371 research outputs found
Public key cryptosystems : theory, application and implementation
The determination of an individual's right to privacy is mainly a nontechnical matter, but the pragmatics of providing it is the central concern of the cryptographer. This thesis has sought answers to some of the outstanding issues in cryptography. In particular, some of the theoretical, application and implementation problems associated with a Public Key Cryptosystem (PKC).The Trapdoor Knapsack (TK) PKC is capable of fast throughput, but suffers from serious disadvantages. In chapter two a more general approach to the TK-PKC is described, showing how the public key size can be significantly reduced. To overcome the security limitations a new trapdoor was described in chapter three. It is based on transformations between the radix and residue number systems.Chapter four considers how cryptography can best be applied to multi-addressed packets of information. We show how security or communication network structure can be used to advantage, then proposing a new broadcast cryptosystem, which is more generally applicable.Copyright is traditionally used to protect the publisher from the pirate. Chapter five shows how to protect information when in easily copyable digital format.Chapter six describes the potential and pitfalls of VLSI, followed in chapter seven by a model for comparing the cost and performance of VLSI architectures. Chapter eight deals with novel architectures for all the basic arithmetic operations. These architectures provide a basic vocabulary of low complexity VLSI arithmetic structures for a wide range of applications.The design of a VLSI device, the Advanced Cipher Processor (ACP), to implement the RSA algorithm is described in chapter nine. It's heart is the modular exponential unit, which is a synthesis of the architectures in chapter eight. The ACP is capable of a throughput of 50 000 bits per second
Radiation Induced Fault Detection, Diagnosis, and Characterization of Field Programmable Gate Arrays
The development of Field Programmable Gate Arrays (FPGAs) has been a great achievement in the world of micro-electronics. One of these devices can be programmed to do just about anything, and replace the need for thousands of individual specialized devices. Despite their great versatility, FPGAs are still extremely vulnerable to radiation from cosmic waves in space and from adversaries on the ground. Extensive research has been conducted to examine how radiation disrupts different types of FPGAs. The results show, unfortunately, that the newer FPGAs with smaller technology are even more susceptible to radiation damage than the older ones. This research incorporates and enhances current methods of radiation detection. The design consists of 15 sensor networks that each have 29 sensors. The sensors are simple inverters, but they have the ability to detect flipped bits and delay errors caused by radiation. Analyzers process the outputs of each sensor to determine if the value agrees with what is expected. This information is fed to a reporter that creates an easy-to-read output that describes which network the fault is in, what type of fault is present, how many are in the network, how long they have been there, and the percent slowdown if it is a delay issue. Each network reports any fault data, to the computer screen in real time. This design does need some improvement, but once those improvements are made and tested, this system can be incorporated with FPGA reconfiguration methods that automatically place application logic away from failing errors of the FPGA. This system has great potential to become a great too in fault mitigation
Fault attacks on RSA and elliptic curve cryptosystems
This thesis answered how a fault attack targeting software used to program EEPROM can threaten hardware devices, for instance IoT devices. The successful fault attacks proposed in this thesis will certainly warn designers of hardware devices of the security risks their devices may face on the programming leve
N-variant Hardware Design
The emergence of lightweight embedded devices imposes stringent constraints on
the area and power of the circuits used to construct them. Meanwhile, many of
these embedded devices are used in applications that require diversity and flexibility
to make them secure and adaptable to the fluctuating workload or variable fabric.
While field programmable gate arrays (FPGAs) provide high flexibility, the use of
application specific integrated circuits (ASICs) to implement such devices is more
appealing because ASICs can currently provide an order of magnitude less area and
better performance in terms of power and speed. My proposed research introduces the
N-variant hardware design methodology that adds the sufficient flexibility needed by
such devices while preserving the performance and area advantages of using ASICs.
The N-variant hardware design embeds different variants of the design control
part on the same IC to provide diversity and flexibility. Because the control circuitry
usually represents a small fraction of the whole circuit, using multiple versions of the
control circuitry is expected to have a low overhead. The objective of my thesis is to
formulate a method that provides the following advantages: (i) ease of integration in
the current ASIC design flow, (ii) minimal impact on the performance and area of the
ASIC design, and (iii) providing a wide range of applications for hardware security
and tuning the performance of chips either statically (e.g., post-silicon optimization)
or dynamically (at runtime). This is achieved by adding diversity at two orthogonal
levels: (i) state space diversity, and (ii) scheduling diversity. State space diversity
expands the state space of the controller. Using state space diversity, we introduce
an authentication mechanism and the first active hardware metering schemes. On the
other hand, scheduling diversity is achieved by embedding different control schedules
in the same design. The scheduling diversity can be spatial, temporal, or a hybrid
of both methods. Spatial diversity is achieved by implementing multiple control
schedules that use various parts of the chip at different rates. Temporal diversity
provides variants of the controller that can operate at unequal speeds. A hybrid of
both spatial and temporal diversities can also be implemented. Scheduling diversity
is used to add the flexibility to tune the performance of the chip. An application
of the thermal management of the chip is demonstrated using scheduling diversity.
Experimental results show that the proposed method is easy to integrate in the current
ASIC flow, has a wide range of applications, and incurs low overhead
Uniquely Identifiable Tamper-Evident Device Using Coupling between Subwavelength Gratings
Reliability and sensitive information protection are critical aspects of integrated circuits. A novel technique using near-field evanescent wave coupling from two subwavelength gratings (SWGs), with the input laser source delivered through an optical fiber is presented for tamper evidence of electronic components. The first grating of the pair of coupled subwavelength gratings (CSWGs) was milled directly on the output facet of the silica fiber using focused ion beam (FIB) etching. The second grating was patterned using e-beam lithography and etched into a glass substrate using reactive ion etching (RIE). The slightest intrusion attempt would separate the CSWGs and eliminate near-field coupling between the gratings. Tampering, therefore, would become evident.
Computer simulations guided the design for optimal operation of the security solution. The physical dimensions of the SWGs, i.e. period and thickness, were optimized, for a 650 nm illuminating wavelength. The optimal dimensions resulted in a 560 nm grating period for the first grating etched in the silica optical fiber and 420 nm for the second grating etched in borosilicate glass. The incident light beam had a half-width at half-maximum (HWHM) of at least 7 µm to allow discernible higher transmission orders, and a HWHM of 28 µm for minimum noise. The minimum number of individual grating lines present on the optical fiber facet was identified as 15 lines. Grating rotation due to the cylindrical geometry of the fiber resulted in a rotation of the far-field pattern, corresponding to the rotation angle of moiré fringes. With the goal of later adding authentication to tamper evidence, the concept of CSWGs signature was also modeled by introducing random and planned variations in the glass grating.
The fiber was placed on a stage supported by a nanomanipulator, which permitted three-dimensional displacement while maintaining the fiber tip normal to the surface of the glass substrate. A 650 nm diode laser was fixed to a translation mount that transmitted the light source through the optical fiber, and the output intensity was measured using a silicon photodiode. The evanescent wave coupling output results for the CSWGs were measured and compared to the simulation results
Improving Salience Retention and Identification in the Automated Filtering of Event Log Messages
Event log messages are currently the only genuine interface through which computer systems
administrators can effectively monitor their systems and assemble a mental perception
of system state. The popularisation of the Internet and the accompanying meteoric
growth of business-critical systems has resulted in an overwhelming volume of event log
messages, channeled through mechanisms whose designers could not have envisaged the
scale of the problem. Messages regarding intrusion detection, hardware status, operating
system status changes, database tablespaces, and so on, are being produced at the rate
of many gigabytes per day for a significant computing environment.
Filtering technologies have not been able to keep up. Most messages go unnoticed; no
filtering whatsoever is performed on them, at least in part due to the difficulty of implementing
and maintaining an effective filtering solution. The most commonly-deployed
filtering alternatives rely on regular expressions to match pre-defi ned strings, with 100%
accuracy, which can then become ineffective as the code base for the software producing
the messages 'drifts' away from those strings. The exactness requirement means all possible
failure scenarios must be accurately anticipated and their events catered for with
regular expressions, in order to make full use of this technique.
Alternatives to regular expressions remain largely academic. Data mining, automated
corpus construction, and neural networks, to name the highest-profi le ones, only produce
probabilistic results and are either difficult or impossible to alter in any deterministic way.
Policies are therefore not supported under these alternatives.
This thesis explores a new architecture which utilises rich metadata in order to avoid the
burden of message interpretation. The metadata itself is based on an intention to improve
end-to-end communication and reduce ambiguity. A simple yet effective filtering scheme
is also presented which fi lters log messages through a short and easily-customisable set
of rules. With such an architecture, it is envisaged that systems administrators could
signi ficantly improve their awareness of their systems while avoiding many of the false-positives
and -negatives which plague today's fi ltering solutions
Study of applications of bio-space technology to patient monitoring systems Progress report
Patient monitoring system design and equipment specifications with physiological response display device and warning syste
Study of blast effects on structures
Engineers have a duty to the public to preserve life and protect the community and occupants within structure that we build and use. All practicing engineers are obligated to foster the health, safety and wellbeing of the community and the environment. This involves acting on the basis of adequate knowledge and foreseeable risks that pose a potential hazard towards the built environment. The terrorism threat has evolved rapidly in scale and occurrences in recent history and with that the need to create resilient structures.
This dissertation endeavours to undertake a study of the global blast loading effects on structures and identify techniques for improved structural resilience of critical elements. Blasts can be delivered by explosive events either deliberate, accidental or through indirect action. A historical review of case studies and blast incidents was undertaken to identify susceptible structures to blast and development of a structural model in order to simulate a credible scenario and understand the blast effects and predicting the design loading.
The scope of the dissertation is restricted to the blast pressure disturbance effects interacting with a structure delivered by an external air blast and not considering the secondary effects of a blast incident including thermal and high velocity fragments. Common structural members and materials were used to devise a Finite Element model and simulate against the blast loading cases derived from empirical methods. Since the nature of blast load only lasting for a short time and undergoes constant change Non-Linear Transient Dynamic Analysis approach was well suited to undertaking this type of analysis.
Some of the findings include whipping effects due to inertia as the structure accelerating from its initial position to develop resistance against the applied loading even after the applied load has ceased. The global response of a structure due to blast pressure, is generally a consequence of lateral or out-of-plane loading. Longer pressure phase durations tend to result in bending failures while impulsive loads (short pressure phase duration) lead to shear responses. Resilience techniques including steel UC encased in concrete, RC steel plate wraps and RC shear reinforcement lacing have the potential to improve the robustness of structural elements reducing overall displacements and stress responses
Engineering Automation for Reliable Software Interim Progress Report (10/01/2000 - 09/30/2001)
Prepared for: U.S. Army Research Office
P.O. Box 12211
Research Triangle Park, NC 27709-2211The objective of our effort is to develop a scientific basis for producing reliable
software that is also flexible and cost effective for the DoD distributed software domain.
This objective addresses the long term goals of increasing the quality of service provided
by complex systems while reducing development risks, costs, and time. Our work focuses on
"wrap and glue" technology based on a domain specific distributed prototype model. The key
to making the proposed approach reliable, flexible, and cost-effective is the automatic
generation of glue and wrappers based on a designer's specification. The "wrap and glue"
approach allows system designers to concentrate on the difficult interoperability problems
and defines solutions in terms of deeper and more difficult interoperability issues, while
freeing designers from implementation details. Specific research areas for the proposed
effort include technology enabling rapid prototyping, inference for design checking,
automatic program generation, distributed real-time scheduling, wrapper and glue
technology, and reliability assessment and improvement. The proposed technology will be
integrated with past research results to enable a quantum leap forward in the state of the
art for rapid prototyping.U. S. Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-22110473-MA-SPApproved for public release; distribution is unlimited
- …