should terminate its effort to establish EES as the de facto U.S. encryption standard and institute an alternative standard that ensures continued U.S. participation in the international marketplace

    Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits

    Full text link
    Position scrambling (permutation) is widely used in multimedia encryption schemes and some international encryption standards, such as the Data Encryption Standard and the Advanced Encryption Standard. In this article, the authors re-evaluate the security of a typical image-scrambling encryption algorithm (ISEA). Using the internal correlation remaining in the cipher image, they disclose important visual information of the corresponding plain image in a ciphertext-only attack scenario. Furthermore, they found that the real scrambling domain--the position-scrambling scope of ISEA's scrambled elements--can be used to support an efficient known or chosen-plaintext attack on it. Detailed experimental results have verified these points and demonstrate that some advanced multimedia processing techniques can facilitate the cryptanalysis of multimedia encryption algorithms.Comment: 7 page

    Implementasi Metode Kriptografi Advanced Encryption Standard (AES) untuk Proteksi Pesan Audio

    Get PDF
    This study is to solve the problem Cryptographic techniques used to protect and maintain the confidentiality of audio messages by changing audio messages into audio messages that cannot be played by doing the encryption process and can be played back after the audio message is decrypted. To protect audio messages, it is used in the process of encrypting and decrypting audio messages using the Advanced Encryption Standard (AES) method. The Advanced Encryption Standard (AES) uses symmetric key block passwords with varying key sizes of 128 bits, 192 bits, and 256 bits. The Advanced Encryption Standard (AES) method used is 128 bit key size and there are 10 rounds in the process of encryption and decryption. Audio messages that have been encrypted using the Advanced Encryption Standard (AES) method cannot be played by parties who do not know the key to encrypt and decrypt the audio message. Audio messages are protected and protected from irresponsible parties who want to damage or just listen to the audio message

    AES-CBC Software Execution Optimization

    Full text link
    With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process. This paper investigates the performance and efficiency of IEEE 802.11i approved Advanced Encryption Standard (AES)-Rijndael ciphering/deciphering software in Cipher Block Chaining (CBC) mode. Simulations are used to analyse the speed, resource consumption and robustness of AES-CBC to investigate its viability for image encryption usage on common low power devices. The detailed results presented in this paper provide a basis for performance estimation of AES cryptosystems implemented on wireless devices. The use of optimized AES-CBC software implementation gives a superior encryption speed performance by 12 - 30%, but at the cost of twice more memory for code size.Comment: 8 pages, IEEE 200

    PERANCANGAN PROGRAM APLIKASI AUDIO STEGANOGRAFI DENGAN MENGGUNAKAN METODE KRIPTOGRAFI RIJNDAEL ADVANCED ENCRYPTION STANDARD

    Get PDF
    PERANCANGAN PROGRAM APLIKASI AUDIO STEGANOGRAFI DENGAN MENGGUNAKAN METODE KRIPTOGRAFI RIJNDAEL ADVANCED ENCRYPTION STANDARD - Steganography, Rijndael, Advanced Encryption Standard (AES), Symmetric Cryptography, Cryptography, Least Significant Bit (LSB

    FPGA Implementation of Advanced Encryption Standard

    Get PDF
    Security is a crucial parameter to be recognized with the improvement of electronic communication. Today most research in the field of electronic communication includes look into on security concern of communication. At present most by and large consumed and recognized standard for encryption of data is the Advanced Encryption Standard. AES was transformed to supplant the developing Data Encryption Standard. The AES calculation is fit for handling cryptographic keys which are of 256, 128, & 192 bits to encode & unscramble data in squares of 128 bits. The center of the calculation is made up of four key parts, which manage 8 bit data pieces. The whole 128 bit data to the calculation is dealt with into a 4 x 4 grid termed a state, to obtain the 8 bit square. Considering the complex nature of advance encryption standard (AES) algorithm, it requires a huge amount of hardware resources for its practical implementation. The extreme amount of hardware requirement makes its hardware implementation very burdensome. During this research, a FPGA scheme is introduced which is highly efficient in terms of resource utilization. In this scheme implementation of AES algorithm is done as a finite state machine (FSM). VHDL is used as a programming language for the purpose of design. Data path and control unit are designed for both cipher and decipher block, after that respective data path and control unit are integrated using structural modeling style of VHDL. Xilinx_ISE_14.2 software is being used for the purpose of simulating and optimizing the synthesizable VHDL code. The working of the implemented algorithm is tested using VHDL test bench wave form of Xilinx ISE simulator and resource utilization is also presented for a targeted Spartan3e XC3s500e FPGA
    corecore