34 research outputs found

    Theory and Practice of Cryptography and Network Security Protocols and Technologies

    Get PDF
    In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities

    Part I:

    Get PDF

    Space Programs Summary no. 37-38, volume IV FOR the period February 1, 1966 to March 31, 1966. Supporting research and advanced development

    Get PDF
    Supporting research in systems analysis, guidance and control, environmental simulation, space sciences, propulsion systems, and radio telecommunication

    Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography

    Get PDF
    The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue

    Tamper-Resistant Arithmetic for Public-Key Cryptography

    Get PDF
    Cryptographic hardware has found many uses in many ubiquitous and pervasive security devices with a small form factor, e.g. SIM cards, smart cards, electronic security tokens, and soon even RFIDs. With applications in banking, telecommunication, healthcare, e-commerce and entertainment, these devices use cryptography to provide security services like authentication, identification and confidentiality to the user. However, the widespread adoption of these devices into the mass market, and the lack of a physical security perimeter have increased the risk of theft, reverse engineering, and cloning. Despite the use of strong cryptographic algorithms, these devices often succumb to powerful side-channel attacks. These attacks provide a motivated third party with access to the inner workings of the device and therefore the opportunity to circumvent the protection of the cryptographic envelope. Apart from passive side-channel analysis, which has been the subject of intense research for over a decade, active tampering attacks like fault analysis have recently gained increased attention from the academic and industrial research community. In this dissertation we address the question of how to protect cryptographic devices against this kind of attacks. More specifically, we focus our attention on public key algorithms like elliptic curve cryptography and their underlying arithmetic structure. In our research we address challenges such as the cost of implementation, the level of protection, and the error model in an adversarial situation. The approaches that we investigated all apply concepts from coding theory, in particular the theory of cyclic codes. This seems intuitive, since both public key cryptography and cyclic codes share finite field arithmetic as a common foundation. The major contributions of our research are (a) a generalization of cyclic codes that allow embedding of finite fields into redundant rings under a ring homomorphism, (b) a new family of non-linear arithmetic residue codes with very high error detection probability, (c) a set of new low-cost arithmetic primitives for optimal extension field arithmetic based on robust codes, and (d) design techniques for tamper resilient finite state machines

    Amicable matrices and orthogonal designs

    Get PDF
    This thesis is mainly concerned with the orthogonal designs of Baumert-Hall array type, OD(4n;n,n,n,n) where n=2k, k is odd integer. For every odd prime power p^r, we construct an infinite class of amicable T-matrices of order n=p^r+1 in association with negacirculant weighing matrices W(n,n-1). In particular, for p^r≡1 (mod 4) we construct amicable T-matrices of order n≡2 (mod 4) and application of these matrices allows us to generate infinite class of orthogonal designs of type OD(4n;n,n,n,n) and OD(4n;n,n,n-2,n-2) where n=2k; k is odd integer. For a special class of T-matrices of order n where each of T_i is a weighing matrix of weight w_i;1 ≤i≤4 and Williamson-type matrices of order m, we establish a theorem which produces four circulant matrices in terms of four variables. These matrices are additive and can be used to generate a new class of orthogonal design of type OD(4mn;w_1s,w_2s,w_3s,w_4s ); where s=4m. In addition to this, we present some methods to find amicable matrices of odd order in terms of variables which have an interesting application to generate some new orthogonal designs as well as generalized orthogonal designs.University of Lethbridge, NSER
    corecore