34,690 research outputs found
Dialable Cryptography for Wireless Networks
The objective of this research is to develop an adaptive cryptographic protocol, which allows users to select an optimal cryptographic strength and algorithm based upon the hardware and bandwidth available and allows users to reason about the level of security versus the system throughput. In this constantly technically-improving society, the ability to communicate via wireless technology provides an avenue for delivering information at anytime nearly anywhere. Sensitive or classified information can be transferred wirelessly across unsecured channels by using cryptographic algorithms. The research presented will focus on dynamically selecting optimal cryptographic algorithms and cryptographic strengths based upon the hardware and bandwidth available. The research will explore the performance of transferring information using various cryptographic algorithms and strengths using different CPU and bandwidths on various sized packets or files. This research will provide a foundation for dynamically selecting cryptographic algorithms and key sizes. The conclusion of the research provides a selection process for users to determine the best cryptographic algorithms and strengths to send desired information without waiting for information security personnel to determine the required method for transferring. This capability will be an important stepping stone towards the military’s vision of future Net-Centric Warfare capabilities
Recommended from our members
Cryptoraptor : high throughput reconfigurable cryptographic processor for symmetric key encryption and cryptographic hash functions
textIn cryptographic processor design, the selection of functional primitives and connection structures between these primitives are extremely crucial to maximize throughput and flexibility. Hence, detailed analysis on the specifications and requirements of existing crypto-systems plays a crucial role in cryptographic processor design. This thesis provides the most comprehensive literature review that we are aware of on the widest range of existing cryptographic algorithms, their specifications, requirements, and hardware structures. In the light of this analysis, it also describes a high performance, low power, and highly flexible cryptographic processor, Cryptoraptor, that is designed to support both today's and tomorrow's encryption standards. To the best of our knowledge, the proposed cryptographic processor supports the widest range of cryptographic algorithms compared to other solutions in the literature and is the only crypto-specific processor targeting the future standards as well. Unlike previous work, we aim for maximum throughput for all known encryption standards, and to support future standards as well. Our 1GHz design achieves a peak throughput of 128Gbps for AES-128 which is competitive with ASIC designs and has 25X and 160X higher throughput per area than CPU and GPU solutions, respectively.Electrical and Computer Engineerin
Lightweight usable cryptography: a usability evaluation of the Ascon 1.2 family
We present a usability study of the Ascon 1.2 family of cryptographic
algorithms. As far as we know, this is the first published experimental
evaluation aimed at a cryptographic design (i.e. not a specific API) with the
purpose of informing which aspects to standardise. While the results show the
general difficulty of choosing and applying cryptographic algorithms, there are
some more specific insights. These include the possibility of confusing
multiple variants, the relevance of small interfaces, and the desire for
higher-level wrapper functions (e.g. for protocols). Overall, many questions
are still open, including how usability could be integrated into the design and
evaluation of cryptographic algorithms. Our main takeaway is that lightweight
usable cryptography is an open research area that deserves greater focus. For
the review of NISTIR 7977, the standardisation process of Ascon as a FIPS, and
when exploring potential future SPs, the key criterion of usability should be
based on realistic user testing and on triangulation from other methods.Comment: Lightweight Cryptography Workshop 2023.
https://csrc.nist.gov/events/2023/lightweight-cryptography-workshop-202
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
Networks are evolving toward a ubiquitous model in which heterogeneous
devices are interconnected. Cryptographic algorithms are required for developing security
solutions that protect network activity. However, the computational and energy limitations
of network devices jeopardize the actual implementation of such mechanisms. In this
paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric
cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing
based cryptography on personal agendas, and compare them with the costs of basic operating
system functions. Results show that although cryptographic power costs are high and such
operations shall be restricted in time, they are not the main limiting factor of the autonomy
of a device
Study mass transfer of Cd, Hg, As, DDT and chlordane through adsorption onto granular activated carbon
The kinetic theory of liquid indicates that diffusion coefficient for the dilute liquid at ordinary pressure is essentially independent of mixture composition. Mass transfer is important in separation and adsorption process. However, diffusion may also be caused by other features. Because of the complex nature of mass diffusion, the diffusion coefficients are usually determined experimentally. The mass transfer resistance controls the kinetic adsorption rate, but there is only limited understanding of the adsorption of a solute onto porous material from surface water. Thus, this study was conducted to further enhance the understanding of the mass transfer and adsorption processes of micropollutants. The objectives of this study are to analyze the difference, examine the adsoprtion diffusion of mass transfer and evaluate the variation of total, internal and external mass transfer. This study also used the transformed equation to analyze the rate of adsorption during adsorption process onto different GACs. Five (5) micropollutants namely Hg, Cd, As, DDT and chlordane have been chosen to be adsorbed onto three (3) granular activated carbon which are SIG (shell industrial grade), SAG (shell analytical grade) and BAG (bitumen analytical grade). The micropollutants (Hg, Cd, As, DDT and chlordane) were prepared using standard stock solution in deionized water. Adsorption of pollutants onto SIG, SAG, and BAG were started at different percentages of outflow. Although the samples were taken at the same time, the outcome showed that a significant competition between adsorbates and adsorbents. From the analysis, SIG and SAG displayed excellent performance in adsorbing inorganic micropollutants while BAG for organic micropollutants. Before adsorption takes place, the morphology of the SAG indicated pore abundance compared to SIG and BAG. BAG pores are more structured than SIG and SAG. After adsorption occurs, more of the organic micropollutants are being adsorbed onto BAG and SAG. Meanwhile, SIG proved to be the best adsorbent for inorganic micropollutants. It takes 72 hours for Hg
vi
and As to saturate SIG whilst Cd take a longer time of 80 hours. SAG was also a good adsorbent for organic elements, with DDT taking 52 hours and chlordane taking 48 hours to be adsorbed. The [KLa]f value for the adsorption of Hg onto SIG was significant and the [KLa]d value for the adsorption of Hg onto SIG was higher onto SAG and BAG. The value of [KLa]f for SIG at 6% outflow was 0.6862 h-1, with values of [KLa]d at -0.4142 h-1 and [KLa]g at 0.2721 h-1, while for the adsorption of Cd it was shown that the [KLa]f values for the adsorption of Cd onto BAG was the most significant and the [KLa]d values for the adsorption of Cd onto SIG was higher than SAG and BAG at 2% outflow, with values of 0.7044 h-1, [KLa]d at -0.3687 h-1, and [KLa]g at 0.3356 h-1. In contrast, for As the [KLa]f for the adsorption of As onto BAG at 4% outflow was 0.6722 h-1 and [KLa]g was 0.3103 h-1. For DDT, the [KLa]f value of DDT for BAG at 0.5% outflow was 1.6662 h-1, [KLa]d was -1.2702 h-1 and [KLa]g was 0.3959 h-1. In the case of DDT, the value of [KLa]f for the adsorption of chlordane onto BAG at 2% outflow was 0.7330 h-1 and [KLa]d was started to activate the adsorption -0.5567 h-1. [KLa]g at 2% outflow was 0.1763 h-1. From these values we can conclude that for the adsorption of inorganic substances, SIG proved to be the best, while for organic substances BAG is the best adsorbent
Supervisory control for conventional unitary air conditioning system
The Supervisory control for conventional unitary air conditioning system is conceptually
designed based on Programmable Logic Control (PLC) system. The advantage of PLC
system is that it allows online monitoring continually and updates or modification can be
performed interactively. This supervisory mode is applied to the conventional unitary air
conditioner to avoid the frequent interruption or adjustment of the fan speed or
temperature set point by users normal practice which has contributed to the surge of
energy consumption due to the frequent on/off of the compressor. Three experiments
have been performed at different control methods to simulate user’s daily practice. The
first control method is the Variable Set point with high speed fan, the second control
method is the Fixed Set point with high speed fan and the third control method is a
Supervisory Control; a fixed set point with variable fan speed. The experiments have
been conducted for eight (8) hours and the statistic data of accumulated energy
consumption based on one unitary air conditioner with capacity of 1 Horse Power are
acquired and sampled at the time interval of 30 minutes for the analysis. From these
experiments, the supervisory control has consumed 4.2 kWh per day which is 82.35%
compared to normal consumption of 5.1 kWh. This result translated into 0.9 kWh or
17.65% of total energy saving per day. The consistency of the air compressor operation in
this control method has become a major factor in achieving indoor temperature steadiness
whilst improving the energy savings
Performance Considerations for an Embedded Implementation of OMA DRM 2
As digital content services gain importance in the mobile world, Digital
Rights Management (DRM) applications will become a key component of mobile
terminals. This paper examines the effect dedicated hardware macros for
specific cryptographic functions have on the performance of a mobile terminal
that supports version 2 of the open standard for Digital Rights Management
defined by the Open Mobile Alliance (OMA). Following a general description of
the standard, the paper contains a detailed analysis of the cryptographic
operations that have to be carried out before protected content can be
accessed. The combination of this analysis with data on execution times for
specific algorithms realized in hardware and software has made it possible to
build a model which has allowed us to assert that hardware acceleration for
specific cryptographic algorithms can significantly reduce the impact DRM has
on a mobile terminal's processing performance and battery life.Comment: Submitted on behalf of EDAA (http://www.edaa.com/
- …