411 research outputs found

    A STUDY AND IMPLEMENTATION OF ENCRYPTION, WITH EMPHASIS ON CHAOTIC MAPS

    Get PDF
    The security of data transmitted over public communication networks and valuable data storage have necessitated the need for very secure cryptography. Applications like video teleconferencing, cable TV broadcast, etc use encryption extensively. Hence researches for better ways of protecting data are still underway. And this project was aimed at finding secure cipher by implementing Logistic Map Cipher for plaintext encryption and decryption. The research was based on both symmetric ciphers and asymmetric ciphers. The symmetric cryptosystem was chosenand finally implemented. In trying to implement logistic map, Chaotic Maps were briefly analyzed and other types of encryption were investigated in order to understand intensive and extensive applications of cryptography. The three main parts of focus are keys' generator, the encryption and decryption parts, which are the main steps before cryptanalysis can be carried out. In encryption, the individual success of different parts will guarantee a complete cipher

    Re-engineering the Enigma cipher.

    Get PDF
    The design of this thesis is to re-engineer the Enigma cipher to make it a viable, secure cipher for use on current computers. The goal is to create a cipher based on an antiquated mechanical cryptography device, the Enigma Machine, in software and improve upon it. The basic principle that is being expounded upon here is that while the Enigma cipher\u27s security was originally very dependent on security through obscurity, this needs to be secure on its own. Also, this must be a viable solution for the encryption of data based on modern standards. The Enigma Phoenix, the name for this new cipher, will use Galois functions and other modern improvements to add an extra level of security to it and to make it the viable solution that is desired

    Blue Door

    Get PDF

    Analysis of RMAC

    Full text link

    Implementing IPsec using the Five-layer security framework and FPGAs.

    Get PDF

    HORNET: High-speed Onion Routing at the Network Layer

    Get PDF
    We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range of applications. Our system uses only symmetric cryptography for data forwarding yet requires no per-flow state on intermediate nodes. This design enables HORNET nodes to process anonymous traffic at over 93 Gb/s. HORNET can also scale as required, adding minimal processing overhead per additional anonymous channel. We discuss design and implementation details, as well as a performance and security evaluation.Comment: 14 pages, 5 figure

    Dynamic block encryption with self-authenticating key exchange

    Get PDF
    One of the greatest challenges facing cryptographers is the mechanism used for key exchange. When secret data is transmitted, the chances are that there may be an attacker who will try to intercept and decrypt the message. Having done so, he/she might just gain advantage over the information obtained, or attempt to tamper with the message, and thus, misguiding the recipient. Both cases are equally fatal and may cause great harm as a consequence. In cryptography, there are two commonly used methods of exchanging secret keys between parties. In the first method, symmetric cryptography, the key is sent in advance, over some secure channel, which only the intended recipient can read. The second method of key sharing is by using a public key exchange method, where each party has a private and public key, a public key is shared and a private key is kept locally. In both cases, keys are exchanged between two parties. In this thesis, we propose a method whereby the risk of exchanging keys is minimised. The key is embedded in the encrypted text using a process that we call `chirp coding', and recovered by the recipient using a process that is based on correlation. The `chirp coding parameters' are exchanged between users by employing a USB flash memory retained by each user. If the keys are compromised they are still not usable because an attacker can only have access to part of the key. Alternatively, the software can be configured to operate in a one time parameter mode, in this mode, the parameters are agreed upon in advance. There is no parameter exchange during file transmission, except, of course, the key embedded in ciphertext. The thesis also introduces a method of encryption which utilises dynamic blocks, where the block size is different for each block. Prime numbers are used to drive two random number generators: a Linear Congruential Generator (LCG) which takes in the seed and initialises the system and a Blum-Blum Shum (BBS) generator which is used to generate random streams to encrypt messages, images or video clips for example. In each case, the key created is text dependent and therefore will change as each message is sent. The scheme presented in this research is composed of five basic modules. The first module is the key generation module, where the key to be generated is message dependent. The second module, encryption module, performs data encryption. The third module, key exchange module, embeds the key into the encrypted text. Once this is done, the message is transmitted and the recipient uses the key extraction module to retrieve the key and finally the decryption module is executed to decrypt the message and authenticate it. In addition, the message may be compressed before encryption and decompressed by the recipient after decryption using standard compression tools

    Privacy and Encryption in Cyberspace: First Amendment Challenges to ITAR, EAR and Their Successors

    Get PDF
    This Comment discusses the need for privacy over the Internet and looks at the constitutional validity of previous and current regulations governing the export of privacy-enabling technologies, such as PGP and other powerful ciphers that allow users to protect the privacy of data transmitted over the Internet. In particular, the article seeks to analyze the constitutionality of the current regulatory scheme in light of the competing interests of privacy and freedom of expression on the one hand, and the need to protect national security on the other
    • …
    corecore