The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays there is an increasing demand for network security, because of the information processing, communications and revolutions. Cryptography offers high security for communication and networking. Elliptic curve scalar multiplication is the most important operation in elliptic curve cryptosystems. This paper focus on secure elliptic curve scalar multiplication development using Karatsuba multiplier...
In Public key cryptosystem a pair of related keys is used by the sender and the receiver. In either the public key or secret key cryptosystem the plain text is considered as an integer number that leads to poor security. In this paper we propose an Quartic Bezier curve based public key cryptosystem over Galois field GF(nm). The plain text is considered as a (x, y) coordinate over the Bezier curve...
Public key cryptosystem or the asymmetric crypto system is more secure than secret key method because of a pair of related keys used by both sender and receiver. The problem in most of the cryptosystem is that the plain text is considered as an integer number that leads poor security. In this paper we propose an efficient Bezier curve based public key cryptography technique over Galois field GF(pm...
This paper is designed for the purpose of commercial security algorithms like the Advanced Encryption Standard (AES). We need to protect the sensitive and valuable data transmitted from satellites to ground. It has increased and hence the need to use encryption on board. AES, which is a very popular choice in world communications, is slowly emerging as the preferred option in the aerospace industry...
As any new technology advancement, cloud computing also creates disruptive possibilities and security risk potentials. Virtualization which are the engine that drives cloud computing turns the data center into self-managing, highly scalable, highly available and pools of easily consumable resources. The increase in virtualization and usage of virtual machines (VM) in cloud computing environment has...
This paper constructs a new EL Gamal-type public key cryptosystem based on the irreducibility of characteristic polynomial of ergodic matrices over, whose security is equivalent to the difficulty of polynomial discrete logarithm problem over binary finite field. Since plaintext is represented by matrix and its message expansion is almost 1, the novel scheme can encrypt effectively more information...
This work presents an optimized Substitution Box (S-Box) for Advanced Encryption Standard (AES) design. The S-Box is one of the most important components of AES. During SubByte transformation, the eight bit input is substituted by eight bit output using the S-Box. S-Box is constructed by composing two transformation -- multiplicative inverse in Galois Field GF(28) followed by an affine transformation...
Composite field arithmetic (CFA) has been widely used in designing combinatorial logic circuits for the S-Box function in the Advanced Encryption Standard (AES) in order to mitigate the performance bottleneck in VLSI implementation. In this work, we first categorize all of the possible composite field AES S-box constructions into four main architectures based on their field representations and the...
High speed and low power SBOX for Advanced Encryption Standard (AES) is proposed in this paper. Composite Galois Field is used in SBOX architecture to reduce size and delay of the circuit. Transmission gate is employed to reduce power consumption of the circuit. The proposed SBOX architecture consumes 186μw at 10MHz. The delay is reduced by 28.1%, and the average power consumption is reduced by 68...
At this moment, main problems of global smart card are created with Rivest-Shamir-Adleman (RSA) public key algorithm because long key length and slow decryption time. Alternative public key encryption can solve these two problems such as Elliptic Curve Cryptography (ECC). Mathematic background of ECC is based on coordinate systems that two main arithmetic operations are explained and RSA encryption...
RSA-like public-key cryptosystem that allows high-speed encryption and decryption is developed. The security of a system is based on the complexity of finding of irreducible polynomials over extended Galois fields.
In this paper, we propose an elliptic curve cryptographic (ECC) architecture for a lower hardware resource. In our work, the different paths of encryption and decryption could be chosen, and the elliptic curve (EC) is based on GF (2163). The EC scalar multiplication is a main operation module that includes add, Montgomery multiplier and inverse in ECC architecture. All modules are organized in a hierarchical...
In this paper, we propose a high-speed parallel GF(2128) bit multiplier for Ghash function in conjunction with its FPGA implementation. Through the use of Verilog the designs are evaluated by using Xilinx Vertax5 with 65 nm technic and 30,000 logic cells. The highest throughput of 30.764 Gpbs can be achieved on Virtex5 with the consumption of 8864 slices LUT. The proposed design of the multiplier...
This paper deals with the elliptic curve encryption algorithm. Its safety is analyzed using the Schoof method. The algorithm work results allow to define a define a secret key in a simple way.
This paper introduces a new (t, n) secret sharing scheme for image encryption. The proposed method encrypts the secret image into two images as the same size of the original image, which one is the public image (called the encrypted image) and another is to be shared among n participants using a new secret sharing method based on the Shamir’s secret sharing. In the new secret sharing scheme, t (or...
Davida, Wells and Kam used the Chinese Remainder Theorem to construct an encryption system allowing access to individual data fields of a record in a relational database. Their system is public-key in the sense that the read and write keys of a given data field are different. In this paper we present a database encryption system based on ideas similar to theirs. It is not public key, but has some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.