scispace - formally typeset
Search or ask a question

Showing papers on "Encryption published in 1970"


Journal ArticleDOI
01 Jan 1970
TL;DR: A compact 32-bit architecture developed for the Rijndael ciphering/deciphering system that offers fast processing speed but with core size trade-off, according to the evaluation made on the targeted FPGA.
Abstract: This paper describes a compact 32-bit architecture developed for the Rijndael ciphering/deciphering system. The implementation is complied with NIST Advanced Encryption Standard (AES). The design processes any 128-bit block data with 128-bit key. For the compact hardware, the field inversion circuit and the key scheduling circuits are shared by both the encryption and decryption process. The on-the-fly KeyScheduling implementation offers fast processing speed but with core size trade-off. According to the evaluation made on the targeted FPGA, the design can offer the throughput of 768 mbps at 264 MHz clock speed.

6 citations


Journal ArticleDOI
01 Jan 1970
TL;DR: This paper describes signal processing in the encrypted domain, i.e., that after encryption but before decryption, where signal processing operations can be directly applied to encrypted signals without decrypting of encrypted signals.
Abstract: This paper describes signal processing in the encrypted domain, i.e., that after encryption but before decryption. In this framework, signal processing operations can be directly applied to encrypted signals without decrypting of encrypted signals, whereas the ordinary framework encrypts signals for transmission and/or storing but it decrypts them before signal processing operations are applied to. The described framework befits contemporary cloud computing in which not only transmission but also storing and processing are done in the public Internet. Addition to brief survey, two tangible application scenarios are also demonstrated in this paper where a new signal processing algorithm is introduced each.

5 citations


Journal ArticleDOI
01 Jan 1970
TL;DR: A robust SVD based algorithm is proposed for embedding a watermark on a host image and then encrypts the resultant stego-image using chaotic logistic map in DCT coefficients, which is non-blind and requires the help of the key used in encryption.
Abstract: Copyright protection and secrecy of some sensitive data is essential in this present digital era which deals with the advances in cloud computing and big data analytics. Digital watermarking is a popular method for copyright protection whereas cryptography takes care in hiding information as well as for secure transmission of data in a manner that is unreadable to a third party. Combination of both these techniques enhances the security and copyright protection aspects for the concealment of transmitted information. This paper presents a way of achieving those by combining both of these methods together as a joint scheme. Here a robust SVD based algorithm is proposed for embedding a watermark on a host image and then encrypts the resultant stego-image using chaotic logistic map in DCT coefficients. The decryption process is non-blind and requires the help of the key used in encryption. The joint algorithm has been found to be image independent due to its good performance for several popular test images.

2 citations


Journal ArticleDOI
01 Jan 1970
TL;DR: The obtained results from test-bed implementation show the efficiency of proposed scheme in terms of communication and computation cost, number of updated paths and security index due to key updating, while at the same time achieving both forward and backward secrecy.
Abstract: Key management is one of the challenging issues in group communications. It is generally used to secure multicast data transmission as well as preventing potential eavesdropping by malicious attackers. Group security key should be maintained for data encryption, while group key update and dissemination processes are required when a new user joins or leaves the group, which eventually lead to high communication and computation cost. Since eavesdrop activities can be initiated by capturing the disseminated keys, higher communication and computation cost due to frequent updates also increase the possibility of attack of multicast transmission. In this paper, a key management scheme for IPv6 networks is proposed to reduce communication and computation cost and therefore, fewer security risks. The obtained results from test-bed implementation show the efficiency of proposed scheme in terms of communication and computation cost, number of updated paths and security index due to key updating, while at the same time achieving both forward and backward secrecy.

1 citations


Journal Article
TL;DR: A Mathematical model being used for encryption process, which consumes less power when compared to standard algorithms like 3 DES & RSA is used, which is based on a random number having Gaussian Probability Density Function.
Abstract: In this work the encryption mechanism in MANET & WSN is considered. One of the very important parameters with MANET & WSN is its low computing power availability in its real time environment. This study is based on a Mathematical model being used for encryption process, which consumes less power when compared to standard algorithms like 3 DES & RSA. The encrypted form of data during the transmission process will be subjected to errors due to some unavoidable noise sources. These errors can affect the integrity of message or data transfer. The effects of these errors are checked in the present study by modeling the error as a random number having Gaussian Probability Density Function. These errors are stored in a sub data base which can be made use of when corrupted sub key is received at the receiver‟s side.

1 citations


Journal ArticleDOI
01 Jan 1970
TL;DR: From computer simulation results, it showed that the reliability of the proposed system with a cooperative scheme has been improved significantly and the system reliability, the system availability, and the data confidentiality have been improved compared with the conventional scheme.
Abstract: In this paper, a security key recovery system with channel quality awareness (SKRS-CQA) for smart grid applications has been proposed. Firstly, the proper key recovery agents (KRAs) are determined based on the signal-to-noise ratio (SNR) outage probability. The result of such selection includes the number and the index of selected KRAs. Then, the session key (KS) of a Smart Meter Unit (SMU) will be divided into many different pieces according to the proposed key partitioning algorithm and stored in the selected KRAs for the future key recovery if the data concentrator unit (DCU) has lost the key in unexpected events. The outage probability of SNR, the probability of KRA failure, and the probability of key compromising are also investigated. In addition, a 128-bit AES-GCM encryption algorithm is used in each KRA for authentication and identification mechanisms based on a DLMS/COSEM protocol. As shown in the system performance analysis, the system reliability, the system availability, and the data confidentiality have been improved compared with the conventional scheme. Moreover, a cooperative communication network with an amplify-and-forward relaying protocol and an optimal power allocation has been employed for improving the system reliability. From computer simulation results, it showed that the reliability of the proposed system with a cooperative scheme has been improved significantly.

1 citations


Journal ArticleDOI
01 Jan 1970
TL;DR: The proposed encryption methods are effective for strong-edge images that are suitable for lesion-marked fundus images, while random sign-based JPEG 2000, DFT AOIs, and DCT AOI encrypt the images imperfectly.
Abstract: This paper proposes a copyright- and privacyprotected diabetic retinopathy (DR) diagnosis network. In the network, DR lesions are automatically detected from a fundus image by firstly estimating non-uniform illumination of the image, and then the lesions are detected from the balanced image by using level-set evolution without re-initialization. The lesions are subsequently marked by using contours. The lesion-marked fundus image is subsequently shared for intra or inter hospital network diagnosis with copyright and privacy protection. Watermarking technique is used for image copyright protection, and visual encryption is used for privacy protection. Sign scrambling of two dimensional (2D) discrete cosine transform (DCT) and one dimensional (1D) DCT is proposed for lesion-marked fundus image encryption. The proposed encryption methods are compared with other transform-based encryption methods, i.e., discrete Fourier transform (DFT) amplitude-only images (AOIs), DCT AOIs, and JPEG 2000-based discrete wavelet transform (DWT) sign scrambling which were proposed for image trading system. Since the encryption is done after DR diagnosis, contours used for DR marking must also be visually encrypted. The proposed encryption methods are effective for strong-edge images that are suitable for lesion-marked fundus images, while random sign-based JPEG 2000, DFT AOIs, and DCT AOIs encrypt the images imperfectly. Moreover, the proposed methods are better in terms of image quality. In addition, watermarking performance and compression performance are confirmed by experiments.

1 citations