Novel Hardware Implementation of Modified RC4 Stream Cipher for Wireless Network Security
|
|
|
- Wilfrid Kristian Lawrence
- 10 years ago
- Views:
Transcription
1 Novel Hardware Implementation of Modified RC4 Stream Cipher for Wireless Network Security N. B. Hulle Research Scholar G. H. Raisoni College of Engineering, Nagpur R. D. Kharadkar, PhD. Principal G. H. Raisoni Institute of Engineering and Technology, Pune A. Y. Deshmukh, PhD. HOD Electronics G. H. Raisoni College of Engineering, Nagpur. ABSTRACT This paper presents novel hardware implementation of modified RC4 stream cipher for wireless network security. The Modified RC4 algorithm proposes two changes in conventional RC4 stream cipher algorithm, one in Key Scheduling Algorithm (KSA) stage and other in Pseudorandom Generation Algorithm (PRGA) stage. This modification in KSA removed many weakness and produces random states, so that it will hard to identify any nonuniformity in the permutation after KSA. The other modification in PRGA has destroyed relation between internal states of S-boxes, which is base of many attacks on RC4. The proposed architecture uses variable key length from 1 byte to ( ) 520 bytes but previous designs support maximum key length of 256 bytes. This architecture achieved throughput of Mbps at a clock frequency of MHz independent of key length. The system was implemented in hardware by using VHDL language and Xilinx FPGA device. General Terms Stream ciphers for wireless network security. Keywords KSA, PRGA, RC4, security, stream cipher, hardware. 1. INTRODUCTION Wireless Local Area Network (WLAN) technology shows bright future for different wireless communications industries. The IEEE is one of the most widely used wireless standards. IEEE standard does not provide implementation details, but provides specifications for physical and Media Access Control (MAC) layers. This standard is widely used in ad-hoc and client/server networks but special attention should be given to the security of data in transmission channel. The security of this standard is based on Wired Equivalent Privacy (WEP) scheme. Currently, all the IEEE products support WEP, but IEEE i working group introduced the Advanced Encryption Standard (AES), as the security scheme for the future IEEE applications. The WEP uses two basic components, Pseudorandom Number Generation (PRNG) and the integrity algorithm. The PRNG is the most important component because it is the actually original encryption core. WEP adopts RC4 stream cipher as PRNG unit and Cyclic Redundancy Check (CRC-32) as the integrity algorithm. WEP has several limitations and encryption procedure has no provision for key rotation, users have to transmit the data using same single key; which made cracking of WEP even easier. In response to growing wireless security importance in corporate field, the Wireless Fidelity (Wi-Fi) alliance proposed a new security protocol Wi-Fi Protected Access (WPA). WPA uses RC4 stream cipher as a security algorithm with new dynamic key management method, known as Temporal Key Integrity Protocol (TKIP). TKIP uses Message Integrity Code (MIC) instead of WEP s CRC-32 for ensuring data integrity. WPA is a secure solution for upgradable equipment of WEP but not supporting to WPA2. As far as transmission speed is concerned WPA has edge over WPA2 [1, 2, 3, 4, 5, 6]. RC4 stream cipher was designed by Ron Rivest of RSA Security in 1987 and officially termed "Rivest Cipher 4". The RC4 was initially a trade secret, but in September 1994 the details of RC4 was secretly posted to the cipher punk s mailing list so it leaked in It was soon posted on the sci.crypt newsgroup and many sites on the internet, the algorithm is known to most of the cryptanalysis, it was no longer a trade secret. The proposed hardware supports variable key lengths from 1 byte to 520 bytes and it uses two 256 bytes S-arrays and two 256 bytes K-arrays for implementation, but previous design [7] supports key length from 1 byte to 256 bytes and uses three 256 bytes S-arrays and one 256 bytes K-array with conventional RC4 algorithm, the same can be implemented with only one S-array and one K-array [8]. The proposed implementation needs three clock cycles per byte generation in each stage of KSA and three clock cycles per byte generation in the PRGA. This paper is arranged in following sections. Section 2 describes the conventional RC4 stream cipher algorithm and modified RC4 stream cipher algorithm. In section 3 the proposed novel hardware implementation of modified RC4 algorithm is presented and analyzed in all respects. The VLSI implementation, its results are discussed in section 4 and section 5 concludes the proposed novel architecture. 2. RC4 AND MODIFIED RC4 STREAM CIPHER Conventional RC4 uses a variable length key from 1 byte to 256 bytes to initialize a 256-byte array. There are two 256- bytes arrays, S-Box and K-Box. The S-array is filled linearly such as S0=0, S1=1, S2=2..S255=255. The K-array consists of the key, repeating as necessary times, in order to fill the array. It has the capability of using keys between 1 byte and 256 bytes. The RC4 algorithm works in two phases, KSA and PRGA. During KSA encryption key is used to 1
2 generate an encrypting variable using two arrays, S-array, K- array and N-number of mixing operations. These mixing operations consist of swapping bytes according to RC4 algorithm with the help of i and j pointers [7]. Fig. 1 and 2 shows the conventional RC4 algorithm, which uses two pointers i and j, which are initialized to zero value. In the key setup phase the S-box is being modified according to pseudo-code: KSA: For i= 0 to 255, j = ( j + Si + Ki ) mod 256. PRGA: For i= 0 to 255, j = ( j + Si ) mod 256. From the previous research work on RC4, we know that security of RC4 depends on key used and internal states of S- box. In 2001 Fluhrer, Mantin and Shamir [9] proved that particular pattern of small number of key bits are sufficient to determine the large no of state bits (Invariance weakness) in conventional KSA, but same weakness can be removed by using three layered KSA presented by Subhamoy Maitra and Goutam Paul. [10]. KSA: for i = 0 to N - l S[i] = i; j = 0; for i = 0 to N-1 j = (j + S[i] + k[i]) mod N; swap(s[i],s[j]); i = i + 1 Figure 1: KSA of conventional RC4 PRGA: i = j = 0; Generation loop i = (i + 1) mod N; j = (j + S[i]) mod N; swap(s[i],s[j]); Output = S[(S[i] + S[j]) mod N]; Figure 2: PRGA of conventional RC4 Jian Xie and Xiaozhong Pan proposed improved RC4 algorithm [11] to destroy the relation between internal states of S-box in RC4 algorithm which is base of many attacks in PRGA. We are using three layered KSA proposed by Subhamoy Maitra and Goutam Paul [10] as shown in fig. 3 and PRGA of improved RC4 [11] as shown in fig. 4 in our design to provide more security with RC4 algorithm for data transmission. KSA: Initialization For i = 0,..., N - 1 S 1 [i] = i; S 2 [i] = i; j1 = j2 = 0; Layer 1: Basic Scrambling For i = 0,..., N - 1 j1 = (j1 + S1[i] + K1[i]) mod N; Swap (S1[i], S1[j]); j2 = (j2 + S2[i] + K2[i]) mod N; Swap (S2[i], S2[j]); Layer 2: Scrambling with IV For i =N/2-1 Down to 0 j1 = (j1 + S1[i]) (K1[i] + IV1[i]); Swap(S1[i], S1[j]); j2 = (j2 + S2[i]) (K2[i] + IV2[i]); Swap(S2[i], S2[j]); For i =N/2 to N-1 j1 = (j1 + S1[i]) (K1[i] + IV1[i]); Swap (S1[i], S1[j]); j2 = (j2 + S2[i]) (K2[i] + IV2[i]); Swap (S2[i], S2[j]); Layer 3: Zigzag Scrambling For y = 0,..., N 1 If y 0 mod 2 then Figure i =y/2; 3. Modified KSA else i = N (y+1)/2; j1 = (j1 + S1[i] + K1[i]); Swap (S1[i], S1[j]); j2 = (j2 + S2[i] + K2[i]); Swap (S2[i], S2[j]); Figure 3: KSA of modified RC4 Algorithm The improved RC4 [11] chooses keys k1 and k2 as a secret key and two S-boxes S1 and S2. In improved RC4 only one layer basic scrambling is used in KSA but proposed design uses three layered KSA [10]. The first layer reduces key correlation with permutation bytes and other biases to some extent at the start of KSA. In second layer index i is incremented from middle to bottom and middle to top respectively, so that the values in the bottom quarter and top quarter permutation, which were biased to linear combination 2
3 of secret key bytes were swapped. This helps in removing the biases in the range of 0 to N-1 of S-box. In the third layer, scrambling is performed in zig-zag fashion. Index i takes the values in the form of 0, 255, 1, 254,, 126, 129, 127,128[10]. Modified RC4 algorithm uses variable length key from 1 byte to 520 bytes to initialize two 256-byte k-arrays and eight bit as LFSR initialization vector. It consists of four 256-bytes arrays, two S-Boxes and two K-Boxes. Each S-array is filled linearly such as S0=0, S1=1, S2=2..S255=255. The K- array consists of the key, repeating as necessary times, in order to fill the both arrays. PRGA: i = j l = j 2 = 0; Generation loop i = i + 1; j l = j l + S 1 [i]; swap(s 1 [i], S 1 [j 1 ]); j 2 = j 2 + S 2 [i]; swap(s 2 [i], S 2 [j 2 ]); Output = S 1 [(S 1 [i] + S 1 [j 1 ]) mod N]; Output = S 2 [(S 2 [i] + S 2 [j 2 ]) mod N]; swap(s 1 [S 2 [j 1 ]], S 1 [S 2 [j 2 ]]); swap(s 2 [S 1 [j 1 ]], S 2 [S 1 [j 2 ]]); Figure 4: PRGA of modified RC4 During KSA, encryption key is used to generate an encrypting variable using two arrays, S-array, K-array and N-number of mixing operations. These mixing operations consist of swapping bytes according to keys k1 and k2 as a secret key for two S-boxes S1 and S2 respectively having 256 elements from 0 to 255. The Proposed algorithm uses three pointers i, j1 and j2, which are initialized to zero value and updated as per following equations. KSA: layer 1: For i= 0 to 255, j1 = ( j1 + S1[i] + K1[i] ) mod 256 and j2 = ( j2 + S2[i] + K2[i] ) mod 256. KSA: Layer2: For i =256/2-1 Down to 0, j1 =( j1 + S1[i]) (K1[i] + IV1[i]) mod 256, j2 =( j2 + S2[i]) (K2[i] + IV2[i]) mod 256, For i =256/2 to 256-1, j1 = (j1 + S1[i]) (K1[i] + IV1[i]) mod 256, j2 = (j2 + S2[i]) (K2[i] + IV2[i]) mod 256, KSA: Layer 3: i= 0, 255, 1, 254,, 126, 129, 127,128. j1 = (j1 + S1[i] + K1[i]), j2 = (j2 + S2[i] + K2[i]). During PRGA, S1 and S2 are used to generate two pointers j1 and j2 as shown, PRGA: For i= 0 to 255, j1 = ( j1 + S1[i] ) mod 256 and j2 = ( j2 + S2[i] ) mod 256 [10]. 3. PROPOSED ARCHITECTURE Fig. 5 shows the block diagram of proposed architecture consisting of four 256 bytes RAM and used as S-RAM1 (S1), SRAM2 (S2), K-RAM1 (K1), KRAM2 (K2) with necessary control unit and address generator logic. Due to parallel structure of this novel architecture two parallel streams are generated from S-RAM1 and S-RAM2. More confusion at the output side can be added by selecting one of the streams randomly from MUX out by using 8 bit LFSR as select lines, whose feedback function is represented by primitive polynomial x8 + x4 + x3 + x The MUX output is pseudorandom byte converted into serial form using key searilizer. The eight byte FIFO is used to store eight bytes of data and converted into serial form by data searilizer. Finally two streams are Ex-ORed to obtain encrypted serial data out [8, 12, 13]. Fig. 6 shows the state diagram of proposed architecture. It goes through following twelve states of architecture, such as Idle, Initial, Addr2Cal, Addr2Ld, SJ, SwapSI, SwapSJ, SwapS1S2, Addr2Gen, TCal, KByte and Encryption [12,13]. The block diagram showing complete architecture with detailed connections of K-RAM1, S-RAM1, K-RAM2, S- RAM2 and necessary swap logic is shown in figure 7. The KSA of RC4 stream cipher is divided into three layers and four steps. In the first step two S-Boxes are linearly filled from 0 to 255 using two eight bit counters Addr11 and Addr12. When signals RST = 0, layer1cntl=0, layer2cntl=1, down=1 and layer3cntl=1 then initial values of counter Addr11 and Addr12 are set to The count value from Addr11 is used as address for S-RAM1, K-RAM1 and same is used as data for S-RAM1, similarly the count value from Addr12 is used as address for S-RAM2, K-RAM2 and data for S-RAM2. This step needs 256 clock cycles to fill 256 memory locations of S-RAM1, K-RAM1, S-RAM2 and K-RAM2. When Initialover=1 then system enters into step 2 [10, 12, 13]. In the second step both S-Boxes are randomized by using three pointers i, j1, j2 and four memory boxes S1, S2, K1, K2. During first clock cycle when RST = 0, layer1cntl=0, layer2cntl=1, down=1 and layer3cntl=1 then Addr11 and Addr12 are set to Addr11 is used as pointer i and gives address for K-RAM1, SRAM1, and Addr12 gives address for K-RAM2 and SRAM2. The contents from S- RAM1 and S-RAM2 are loaded into S_Reg1 and S_Reg3 by selecting proper value from each DataDMux. This loaded value acts as S1[i] and S2[i]. The Addr21 and Addr22 gives the current value of pointer j and Adder11 and Adder12 are used to calculate new values of the pointer j1= j1 + S1[i] + K1[i] mod 256 and j2 = j2 + S2[i] + K2[i] mod 256 respectively. These calculated values of pointer j1 and j2 are loaded into Addr21 and Addr22 in the second clock cycle, which are used as address for S-RAM, the contents of these locations are loaded into S_Reg2 and S_Reg4 by selecting 3
4 Figure 5: Block diagram of proposed architecture Figure 6: State diagram of proposed architecture 4
5 proper value from each DataDMux. In the third clock cycle the values of four shift registers are used for swapping the contents of S-RAM1 and S-RAM2 by selecting proper input from each AddrMux as an address. The shift registers S_Reg1 and S_Reg2 are used for swapping the contents of S-RAM1 and S_Reg3 and S_Reg4 are used to swap the contents of S- RAM2. These contents are swapped by selecting proper value from DataMux as a data and loaded into S-RAM1 and S- RAM2. This step needs three clock cycles per iteration. So, the total numbers of clock cycles needed for second step of KSA are 256*3 = 768 [10, 12, 13]. Third step works in two phases. In the first phase memory locations from 127 to 0 of both S-boxes are again randomized by using pointers i, j1, j2, four memory boxes S1, S2, K1, K2 and two initialization vectors IV1, IV2. During the first clock cycle of this step when RST = 0, layer1cntl=1, layer2cntl=0, down=0 and layer3cntl=1 then initial values of counter Addr11 and Addr12 becomes 127 and these two counters works as down counter. Addr11 is used as pointer i and gives address for K-RAM1, SRAM1, and Addr12 gives address for K-RAM2 and SRAM2. The contents from S-RAM1 and S- RAM2 are loaded into S_Reg1 and S_Reg3 by selecting proper value from each DataDMux. This loaded value acts as S1[i] and S2[i]. The similar procedure is used as used in step two to calculate (j1 + S1[i]) mod 256 and (j2 + S2[i]) mod 256 only difference is that K1i and K2i are not selected for addition in Adder11 and Adder12 respectively. Similarly Adder31 and Adder32 calculates (K1i + IV1i) and (K2i + IV2i) respectively. These calculated values are Ex-ORed and used as new values of j1 and j2 and loaded into Addr21 and Addr22 in the second clock cycle, which are used as address for S-RAM, the contents of these locations are loaded into S_Reg2 and S_Reg4 by selecting proper value from each DataDMux. In the third clock cycle the swapping is achieved. This step needs three clock cycles per iteration. So, the total numbers of clock cycles needed for this phase are 128*3 = 384 [10, 12, 13]. In the second phase memory locations from 128 to 255 of both S-boxes are randomized by using the similar procedure as in first phase. During this step when RST = 0, layer1cntl=1, layer2cntl=0, down=1 and layer3cntl=1 then initial values of counter Addr11 and Addr12 becomes 128 and two these two counters works as up counter. During first clock cycle Addr11 and Add12 provides value of pointer i and gives address for K-RAM, SRAM. The contents from S- RAM1 and S-RAM2 are loaded into S_Reg1 and S_Reg3 by selecting proper value from each DataDMux. This loaded value acts as S1[i] and S2[i]. The new value of j is calculated and loaded in Addr21 and Addr22 in the second clock cycle, which are used as address for S-RAM, the contents of these locations are loaded into S_Reg2 and S_Reg4 by selecting proper value from each DataDMux. In the third clock cycle swapping is carried out. This step also needs three clock cycles per iteration. So, the total numbers of clock cycles needed in this phase also 128*3 = 384 [10, 12, 13]. In the fourth step both S-Boxes are randomized again by using zig-zag pointer i. The other pointers for this step are j1, j2 and four memory boxes S1, S2, K1, K2. During first clock cycle when RST = 0, layer1cntl=1, layer2cntl=1, down=1 and layer3cntl=0 then Addr11 and Addr12 are providing values in zig-zag manner (0, 255, 1, 254,, 126, 129, 127,128). Addr11 and Addr12 are used as pointer i and gives address for K-RAM, SRAM in both stages respectively. The contents from S-RAM1 and S-RAM2 are loaded into S_Reg1 and S_Reg3. This loaded value acts as S1[i] and S2[i]. The Addr21 and Addr22 gives the current value of pointer j and Adder11 and Adder12 are used to calculate new values of the pointer j1= j1 + S1[i] + K1[i] mod 256 and j2 = j2 + S2[i] + K2[i] mod 256 respectively. These calculated values of pointer j1 and j2 are loaded into Addr21 and Addr22 in the second clock cycle, which are used as address for S-RAM, the contents of these locations are loaded into S_Reg2 and S_Reg4. In the third clock cycle the values of four shift registers are used for swapping the contents of S-RAM1 and S-RAM2 by selecting proper input from each AddrMux as a address. The shift registers S_Reg1 and S_Reg2 are used for swapping the contents of S-RAM1 and S_Reg3 and S_Reg4 are used to swap the contents of S-RAM2. This step needs three clock cycles per iteration. So, the total numbers of clock cycles needed for second step of KSA are 256*3 = 768 [10, 12, 13]. During PRGA same hardware is used but new value of j is calculated by using j= j + Si, for this Mux1 and Mux2 output is selected by each Sel, which is , added by same adder11 and adder12. Finally Adder21 and Adder22 are used to generate Si + Sj and given as address to S-RAM1 and S- RAM2. Two key streams are available, one at output of S- RAM1 and other at output of S-RAM2. One of the byte from S-RAM1 or S-RAM2 is selected by MuxOut by using eight bit LFSR as a select line of MUX and given to KeyStreamSerializer for converting it into serial form [8, 9, 11]. The new idea used in the proposed architecture to break relations between states of S-Boxes [11], for that after every 256 byte generation of key, the contents of S-RAM1 and S- RAM2 are swapped by using secrete pointer S1[S2[j1]], S1[S2[j2]] for S-RAM1 and S2[S1[j1]], S2[S1[j2]] for S- RAM2, this will destroys base of many attacks on RC4 stream cipher. Besides, this design uses two S-boxes, it generates two output byte in one loop which double that of conventional RC4 [7] and internal states of S-boxes becomes N!XN!, hence output stream generated by new RC4 algorithm is more secure than conventional RC4. Another important aspect of this new RC4 algorithm is the parallel structure. Two S-RAM blocks generates the pseudorandom key in parallel form, so new RC4 implementation takes the same time as that of previous structure with more security in PRGA. The data is taken from data base and eight bytes of data are fetched in advance and stored in FIFO. One byte at a time is given to DataSerializer, to convert in data stream. Finally, key stream is taken from key stream generation module and data stream is taken from data stream generation module, which is plain text. These two streams are Ex-ORed to generate encrypted data and transmitted on RF interface. 5
6 Figure 7: Architecture of proposed system 6
7 4. VLSI IMPLEMENTATION RESULTS OF MODIFIED RC4 STREAM CIPHER The proposed architecture was made in VHDL [13,14] language on Xilinx Virtex4 series chips[15]. The software used was PC version Xilinx ISE 8.1i and used device was XC4VSX25, with package of FF All the system components were designed by behavioral and data flow modeling. These components were connected on top module by using structural modeling. The complete design was tested by test vectors [16] and synthesized, placed and routed by above device. Design information and device utilization summary for the proposed architecture is as shown below. and implementation [18] needs *n cycles but it works with fixed key. Comparison between the modified version of improved RC4 implementation and some of other reported implementations [7,17,18] are given in table I, but previous implementations [7,8,17,18] has two major drawbacks invariance weakness in KSA and fixed relations between states of S-Boxes in PRGA. Design Information Command Line: C:\Xilinx\bin\nt\map.exe-ise E:/HulleRC4/RC4STREAMCIPHRE.ise-intstyle ise -p xc4vsx25-ff cm area -pr b -k 4 -c 100 -o TopModule_map.ncd TopModule.ngd TopModule.pcf Target Device : xc4vsx25 Target Package : ff668 Target Speed : -12 Mapper Version : virtex4 -- $Revision: 1.34 $ Mapped Date : Sun May 08 07:44: =========================================== Device utilization summary: Figure 8: RTL Schematic diagram of proposed Architecture Selected Device : 4vsx25ff Number of Slices: 7626 out of % Number of Slice Flip Flops: 8627 out of % Number of 4 input LUTs: out of % Number of bonded IOBs: 42 out of % Number of FIFO16/RAMB16s: 1 out of 128 0% Number used as RAMB16s: 1 Number of GCLKs: 2 out of 32 6% =========================================== Fig. 8 shows RTL schematic diagram of top module and Fig. 9 shows simulated output results of top module using ISE simulator. The proposed architecture needs 256 clock cycles in first step of KSA, ( = 2304) clock cycles are needed in second, third and fourth step of KSA and 3*n clock cycles are needed in PRGA. (n is number of bytes of plain text). The implementation [7] needs *n clock cycles, 256 cycles to fill S-Box linearly and 768 cycles for second step of KSA. The implementation [17] needs *n clock cycles Figure 9: Output waveforms of proposed Architecture Table 1: RC4 Implementations Comparison 7
8 RC4 Architecture 7 17 Software 18 Proposed CLB Slices Frequency (MHz) Throughput (MB/s) CONCLUSION A novel hardware implementation of the modified RC4 stream cipher algorithm for wireless network security is presented in this paper. The proposed architecture provides maximum throughput of MB/s at a clock frequency of MHz after initial 2304 clock cycles. The key used is variable from 1 byte to 520 bytes but previous design [7,8,18] supports only for key length of 1 byte to 256 bytes or less. The similar architecture using previous design [7] may consume total memory of 2048 bytes but proposed architecture is implemented by using 1024 bytes of RAM [8]. This new RC4 algorithm removed key correlation with permutation bytes, other biases and invariance weakness in KSA and destroyed relations between the states of S-boxes, which is the base of many attacks in PRGA stage of RC4 algorithm. The proposed design is more secure and flexible in comparison with previous designs. 6. REFERENCES [1] K. Sali, T. Hamalainen, J. Knuutila, J. Saarinen, Security Design for A New Wireless Local Area Network TUTWLAN, The Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 98), Septenber 8-11, 1998, Boston, USA, pp [2] B. Schneier, "Applied Cryptography Protocols, Algorithms and Source Code in C", Second Edition, John Wiley and Sons, New York, pp [3] A. Menezes, P. van Oorschot, and S. Vanstone, "Handbook of Applied Cryptography", CRC Press, pp [4] Andrew S. Tanenbaum, Computer Networks, Fourth edition, Peaeson Education, pp [5] Overview of IEEE b security, Intel technology Journal Q2, [6] Jesse Walker, Overview of IEEE 802.1lb Security, Intel Technology Journal Q2, pp [7] P.kitsos, G. Kostopoulos, N. Sklavos and O.Koufopavlou Hardware implementation of the RC4 stream cipher.vlsi design laboratory, /04/$20.00/2004 IEEE. pp [8] Vandana Malode, Hulle Nagnath Hardware Implementation of RC4 Stream Cipher for Wi-Fi Security National Conference of Mobile and Pervasive Computing- 2009, Department of Information Science and Engineering, NMAM Institute of Technology, Nitte Dist. Udupi, (Karanataka). pp [9] S. Fluhrer, I. Mantin, Shamir. "Weaknesses in the key scheduling algorithm of RC4 ". In Proc. 8ih Workshop on Selected Areas in Cryptography, LNCS Springer- Verlag, pp [10] Subhamoy Maitra, Goutam Paul, Analysis of RC4 and Proposal of Additional Layers for Better Security Margin International Conference on Cryptology in India (INDOCRYPT 2008), IIT, Kharagpur. [11] Jian Xie and Xiaozhong Pan An Improved RC4 Stream Cipher, Department of Electronic Technology, Xi'an, China, //10/$26.00/2010 IEEE. pp. V [12] Morris Mano, Digital Design, Third edition, Prentice Hall of India, pp [13] Stephen Brown Zvonk Vransic, Fundamentals of Digital Logic Design with VHDL, Second editation, Tata Mcgraw Hill, pp [14] Douglas A. Pucknell, Kamran Eshraghian, Basic VLSI design, 3rd Edition, Prentice Hall of India, pp [15] Xilinx Inc., San Jose, Calif., "Virtex, 2.5 V Field Programmable Gate Arrays," 2003, [16] Confirmed Test Vector for RC4, [17] B.Schneier, D.Whiting,"Fast Software Encryption : Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor ", Fast Software Encryption workshop (FSE97), LNCS, Vol.1267, pp , Springer-Verlag, Haifa, Israel, January20-22,1997. [18] P. Hamalainen, M. Hannikainen, T. Hamalainen and J. Snarinen, "Hardware Implementation of the Improved WEP and RC4 Encryption Algorithms for Wireless Terminals", The European Signal Processing Conference (EUSIPCO'2000), September 5-8, 2000, Tampere, Finland, pp
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) Vipin Poddar Suresh Gyan Vihar School of Engginering And Technology, Jaipur, Rajasthan. Hitesh Choudhary, Poornima University, Jaipur,
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication
WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will
Implementation and Design of AES S-Box on FPGA
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
Wireless Security. Jason Bonde ABSTRACT. 2. BACKGROUND In this section we will define the key concepts used later in the paper.
Wireless Security Jason Bonde University of Minnesota, Morris [email protected] ABSTRACT Wireless internet has become a popular way of accessing the Internet. While wireless internet does have the
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0020 ISSN (Online): 2279-0039 International
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Vulnerabilities of Wireless Security protocols (WEP and WPA2)
Vulnerabilities of Wireless Security protocols (WEP and WPA2) Vishal Kumkar, Akhil Tiwari, Pawan Tiwari, Ashish Gupta, Seema Shrawne Abstract - Wirelesses Local Area Networks (WLANs) have become more prevalent
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2) Disha Baba Banda Singh Bahadur Engineering College Fatehgarh Sahib, Punjab Sukhwinder Sharma Baba Banda Singh Bahadur Engineering College Fatehgarh
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Open Flow Controller and Switch Datasheet
Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development
Multi-Layered Cryptographic Processor for Network Security
International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS
A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS Jose Perez Texas A&M University Corpus Christi Email: [email protected] Fax Number: (361) 825-2795 Faculty Advisor: Dr. Ahmed Mahdy, Texas A&M University
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Linux Access Point and IPSec Bridge
Tamkang Journal of Science and Engineering, Vol. 6, No. 2, pp. 121-126 (2003) 121 Linux Access Point and IPSec Bridge T. H. Tseng and F. Ye Department of Electrical Engineering Tamkang University Tamsui,
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
Vulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3
Vulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3 1. Abstract Wired Equivalent Privacy (WEP) was the first encryption scheme used for protecting wireless traffic. It consisted of a private
ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT
216 ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT *P.Nirmalkumar, **J.Raja Paul Perinbam, @S.Ravi and #B.Rajan *Research Scholar,
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware Shaomeng Li, Jim Tørresen, Oddvar Søråsen Department of Informatics University of Oslo N-0316 Oslo, Norway {shaomenl, jimtoer,
40G MACsec Encryption in an FPGA
40G MACsec Encryption in an FPGA Dr Tom Kean, Managing Director, Algotronix Ltd, 130-10 Calton Road, Edinburgh EH8 8JQ United Kingdom Tel: +44 131 556 9242 Email: [email protected] February 2012 1 MACsec
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
A Compact FPGA Implementation of Triple-DES Encryption System with IP Core Generation and On-Chip Verification
Proceedings of the 2010 International Conference on Industrial Engineering and Operations Management Dhaka, Bangladesh, January 9 10, 2010 A Compact FPGA Implementation of Triple-DES Encryption System
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator Souradyuti Paul and Bart Preneel Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Kasteelpark Arenberg 10, B 3001 Leuven-Heverlee,
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
Evaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Hardware Implementations of RSA Using Fast Montgomery Multiplications. ECE 645 Prof. Gaj Mike Koontz and Ryon Sumner
Hardware Implementations of RSA Using Fast Montgomery Multiplications ECE 645 Prof. Gaj Mike Koontz and Ryon Sumner Overview Introduction Functional Specifications Implemented Design and Optimizations
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
Design and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
How To Fix A 3 Bit Error In Data From A Data Point To A Bit Code (Data Point) With A Power Source (Data Source) And A Power Cell (Power Source)
FPGA IMPLEMENTATION OF 4D-PARITY BASED DATA CODING TECHNIQUE Vijay Tawar 1, Rajani Gupta 2 1 Student, KNPCST, Hoshangabad Road, Misrod, Bhopal, Pin no.462047 2 Head of Department (EC), KNPCST, Hoshangabad
The implementation and performance/cost/power analysis of the network security accelerator on SoC applications
The implementation and performance/cost/power analysis of the network security accelerator on SoC applications Ruei-Ting Gu [email protected] Kuo-Huang Chung [email protected]
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
Wireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA
Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security (WS 2003: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control (MAC and physical characteristics
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
Technical Note. Micron NAND Flash Controller via Xilinx Spartan -3 FPGA. Overview. TN-29-06: NAND Flash Controller on Spartan-3 Overview
Technical Note TN-29-06: NAND Flash Controller on Spartan-3 Overview Micron NAND Flash Controller via Xilinx Spartan -3 FPGA Overview As mobile product capabilities continue to expand, so does the demand
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
SDLC Controller. Documentation. Design File Formats. Verification
January 15, 2004 Product Specification 11 Stonewall Court Woodcliff Lake, NJ 07677 USA Phone: +1-201-391-8300 Fax: +1-201-391-8694 E-mail: [email protected] URL: www.cast-inc.com Features AllianceCORE
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
CS 336/536 Computer Network Security. Summer Term 2010. Wi-Fi Protected Access (WPA) compiled by Anthony Barnard
CS 336/536 Computer Network Security Summer Term 2010 Wi-Fi Protected Access (WPA) compiled by Anthony Barnard 2 Wi-Fi Protected Access (WPA) These notes, intended to follow the previous handout IEEE802.11
Design and Verification of Nine port Network Router
Design and Verification of Nine port Network Router G. Sri Lakshmi 1, A Ganga Mani 2 1 Assistant Professor, Department of Electronics and Communication Engineering, Pragathi Engineering College, Andhra
DDS. 16-bit Direct Digital Synthesizer / Periodic waveform generator Rev. 1.4. Key Design Features. Block Diagram. Generic Parameters.
Key Design Features Block Diagram Synthesizable, technology independent VHDL IP Core 16-bit signed output samples 32-bit phase accumulator (tuning word) 32-bit phase shift feature Phase resolution of 2π/2
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS
AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS Chang N. Zhang and Qian Yu Department of Computer Science, University of Regina 3737 Wascana Parkway, Regina, SK S4S 0A2 Canada {zhang, yu209}@cs.uregina.ca
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Floating Point Fused Add-Subtract and Fused Dot-Product Units
Floating Point Fused Add-Subtract and Fused Dot-Product Units S. Kishor [1], S. P. Prakash [2] PG Scholar (VLSI DESIGN), Department of ECE Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu,
Cryptography and Network Security Block Cipher
Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a
AES (Rijndael) IP-Cores
AES (Rijndael) IP-Cores Encryption/Decryption and Key Expansion Page 1 Revision History Date Version Description 24 February 2006 1.0 Initial draft. 15 March 2006 1.1 Block diagrams added. 26 March 2006
A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number
A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number 1 Tomohiro KAMIMURA, 2 Akinori KANASUGI 1 Department of Electronics, Tokyo Denki University, [email protected]
Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
The Stream Cipher HC-128
The Stream Cipher HC-128 Hongjun Wu Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium [email protected] Statement 1. HC-128 supports 128-bit
Chapter 2 Logic Gates and Introduction to Computer Architecture
Chapter 2 Logic Gates and Introduction to Computer Architecture 2.1 Introduction The basic components of an Integrated Circuit (IC) is logic gates which made of transistors, in digital system there are
WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 5, May 2015, 23-30 Impact Journals WI-FI SECURITY: A LITERATURE
XIV. Title. 2.1 Schematics of the WEP. 21. 2.2 Encryption in WEP technique 22. 2.3 Decryption in WEP technique. 22. 2.4 Process of TKIP 25
XIV LIST OF FIGURES Figure Title Page 2.1 Schematics of the WEP. 21 2.2 Encryption in WEP technique 22 2.3 Decryption in WEP technique. 22 2.4 Process of TKIP 25 2.5 IEEE 802.1x Structure 30 2.6 RSNA Architecture
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan
Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan Abstract AES is an encryption algorithm which can be easily implemented on fine grain many core systems.
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions
Assignment ELECTENG702 Advanced Embedded Systems Improving AES128 software for Altera Nios II processor using custom instructions October 1. 2005 Professor Zoran Salcic by Kilian Foerster 10-8 Claybrook
Advanced Security Issues in Wireless Networks
Advanced Security Issues in Wireless Networks Seminar aus Netzwerke und Sicherheit Security Considerations in Interconnected Networks Alexander Krenhuber Andreas Niederschick 9. Januar 2009 Advanced Security
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
Hardware Implementation of the Stone Metamorphic Cipher
International Journal of Computer Science & Network Security VOL.10 No.8, 2010 Hardware Implementation of the Stone Metamorphic Cipher Rabie A. Mahmoud 1, Magdy Saeb 2 1. Department of Mathematics, Faculty
EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2)
EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2) Moffat Mathews, Ray Hunt Department of Computer Science and Software Engineering, University of Canterbury, New Zealand {[email protected]}
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
Implementation of Modified Booth Algorithm (Radix 4) and its Comparison with Booth Algorithm (Radix-2)
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 6 (2013), pp. 683-690 Research India Publications http://www.ripublication.com/aeee.htm Implementation of Modified Booth
synthesizer called C Compatible Architecture Prototyper(CCAP).
Speed Improvement of AES Encryption using hardware accelerators synthesized by C Compatible Architecture Prototyper(CCAP) Hiroyuki KANBARA Takayuki NAKATANI Naoto UMEHARA Nagisa ISHIURA Hiroyuki TOMIYAMA
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
10/100 Mbps Ethernet MAC
XSV Board 1.0 HDL Interfaces and Example Designs 10/100 Mbps Ethernet MAC VLSI Research Group Electrical Engineering Bandung Institute of Technology, Bandung, Indonesia Last Modified: 20 September 2001
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
