63 research outputs found

    New primitives of controlled elements F2/4 for block ciphers

    Get PDF
    This paper develops the cipher design approach based on the use of data-dependent operations (DDOs). A new class of DDO based on the advanced controlled elements (CEs) is introduced, which is proven well suited to hardware implementations for FPGA devices. To increase the hardware implementation efficiency of block ciphers, while using contemporary FPGA devices there is proposed an approach to synthesis of fast block ciphers, which uses the substitution-permutation network constructed on the basis of the controlled elements F2/4 implementing the 2 x 2 substitutions under control of the four-bit vector. There are proposed criteria for selecting elements F2/4 and results on investigating their main cryptographic properties. It is designed a new fast 128-bit block cipher MM-128 that uses the elements F2/4 as elementary building block. The cipher possesses higher performance and requires less hardware resources for its implementation on the bases of FPGA devices than the known block ciphers. There are presented result on differential analysis of the cipher MM-12

    Ultrafast cryptography with indefinitely switchable optical nanoantennas

    Full text link
    Bistability is widely exploited to demonstrate all-optical signal processing and light-based computing. The standard paradigm of switching between two steady states corresponding to '0" and '1" bits is based on the rule that a transition occurs when the signal pulse intensity overcomes the bistability threshold, and otherwise, the system remains in the initial state. Here, we break with this concept by revealing the phenomenon of indefinite switching in which the eventual steady state of a resonant bistable system is transformed into a nontrivial function of signal pulse parameters for moderately intense signal pulses. The essential nonlinearity of the indefinite switching allows realization of well-protected cryptographic algorithms with a single bistable element in contrast to software-assisted cryptographic protocols that require thousands of logic gates. As a proof of concept, we demonstrate stream deciphering of the word 'enigma' by means of an indefinitely switchable optical nanoantenna. An extremely high bitrate ranging from ~0.1 to 1 terabits per second and a small size make such systems promising as basic elements for all-optical cryptographic architectures.Comment: Light: Science & Applications, to appea

    Symmetry-Adapted Machine Learning for Information Security

    Get PDF
    Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis

    Low-power emerging memristive designs towards secure hardware systems for applications in internet of things

    Get PDF
    Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and in-memory computing (IMC), but there is a rising interest in using memristive technologies for security applications in the era of internet of things (IoT). In this review article, for achieving secure hardware systems in IoT, low-power design techniques based on emerging memristive technology for hardware security primitives/systems are presented. By reviewing the state-of-the-art in three highlighted memristive application areas, i.e. memristive non-volatile memory, memristive reconfigurable logic computing and memristive artificial intelligent computing, their application-level impacts on the novel implementations of secret key generation, crypto functions and machine learning attacks are explored, respectively. For the low-power security applications in IoT, it is essential to understand how to best realize cryptographic circuitry using memristive circuitries, and to assess the implications of memristive crypto implementations on security and to develop novel computing paradigms that will enhance their security. This review article aims to help researchers to explore security solutions, to analyze new possible threats and to develop corresponding protections for the secure hardware systems based on low-cost memristive circuit designs

    Some applications of quasigroups in cryptology

    Get PDF
    In the paper we present based on quasigroups new deniable encryption method, generalisation of Markovski stream cipher, and generalisation of El-Gamal enciphering system

    Implementation of the Digital Communication System in the F/A-18 Aircraft

    Get PDF
    The F/A-18 Hornet is a Navy/Marine Corps carrier-based strike/fighter built by the Boeing Company. The Hornet is a dual role aircraft designed to have all weather intercept and ground attack capabilities. The purpose of this study was to examine the Variable Message Format (VMF) communications capability, integration compatibility and technical suitability of the RT-1824(C) ARC-210 radio as integrated into the F/A-18 aircraft. Normally, this aircraft would utilize two ARC-210 voice capable only RT-1556 radio sets designated Comm 1 and Comm 2. Comm 1 is switchable between an upper AS-4129/ARC antenna and lower AS-3557/A antenna. Comm 2 utilizes a separate lower AS-4129/ARC antenna. The RT-1824(C) provides baseline ARC-210 RT-1556 capabilities as well as embedded COMSEC capability, and digital messaging for use during the Close Air Support (CAS) mission. Tests included range performance, aircraft software integration, E3, ECS, Carrier Suitability, TEMPEST, Reliability, Maintainability, and Supportability. Range performance and software integration testing included Air-to-Air testing using an airborne F/A-18 as a Forward Air Controller Airborne (FAC(A)) and Air to Ground testing using a ground FAC with a Target Location Designation Hand-off System (TLDHS). The study revealed a significant reduction in aircrew workload and a tremendous improvement in aircrew and FAC situational awareness after incorporating the new VMF technology. However, the original specification requirements for this program excluded the FAC(A) mission. The author felt that the inclusion of this mission was very important and included it during the research of this thesis. This study will look into the CAS and FAC(A) roles and provide design changes to enhance this system and make it more useful to the fleet user. The author’s analysis was done on information attained during a Navy developmental test program, however all conclusions and recommendations are independent of the test program. The author’s role in this test program was as lead test pilot and project officer. The identified problems are: 1. The need to redesign the touch-sensitive data entry keyboard of the Up Front Control Display to provide an alphanumeric entry capability in addition to providing secondary tactile interface with the weapons system, specifically for the FAC(A) mission. 2. Modify the aircraft software and TLDHS software to display the following commands: “Continue”, “Cleared Hot” and “Abort”. These messages should appear in the Pilot’s HUD, FLIR display, Radar display and Joint Helmet Mounted Cueing Sight display to provide the needed situational awareness (SA) in a highly dynamic mission environment, such as CAS. 3. Design a modified CAS page to appear after the aircrew selects “USE” to facilitate gaining pertinent information faster when conducting CAS missions. 4. Redesign the NETS page to allow more than one “SEND TO” list to appear when the aircraft is serving in the FAC(A) role. 5. Modify the software to allow the “Friendly Arc” to appear on the SA display in addition to the HSI display. 6. Redesign the CAS status line function to account for total number of aircraft received versus the total number of aircraft on the “Send To” list by modifying the NETS page to incorporate color to allow quick interpretation of which aircraft received the sent messages vice which did not. 7. Relay a repeater image of the close air support aircraft’s heads up display, to allow the FAC or FAC(A) to confirm the correct target is being attacked

    Compromising emissions from a high speed cryptographic embedded system

    Get PDF
    Specific hardware implementations of cryptographic algorithms have been subject to a number of “side channel” attacks of late. A side channel is any information bearing emission that results from the physical implementation of a cryptographic algorithm. Smartcard realisations have been shown to be particularly vulnerable to these attacks. Other more complex embedded cryptographic systems may also be vulnerable, and each new design needs to be tested. The vulnerability of a recently developed high speed cryptographic accelerator is examined. The purpose of this examination is not only to verify the integrity of the device, but also to allow its designers to make a determination of its level of conformance with any standard that they may wish to comply with. A number of attacks were reviewed initially and two were chosen for examination and implementation - Power Analysis and Electromagnetic Analysis. These particular attacks appeared to offer the greatest threat to this particular system. Experimental techniques were devised to implement these attacks and a simulation and micrcontroller emulation were setup to ensure these techniques were sound. Each experimental setup was successful in attacking the simulated data and the micrcontroller circuit. The significance of this was twofold in that it verified the integrity of the setup and proved that a real threat existed. However, the attacks on the cryptographic accelerator failed in all cases to reveal any significant information. Although this is considered a positive result, it does not prove the integrity of the device as it may be possible for an adversary with more resources to successfully attack the board. It does however increase the level of confidence in this particular product and acts as a stepping stone towards conformance of cryptographic standards. The experimental procedures developed can also be used by designers wishing to test the vulnerability of their own products to these attacks

    Wireless Communication System for Submucosal Implants

    Get PDF
    Refluxní choroba jícnu (GERD) a gastroparéza jsou dvě nemoci gastrointestinálního traktu (GIT), které můžou být charakterizovány nedostatečnou funkcí příslušné svaloviny. U refluxní choroby jícnu nedochází k uzávěru dolnojícnového svěrače, což umožňuje vstup kyselého obsahu žaludku do jícnu. Gastroparéza je charakteristická částečnou paralýzou žaludku, což vede k tomu, že potrava v něm zůstává po dobu delší, než je běžné. Léčba těchto onemocnění je zpravidla medikamentózní nebo chirurgická, která s sebou nese zvýšená rizika. Endoskopie zažívá v posledních letech zvýšený zájem, protože se jedná o téměř neinvazivní techniku pro zákroky v GIT. Cilem této diplomové práce je vývoj bezdrátového rozhraní pro aktivní implantabilní zdravotnický prostředek (AIMD), který by mohl být použit pro léčbu GERD a gastroparézy. Zařízení je implantováno technikou, která se nazývá "endoscopic submucosal pocketing". Práce je specificky zaměřena na vývoj bezdrátového komunikačního rozhraní provozovaného v pásmu MEDS. Konvoluční kodování a šifrování je vyvinuto a implementováno. Prototyp AIMD s biokompatibilním obalem a zařízením pro příjem dat a nabíjením bylo vyvinuto a navržený obousměrný bezdrátový komunikační řetězec byl implementován v jazyce C s použitím mikrokontrolerů PIC a Si4455 radiového transceiveru. Nakonec bylo zařízení otestováno jeho implantací do submukozy v prasečím žaludku pomocí endoskopu, čímž byla otestována možnost jeho využití v navazujícím výzkumu.Gastroesophageal reflux disease (GERD) and gastroparesis are two diseases of gastrointestinal tract (GIT) which can be characterized by the disorder of muscle tissue. In GERD, the lower esophageal sphincter does not close properly, allowing the acidic contents of stomach to enter esophagus. Gastroparesis is characterized by partial paralysis of stomach, resulting in food remaining there for an abnormally long time. Treatment for these diseases includes medication and invasive surgery which is dangerous. In recent years, endoscopy is getting attention because it is virtually non-invasive technique for surgeries inside GIT. The goal of this thesis is the development of wireless link for an active implantable medical device (AIMD) which could be used in treatment of GERD and gastroparesis. The device is implanted using a technique called endoscopic submucosal pocketing. Focus is given to the design of the wireless communication link which is operated in MEDS band. Convolutional coding and encryption is developed and implemented in the system. A prototype of AIMD with biocompatible housing and a receiver/charger device was developed and the proposed bidirectional wireless communication link was implemented using C language, PIC microcontrollers and Si4455 radio transceivers. Finally, the device was implanted into submucosa of a pig stomach with an endoscope to test the feasibility of using the device during ongoing research
    corecore