scispace - formally typeset
Search or ask a question
Topic

Cipher

About: Cipher is a research topic. Over the lifetime, 9409 publications have been published within this topic receiving 110309 citations. The topic is also known as: cypher & cryptographic algorithm.


Papers
More filters
Journal ArticleDOI
Gilbert1, Hamrick1
TL;DR: It is found that, while in some circumstances it is best to employ perfect single photon sources, in other situations it is preferable to utilize weak coherent sources, and the relevant distinguishing figure-of-merit being the effective throughput rate.
Abstract: . A number of questions associated with practical implementations of quantum cryptography systems having to do with unconditional secrecy, computational loads and effective secrecy rates in the presence of perfect and imperfect sources are discussed. The different types of unconditional secrecy, and their relationship to general communications security, are discussed in the context of quantum cryptography. In order to carry out a quantum cryptography protocol it is necessary that sufficient computational resources be available to perform the various processing steps, such as sifting, error correction, privacy amplification and authentication. We display the full computer machine instruction requirements needed to support a practical quantum cryptography implementation. We carry out a numerical comparison of system performance characteristics for implementations that make use of either weak coherent sources of light or perfect single photon sources, for eavesdroppers making individual attacks on the quantum channel characterized by different levels of technological capability. We find that, while in some circumstances it is best to employ perfect single photon sources, in other situations it is preferable to utilize weak coherent sources. In either case the secrecy level of the final shared cipher is identical, with the relevant distinguishing figure-of-merit being the effective throughput rate.

36 citations

Journal ArticleDOI
TL;DR: Compared with other visually meaningful image encryption schemes, the proposed scheme has got better ability to embed more images with least distortion to the visual perspective of the host image.
Abstract: Cipher images that are generated using encryption algorithms are noise-like image, which shows a clear indication for the presence of encrypted data. The noise-like image lures an adversary to carry out attacks. An approach for the generation of visually meaningful multiple-image encryption scheme is presented in this paper. Multiple cipher image data are embedded in the insignificant real data of a host image. Simulation results and security analyses express the high-quality performance of the proposed method. Comparison with Bao and Zhou (Inf Sci 324:197–207, 2015) and Kanso and Ghebleh (Opt Lasers Eng 90:196–208, 2017) visually meaningful image encryption schemes, the proposed scheme has got better ability to embed more images with least distortion to the visual perspective of the host image.

36 citations

Proceedings ArticleDOI
11 Feb 2014
TL;DR: New Simulink primitives that had to be developed to deal with new requirements of Fully Homomorphic Encryption are presented, including FPGA based hardware primitives to accelerate the computation on encrypted data using an FHE cryptosystem based on NTRU-like lattice techniques.
Abstract: One of the goals of the DARPA PROCEED pro-gram has been accelerating the development of a practical Fully Homomorphic Encryption (FHE) scheme For the past three years, this program has succeeded in accelerating various aspects of the FHE concept toward practical implementation and use FHE is a game-changing technology to enable secure, general computation on encrypted data on untrusted off-site hardware, without the data ever being decrypted for processing FHE schemes developed under PROCEED have achieved multiple orders of magnitude improvement in computation, but further means of acceleration, such as implementations on specialized hardware, such as an FPGA can improve the speed of computa-tion even further The current interest in FHE computation resulted from breakthroughs demonstrating the existence of FHE schemes [1, 2] that allowed arbitrary computation on encrypted data Specif-ically, our contribution to the Proceed program has been the development of FPGA based hardware primitives to accelerate the computation on encrypted data using an FHE cryptosystem based on NTRU-like lattice techniques [3] with additional with additional support for efficient key switching and modulus re-duction operations to reduce the frequency of bootstrapping op-erations [4] Cipher texts in our scheme are represented as rec-tangular matrices of 64-bit integers This bounding of the oper-and sizes has allowed us to take advantage of modern code gen-eration tools developed by Mathworks to implement VHDL code for FPGA circuits directly from Simulink models Furthermore the implicit parallelism of the scheme allows for large amounts of pipelining in the implementation in order to achieve efficient throughput The resulting VHDL is integrated into an AXI4 bus “Soft System on Chip” using Xilinx platform studio and a Mi-croblaze soft core processor running on aVirtex7 VC707 evalua-tion board This report presents new Simulink primitives that had to be developed to deal with these new requirements

36 citations

Journal ArticleDOI
TL;DR: The simulation results reveal that the proposed cryptosystem with cipher block chaining, cipher feedback, and output feedback modes can efficiently and effectively hide all information of the color images with few details even in the presence of some input blocks with similar data.
Abstract: Recently, massive research works have been accomplished for augmenting privacy and security requirements for cybersecurity applications in wireless communication networks. This is attributed to the fact that conventional security processes are not appropriate for robust, efficient, and reliable multimedia streaming over unsecure media. Therefore, this paper presents an efficient color image cryptosystem based on RC6 with different modes of operation. The proposed cryptosystem is composed of two phases: encryption and decryption. The encryption phase starts by decomposing the color plainimage with few details into its RGB components, which in turn, are segmented into 128-bit blocks. These blocks are then enciphered using RC6 with an appropriate mode of operation. After that, the corresponding enciphered blocks of RGB components are multiplexed for constructing the final cipherimage. This scenario is reversed in the decryption phase. The performance of the proposed cryptosystem is gauged via simulation using a set of encryption quality metrics. The simulation results reveal that the proposed cryptosystem with cipher block chaining (CBC), cipher feedback (CFB), and output feedback (OFB) modes can efficiently and effectively hide all information of the color images with few details even in the presence of some input blocks with similar data. On the other hand, the results show that the electronic codebook (ECB) mode is not effective at all in hiding all details of images. Finally, the obtained results ensure the applicability of the proposed cryptosystem and its efficiency in encrypting images in terms of security, encryption quality, and noise immunity.

36 citations

Proceedings ArticleDOI
12 Apr 2011
TL;DR: This paper presents a new stream cipher, A2U2, which uses principles of stream cipher design and approaches from block cipher design, to develop a cipher that can be implemented with less than 300 gates, with the added benefit of high throughput provided by stream ciphers.
Abstract: The design of hardware-oriented ciphers has an increasingly important role to play with emerging ubiquitous and pervasive computing devices, such as low cost passive Radio Frequency Identification (RFID) tags. The importance of such ciphers are further highlighted by novel manufacturing technologies, such as printed ink to develop extremely low cost RFID tags. Such developments bring new challenges, especially in terms of providing security, both to protect privacy as well as to enable applications dependent on security, such as e-tickets. In this paper we present a new stream cipher, A2U2, which uses principles of stream cipher design and approaches from block cipher design. Our lightweight cryptographic primitive has taken into consideration the extremely resource limited environment of printed ink tags, to develop a cipher that can be implemented with less than 300 gates, with the added benefit of high throughput provided by stream ciphers.

36 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
90% related
Encryption
98.3K papers, 1.4M citations
89% related
Authentication
74.7K papers, 867.1K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023155
2022309
2021343
2020415
2019509
2018487