34,690 research outputs found

    Dialable Cryptography for Wireless Networks

    Get PDF
    The objective of this research is to develop an adaptive cryptographic protocol, which allows users to select an optimal cryptographic strength and algorithm based upon the hardware and bandwidth available and allows users to reason about the level of security versus the system throughput. In this constantly technically-improving society, the ability to communicate via wireless technology provides an avenue for delivering information at anytime nearly anywhere. Sensitive or classified information can be transferred wirelessly across unsecured channels by using cryptographic algorithms. The research presented will focus on dynamically selecting optimal cryptographic algorithms and cryptographic strengths based upon the hardware and bandwidth available. The research will explore the performance of transferring information using various cryptographic algorithms and strengths using different CPU and bandwidths on various sized packets or files. This research will provide a foundation for dynamically selecting cryptographic algorithms and key sizes. The conclusion of the research provides a selection process for users to determine the best cryptographic algorithms and strengths to send desired information without waiting for information security personnel to determine the required method for transferring. This capability will be an important stepping stone towards the military’s vision of future Net-Centric Warfare capabilities

    Lightweight usable cryptography: a usability evaluation of the Ascon 1.2 family

    Full text link
    We present a usability study of the Ascon 1.2 family of cryptographic algorithms. As far as we know, this is the first published experimental evaluation aimed at a cryptographic design (i.e. not a specific API) with the purpose of informing which aspects to standardise. While the results show the general difficulty of choosing and applying cryptographic algorithms, there are some more specific insights. These include the possibility of confusing multiple variants, the relevance of small interfaces, and the desire for higher-level wrapper functions (e.g. for protocols). Overall, many questions are still open, including how usability could be integrated into the design and evaluation of cryptographic algorithms. Our main takeaway is that lightweight usable cryptography is an open research area that deserves greater focus. For the review of NISTIR 7977, the standardisation process of Ascon as a FIPS, and when exploring potential future SPs, the key criterion of usability should be based on realistic user testing and on triangulation from other methods.Comment: Lightweight Cryptography Workshop 2023. https://csrc.nist.gov/events/2023/lightweight-cryptography-workshop-202

    Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices

    Get PDF
    Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing based cryptography on personal agendas, and compare them with the costs of basic operating system functions. Results show that although cryptographic power costs are high and such operations shall be restricted in time, they are not the main limiting factor of the autonomy of a device

    Study mass transfer of Cd, Hg, As, DDT and chlordane through adsorption onto granular activated carbon

    Get PDF
    The kinetic theory of liquid indicates that diffusion coefficient for the dilute liquid at ordinary pressure is essentially independent of mixture composition. Mass transfer is important in separation and adsorption process. However, diffusion may also be caused by other features. Because of the complex nature of mass diffusion, the diffusion coefficients are usually determined experimentally. The mass transfer resistance controls the kinetic adsorption rate, but there is only limited understanding of the adsorption of a solute onto porous material from surface water. Thus, this study was conducted to further enhance the understanding of the mass transfer and adsorption processes of micropollutants. The objectives of this study are to analyze the difference, examine the adsoprtion diffusion of mass transfer and evaluate the variation of total, internal and external mass transfer. This study also used the transformed equation to analyze the rate of adsorption during adsorption process onto different GACs. Five (5) micropollutants namely Hg, Cd, As, DDT and chlordane have been chosen to be adsorbed onto three (3) granular activated carbon which are SIG (shell industrial grade), SAG (shell analytical grade) and BAG (bitumen analytical grade). The micropollutants (Hg, Cd, As, DDT and chlordane) were prepared using standard stock solution in deionized water. Adsorption of pollutants onto SIG, SAG, and BAG were started at different percentages of outflow. Although the samples were taken at the same time, the outcome showed that a significant competition between adsorbates and adsorbents. From the analysis, SIG and SAG displayed excellent performance in adsorbing inorganic micropollutants while BAG for organic micropollutants. Before adsorption takes place, the morphology of the SAG indicated pore abundance compared to SIG and BAG. BAG pores are more structured than SIG and SAG. After adsorption occurs, more of the organic micropollutants are being adsorbed onto BAG and SAG. Meanwhile, SIG proved to be the best adsorbent for inorganic micropollutants. It takes 72 hours for Hg vi and As to saturate SIG whilst Cd take a longer time of 80 hours. SAG was also a good adsorbent for organic elements, with DDT taking 52 hours and chlordane taking 48 hours to be adsorbed. The [KLa]f value for the adsorption of Hg onto SIG was significant and the [KLa]d value for the adsorption of Hg onto SIG was higher onto SAG and BAG. The value of [KLa]f for SIG at 6% outflow was 0.6862 h-1, with values of [KLa]d at -0.4142 h-1 and [KLa]g at 0.2721 h-1, while for the adsorption of Cd it was shown that the [KLa]f values for the adsorption of Cd onto BAG was the most significant and the [KLa]d values for the adsorption of Cd onto SIG was higher than SAG and BAG at 2% outflow, with values of 0.7044 h-1, [KLa]d at -0.3687 h-1, and [KLa]g at 0.3356 h-1. In contrast, for As the [KLa]f for the adsorption of As onto BAG at 4% outflow was 0.6722 h-1 and [KLa]g was 0.3103 h-1. For DDT, the [KLa]f value of DDT for BAG at 0.5% outflow was 1.6662 h-1, [KLa]d was -1.2702 h-1 and [KLa]g was 0.3959 h-1. In the case of DDT, the value of [KLa]f for the adsorption of chlordane onto BAG at 2% outflow was 0.7330 h-1 and [KLa]d was started to activate the adsorption -0.5567 h-1. [KLa]g at 2% outflow was 0.1763 h-1. From these values we can conclude that for the adsorption of inorganic substances, SIG proved to be the best, while for organic substances BAG is the best adsorbent

    Supervisory control for conventional unitary air conditioning system

    Get PDF
    The Supervisory control for conventional unitary air conditioning system is conceptually designed based on Programmable Logic Control (PLC) system. The advantage of PLC system is that it allows online monitoring continually and updates or modification can be performed interactively. This supervisory mode is applied to the conventional unitary air conditioner to avoid the frequent interruption or adjustment of the fan speed or temperature set point by users normal practice which has contributed to the surge of energy consumption due to the frequent on/off of the compressor. Three experiments have been performed at different control methods to simulate user’s daily practice. The first control method is the Variable Set point with high speed fan, the second control method is the Fixed Set point with high speed fan and the third control method is a Supervisory Control; a fixed set point with variable fan speed. The experiments have been conducted for eight (8) hours and the statistic data of accumulated energy consumption based on one unitary air conditioner with capacity of 1 Horse Power are acquired and sampled at the time interval of 30 minutes for the analysis. From these experiments, the supervisory control has consumed 4.2 kWh per day which is 82.35% compared to normal consumption of 5.1 kWh. This result translated into 0.9 kWh or 17.65% of total energy saving per day. The consistency of the air compressor operation in this control method has become a major factor in achieving indoor temperature steadiness whilst improving the energy savings

    Performance Considerations for an Embedded Implementation of OMA DRM 2

    Full text link
    As digital content services gain importance in the mobile world, Digital Rights Management (DRM) applications will become a key component of mobile terminals. This paper examines the effect dedicated hardware macros for specific cryptographic functions have on the performance of a mobile terminal that supports version 2 of the open standard for Digital Rights Management defined by the Open Mobile Alliance (OMA). Following a general description of the standard, the paper contains a detailed analysis of the cryptographic operations that have to be carried out before protected content can be accessed. The combination of this analysis with data on execution times for specific algorithms realized in hardware and software has made it possible to build a model which has allowed us to assert that hardware acceleration for specific cryptographic algorithms can significantly reduce the impact DRM has on a mobile terminal's processing performance and battery life.Comment: Submitted on behalf of EDAA (http://www.edaa.com/
    corecore