4,745 research outputs found

    Design and implementation of proposed 320 bit RC6-cascaded encryption/decryption cores on altera FPGA

    Get PDF
    This paper attempts to build up a simple, strong and secure cryptographic algorithm. The result of such an attempt is “RC6-Cascade” which is 320-bits RC6 like block cipher. The key can be any length up to 256 bytes. It is a secret-key block cipher with precise characteristics of RC6 algorithm using another overall structure design. In RC6-Cascade, cascading of F-functions will be used instead of rounds. Moreover, the paper investigates a hardware design to efficiently implement the proposed RC6-Cascade block cipher core on field programmable gate array (FPGA). An efficient compact iterative architecture will be designed for the F-function of the above algorithm. The goal is to design a more secure algorithm and present a very fast encryption core for low cost and small size applications

    Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images

    Full text link
    This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images

    Analisis Perbandingan Algoritma Rivest Shamir Adleman (Rsa) & Rivest Code 6 (Rc6) Dalam Keamanan Citra Digital

    Full text link
    Citra digital merupakan satu media yang dapat disimpan pada media penyimpanan atau ditransmisikan melalui jaringan. Namun dalam transmisi dapat terjadi tindakan pencurian dan penyalahgunaan data yang merugikan pihak berkepentingan terhadap data tersebut. Untuk melindungi dan menjaga kerahasiaan sebuah citra digital digunakan metode kriptografi. Pada penelitian ini dibandingkan dua algoritma yaitu Rivest Shamir Adleman (RSA) dan Rivest Code 6 (RC6). RSA merupakan salah satu algoritma asimetris dimana kunci enkripsi dan dekripsi yang digunakan berbeda, sedangkan RC6 merupakan algoritma simetris dimana kunci yang digunakan sama. Berdasarkan pengujian,waktu operasi algoritma RC6 lebih cepat dari algoritma RSA. Untuk pengujian noise yang dilakukan RSA lebih dapat bertahan daripada RC6. Hasil pengujian RSA dapat bertahan pada noise gaussian dengan nilai mean 0,00001 dan varian 0,000001 mendapatkan nilai MSE 1252,98 dan PSNR 43,85 dB, sedangkan RC6 tidak dapat bertahan dengan noise ini. Kemudian untuk noise salt & pepper, RSA dapat bertahan pada nilai density 0,05 dengan nilai MSE 1256,66 dan PSNR 42,71 dB, sedangkan RC6 dapat bertahan pada nilai density 0,01 dengan nilai MSE 1108,85 dan PSNR 40,72 dB. Berdasarkan pengujian kompresi kedua algoritma ini sama-sama tidak tahan terhadap lossy compression, sedangkan untuk lossless compression kedua algoritma masih bisa bertahan yakni hasil dekripsi sama dengan citra asli

    Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

    Get PDF
    Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time with little energy supply, and that available storage is scarce on these sensor nodes. However, to our knowledge, no systematic work has been done in this area so far.We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. For evaluating and assessing these candidates, we not only consider the security properties but also the storage- and energy-efficiency of the candidates. Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy efficiency being implicit). In terms of operation mode, we recommend Output Feedback Mode for pairwise links but Cipher Block Chaining for group communications

    Benchmarking Block Ciphers for Wireless Sensor Networks

    Get PDF
    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for WSNs based on existing literature. For evaluating and assessing these candidates, we have devised a systematic framework that not only considers the security properties but also the storage- and energy-efficency of the candidates. Finally, based on the evaluation results, we have selected the suitable ciphers for WSNs, namely Rijndael for high security and energy efficiency requirements; and MISTY1 for good storage and energy efficiency

    Modeling of GaN HEMTs With Open Source Qucs-S Circuit Simulation and Compact Device Modeling Technology

    Get PDF
    Qucs-0.0.19-S-RC6 Simulation and Compact Device Modelling Tools Introduction to the Qucs GPL Verilog-A Module Synthesizer Qucs modelling of the ”Efficient Power Corporation (EPC)” GaN EPC2001 Power Transistor Qucs Verilog-A Modeling of the ”MIT Virtual Source GaN-RF HEMT Compact Device Model 1.0.0”: Problems Simulating with ADMS; Workarounds and Typical Simulation Data Qucs-0.0.19-S-RC6 XSPICE Code Modeling package Qucs-0.0.19-S-RC6/Ngspice/Xyce Circuit Analysis and Compact Device Parameter Extraction from Manufacturers Data or Measurements Controlled by Octave Script Files Summar

    A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems

    Full text link
    Evidence of signatures associated with cryptographic modes of operation is established. Motivated by some analogies between cryptographic and dynamical systems, in particular with chaos theory, we propose an algorithm based on Lyapunov exponents of discrete dynamical systems to estimate the divergence among ciphertexts as the encryption algorithm is applied iteratively. The results allow to distinguish among six modes of operation, namely ECB, CBC, OFB, CFB, CTR and PCBC using DES, IDEA, TEA and XTEA block ciphers of 64 bits, as well as AES, RC6, Twofish, Seed, Serpent and Camellia block ciphers of 128 bits. Furthermore, the proposed methodology enables a classification of modes of operation of cryptographic systems according to their strength.Comment: 14 pages, 10 figure
    corecore