4,745 research outputs found
Design and implementation of proposed 320 bit RC6-cascaded encryption/decryption cores on altera FPGA
This paper attempts to build up a simple, strong and secure cryptographic algorithm. The result of such an attempt is “RC6-Cascade” which is 320-bits RC6 like block cipher. The key can be any length up to 256 bytes. It is a secret-key block cipher with precise characteristics of RC6 algorithm using another overall structure design. In RC6-Cascade, cascading of F-functions will be used instead of rounds. Moreover, the paper investigates a hardware design to efficiently implement the proposed RC6-Cascade block cipher core on field programmable gate array (FPGA). An efficient compact iterative architecture will be designed for the F-function of the above algorithm. The goal is to design a more secure algorithm and present a very fast encryption core for low cost and small size applications
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
This paper investigates the encryption efficiency of RC6 block cipher application to digital
images, providing a new mathematical measure for encryption efficiency, which we will call the
encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated
among its several design parameters such as word size, number of rounds, and secret key length and
the optimal choices for the best values of such design parameters are given. Also, the security analysis
of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security
estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks
are explored. Experiments are made to test the security of RC6 block cipher for digital images against
all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is
highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests
are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So,
RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images
Analisis Perbandingan Algoritma Rivest Shamir Adleman (Rsa) & Rivest Code 6 (Rc6) Dalam Keamanan Citra Digital
Citra digital merupakan satu media yang dapat disimpan pada media penyimpanan atau ditransmisikan melalui jaringan. Namun dalam transmisi dapat terjadi tindakan pencurian dan penyalahgunaan data yang merugikan pihak berkepentingan terhadap data tersebut. Untuk melindungi dan menjaga kerahasiaan sebuah citra digital digunakan metode kriptografi.
Pada penelitian ini dibandingkan dua algoritma yaitu Rivest Shamir Adleman (RSA) dan Rivest Code 6 (RC6). RSA merupakan salah satu algoritma asimetris dimana kunci enkripsi dan dekripsi yang digunakan berbeda, sedangkan RC6 merupakan algoritma simetris dimana kunci yang digunakan sama.
Berdasarkan pengujian,waktu operasi algoritma RC6 lebih cepat dari algoritma RSA. Untuk pengujian noise yang dilakukan RSA lebih dapat bertahan daripada RC6. Hasil pengujian RSA dapat bertahan pada noise gaussian dengan nilai mean 0,00001 dan varian 0,000001 mendapatkan nilai MSE 1252,98 dan PSNR 43,85 dB, sedangkan RC6 tidak dapat bertahan dengan noise ini. Kemudian untuk noise salt & pepper, RSA dapat bertahan pada nilai density 0,05 dengan nilai MSE 1256,66 dan PSNR 42,71 dB, sedangkan RC6 dapat bertahan pada nilai density 0,01 dengan nilai MSE 1108,85 dan PSNR 40,72 dB. Berdasarkan pengujian kompresi kedua algoritma ini sama-sama tidak tahan terhadap lossy compression, sedangkan untuk lossless compression kedua algoritma masih bisa bertahan yakni hasil dekripsi sama dengan citra asli
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time with little energy supply, and that available storage is scarce on these sensor nodes. However, to our knowledge, no systematic work has been done in this area so far.We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. For evaluating and assessing these candidates, we not only consider the security properties but also the storage- and energy-efficiency of the candidates. Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy efficiency being implicit). In terms of operation mode, we recommend Output Feedback Mode for pairwise links but Cipher Block Chaining for group communications
Benchmarking Block Ciphers for Wireless Sensor Networks
Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for WSNs based on existing literature. For evaluating and assessing these candidates, we have devised a systematic framework that not only considers the security properties but also the storage- and energy-efficency of the candidates. Finally, based on the evaluation results, we have selected the suitable ciphers for WSNs, namely Rijndael for high security and energy efficiency requirements; and MISTY1 for good storage and energy efficiency
Modeling of GaN HEMTs With Open Source Qucs-S Circuit Simulation and Compact Device Modeling Technology
Qucs-0.0.19-S-RC6 Simulation and Compact Device Modelling Tools
Introduction to the Qucs GPL Verilog-A Module Synthesizer
Qucs modelling of the ”Efficient Power Corporation (EPC)” GaN
EPC2001 Power Transistor
Qucs Verilog-A Modeling of the ”MIT Virtual Source GaN-RF HEMT
Compact Device Model 1.0.0”: Problems Simulating with ADMS;
Workarounds and Typical Simulation Data
Qucs-0.0.19-S-RC6 XSPICE Code Modeling package
Qucs-0.0.19-S-RC6/Ngspice/Xyce Circuit Analysis and Compact Device
Parameter Extraction from Manufacturers Data or Measurements
Controlled by Octave Script Files
Summar
A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems
Evidence of signatures associated with cryptographic modes of operation is
established. Motivated by some analogies between cryptographic and dynamical
systems, in particular with chaos theory, we propose an algorithm based on
Lyapunov exponents of discrete dynamical systems to estimate the divergence
among ciphertexts as the encryption algorithm is applied iteratively. The
results allow to distinguish among six modes of operation, namely ECB, CBC,
OFB, CFB, CTR and PCBC using DES, IDEA, TEA and XTEA block ciphers of 64 bits,
as well as AES, RC6, Twofish, Seed, Serpent and Camellia block ciphers of 128
bits. Furthermore, the proposed methodology enables a classification of modes
of operation of cryptographic systems according to their strength.Comment: 14 pages, 10 figure
- …