The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Combining ElGamal's signature scheme, ElGamal's sequential multi-signature scheme and blind signature scheme, an identity authentication scheme based on USB Key for Trusted Network Connect (UKTNC-IAS) is established to resolve the problem of the limitation of TPM in the identity authentication. Because the authentication to relatively fixed TPM only stands for the machine authentication which is not...
In the world of computing, security and privacy issues are a major concern and cloud computing is no exception to these issues. In this paper we outline a security protocol called as Security as a Service (SasS). We provide a mechanism for achieving maximum security by leveraging the capabilities of a processor called a cryptographic coprocessor. Further we enhance the security of the encrypted data...
This paper presents a mobile security SoC to deal with intensive cryptography algorithms for different security protocols. A MIPS-like general processor, a dedicated package processor for fast data package, and multiple security processors for cryptography are integrated in the SoC. Moreover, the performance can be greatly enhanced by the well-designed DTU (Data Transfer Unit), memory architecture...
We have already proposed a novel DCAS protocol and verified it by simulating the protocol operations. In this paper, we describe more detailed protocol operation and propose the method to control the protocol session efficiently. We showed the stability and effectiveness by the implemented results.
This paper presents a heterogeneous multi-core SoC platform to deal with intensive cryptography algorithms in different security protocols. And several cores are integrated in the proposed Platform, which are a MlPS-like general processor (GP), a dedicated package processor (PP) for fast data package, and multiple security processors (SP) for cryptography. The low-cost dedicated SPs can execute cryptography...
Software-defined radio (SDR) is an emerging technology that facilitates having multiple wireless communication protocols on one device. Current wireless communication protocols, such as HSDPA, HSPA+, Wi-Fi, WiMAX, and LTE, have significant performance requirements while running on this class of device. For these wireless protocols, encryption is often used to protect user data being transmitted over...
An integrated cryptographic processor for public key cryptography for embedded systems is proposed in this contribution. The architecture is designed for computational intensive applications based on hyperelliptic curve cryptography (HECC) in the automotive domain. Authentication protocols based on HECC can be adapted for access control systems and demobilizer applications in today's cars. They can...
Sensor Networks are widely used in several application domains thanks to their data acquisition and data processing capabilities. They are well suited to a multitude of monitoring and surveillance applications and are often involved in mission-critical tasks, thus making security a primary concern. Many architectures and protocols have been proposed to address this issue, mainly based on cryptographic...
In a Heterogeneous distributed Environment, communication between the group members must be secured and authenticated. In a group, the member contribution in forming the group key is important. But forming a group key in a efficient manner is and to minimize the complexity in forming the group key, we are proposing a new protocol which consumes minimum number of key computations, less communication...
This paper presents the field programmable gate array (FPGA) implementation of the Advanced Encryption Standard (AES) with handshake protocol to resistant differential power analysis (DPA). DPA is a powerful side-channel analysis (SCA) attack. A SCA attack takes advantage of implementation specific characteristics to recover the secret parameters involved in the computation. We propose a DPA-resistant...
This paper gives a way of implementing a high-speed and reliable data conversion between UART and WLAN. After introducing the overview of our system, this paper shows the hardware structure and firmware design in brief. Then we analyze the bottleneck of the data conversion and give a way of how to improve and optimize the firmware to complete a high speed and reliable data conversion in detail. We...
We analyze the problem of Trusted Network Connection (TNC) and descript Direct Anonymous Attestation protocol (DAA). A new key distribution scheme based on host integrity and identity is taken out for identity verify, host integrity checking and group key distribution. After this, we bring forward members join protocol and members remove protocol. At Last this paper analyzes the security of this scheme.
Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations...
Multicast communication in dynamic environments like ad hoc networks are potentially of critical concern. As group members move in and out of the group, in order to preserve confidentiality, it becomes imperative to use cryptographic keys with rekeying mechanism each time a user enters or leaves. Therefore, in dynamic environments rekeying introduces a significant computational and communication overhead...
Universal plug and play, or UPnP in short, is a ldquoplug and playrdquo methodology used in network environment. It's designed to share resources, connect network devices and offer control over services. It implements zero-configuration. Developer can save the cost of network setup and concentrate on the offering services only and do not need to concern the under layer protocol. As the wide spreading...
Upgradeability and interoperability are main concerns of Software Defined Radio (SDR). But in the case of military applications, security is also a relevant aspect of SDR. The Secure Software Communication Architecture (SSCA) is a standardized solution to secure SDR. This architecture needs a cryptographic processor for security purposes. However, currently available SSCA compliant ASIC-based cryptoprocessors...
In this paper we present a design methodology for the identification and development of a suitable hardware platform (including dedicated hardware accelerators) for the data plane processing of the LTE protocol stack layer 2 (L2) in downlink direction. For this purpose, a hybrid design approach is adopted allowing first investigations of future mobile phone platforms on the system level (using virtual...
Key management is an important cryptographic primitive upon which other security services are built. Most of the existent pairwise key management protocols consider homogenous ad hoc sensor networks. However, recent researches have demonstrated the limitation of this architecture in terms of performance and scalability. Therefore, this paper focuses on proposing a pairwise key management protocol...
We reduce the required trusted computing base for direct recording electronic (DRE) voting machines with a design based on trusted platform modules (TPMs). Our approach ensures election data integrity by binding the voter's choices with the presented ballot using a platform vote ballot (PVB) signature key managed by the TPM. The TPM can use the PVB key only when static measurements of the software...
Security is the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of some particular purpose. Data security ensures that kind of private and sensitive data from corruption and the access to it is suitably controlled. Enterprise businesses and government agencies around the world face the certainty of losing sensitive data from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.