با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
A simulated approach to evaluate side-channel attack countermeasures for the Advanced Encryption Standard
یک روش شبیه سازی شده برای ارزیابی اقدامات متقابل حمله کانال جانبی برای استاندارد رمزگذاری پیشرفته-2019 Modern networks have critical security needs and a suitable level of protection and performance is usually achieved with the use of dedicated hardware cryptographic cores. Although the Advanced Encryption Standard (AES) is considered the best approach when symmetric cryptography is required, one of its main weaknesses lies in its measurable power consumption. Side-Channel Attacks (SCAs) use this emitted power to analyse and revert the mathematical steps and extract the encryption key.
Nowadays they exist several dedicated equipment and workstations for SCA weaknesses analysis and the evaluation of the related countermeasures, but they can present significant drawbacks as a high cost for the instrumentation or, in case of cheaper instrumentation, the need to underclock the physical circuit implementing the AES cipher, in order to adapt the circuit clock frequency accordingly to the power sampling rate of ADCs or oscilloscopes bandwidth. In this work, we proposed a methodology for Correlation and Differential Power Analysis against hardware implementations of an AES core, relying only on a simulative approach. Our solution extracts simulated power traces from a gate-level netlist and then elaborates them using mathematical-statistical procedures. The main advantage of our solution is that it allows to emulate a real attack scenario based on emitted power analysis, without requiring any additional physical circuit or dedicated equipment for power samples acquisition, neither modifying the working conditions of the target application context (such as the circuit clock frequency). Thus, our approach can be used to validate and benchmark any SCA countermeasure during an early step of the design, thereby shortening and helping the designers to find the best solution during a preliminary phase and potentially without additional costs. |
مقاله انگلیسی |
2 |
Determining whether a given cryptographic function is a permutation of another given cryptographic function—A problem in intellectual property
تعیین اینکه آیا یک کارکرد رمزنگاری شده ، تغییر در عملکرد رمزنگاری داده شده دیگر است — مشکلی در مالکیت معنوی-2019 Imagine that, in order to avoid patent fees, licensing agreements, or export restrictions, someone permutes the plaintext bits, ciphertext bits, or key bits of a block cipher. All security properties of the block cipher would be preserved. There are many possible such permutations (e.g. 23116.32for the Advanced Encryption Standard, AES-256). It might seem infeasible to detect this fraud, and even harder to determine the permutation matrices used. Instead of a block cipher, it could be the compression function of a cryptographic hash, or any other cryptographic function.
This paper presents an algorithm whereby this fraud could be easily detected, by means of a SAT-Solver—a standard off-the-shelf software package that solves small-to-medium sized instances of the logical satisfiability problem. This paper also presents how this problem can be modeled in a system of polynomial equations (e.g. in the context of algebraic cryptanalysis). Moreover, this problem is related to the “isomorphism of polynomials” problem and that connection is explored at length. Keywords: Algebraic cryptanalysis | Block ciphers | Circuit equivalence | Intellectual property fraud detection | Isomorphism of polynomials | Logical satisfiability solvers (SAT-solvers) | Polynomials mod 2 |
مقاله انگلیسی |
3 |
Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
روش های مبتنی بر بلاکچین-PSO-AES در بیومتریک رگ های انگشت: یک چارچوب تأیید صحت جدید برای احراز هویت بیمار-2019 The main objective of this study is to propose a novel verification secure framework for patient authentication
between an access point (patient enrolment device) and a node database. For this purpose, two stages are used.
Firstly, we propose a new hybrid biometric pattern model based on a merge algorithm to combine radio frequency
identification and finger vein (FV) biometric features to increase the randomisation and security levels in
pattern structure. Secondly, we developed a combination of encryption, blockchain and steganography techniques
for the hybrid pattern model. When sending the pattern from an enrolment device (access point) to the
node database, this process ensures that the FV biometric verification system remains secure during authentication
by meeting the information security standard requirements of confidentiality, integrity and availability.
Blockchain is used to achieve data integrity and availability. Particle swarm optimisation steganography and
advanced encryption standard techniques are used for confidentiality in a transmission channel. Then, we discussed
how the proposed framework can be implemented on a decentralised network architecture, including
access point and various databases node without a central point. The proposed framework was evaluated by 106
samples chosen from a dataset that comprises 6000 samples of FV images. Results showed that (1) high-resistance
verification framework is protected against spoofing and brute-force attacks; most biometric verification
systems are vulnerable to such attacks. (2) The proposed framework had an advantage over the benchmark with
a percentage of 55.56% in securing biometric templates during data transmission between the enrolment device
and the node database. Keywords: Finger vein | Blockchain | Cryptography | Steganography | RFID | CIA |
مقاله انگلیسی |
4 |
Secure Transmission of DICOM Images by comparing different cryptographic algorithms
انتقال ایمن تصاویر DICOM با مقایسه الگوریتم های رمزنگاری مختلف-2019 This paper aims to implement the concept of preserving the Confidentiality and Integrity of DICOM Images Using Cryptographic
Algorithms. This work uses two types of cryptographic algorithms namely AES (Advanced Encryption Standard) and Blake
Hash Function. Using these algorithms, we implement and check the confidentiality and integrity of DICOM images. Our
proposed system also ensures that the images are transferred from one hospital database to another in a secure manner and the
system will be able to tackle any changes while the image is being transferred. The initial concern of the system lies in providing
confidentiality in the communication of the images which can be done using AES algorithm. The integrity can be provided using
Blake Hash Function. The comparative analysis of AES with other algorithms such as Triple DES, IDEA, Blowfish and SEED
with respect to their execution time is also done. In this work, DICOM files are taken as input and then kept in the encrypted
format for storage purpose and also they can be sent over the network in the encrypted format. Keywords: DICOM images | Confidentiality | Integrity | Cryptography | Advanced Encryption Standard (AES) | Blake Hash Function |
مقاله انگلیسی |
5 |
Cryptographic system for data applications, in the context of internet of things
سیستم رمزنگاری برای برنامه های داده ، در متن اینترنت اشیاء-2019 With each passing day, Internet of Things (IoT), has the potential to transform our society to a more dig- ital way. In this paper, a cryptographic system is proposed, which has been designed and implemented, following the IoT optimized technologies. As the benefits of IoT are numerous, the need for a privacy platform is more than necessary to be developed. This work aims to demonstrate this by, firstly, imple- menting efficient and flexible, the fundamentals primitives of cryptography and privacy. Secondly, this is achieved, by introducing applied cryptography, in a more interactive and flexible approach. The proposed system and the incorporation of this platform is scrutinized. In the context of this work, an application of symmetric cryptography is introduced, based on the Advanced Encryption Standard (AES) in Electronic Code Book (ECB), Cipher Block Chaining (CBC) and Counter (CTR) modes of operation, for both encryption and decryption of texts, images and electronic data applications. In addition two other security schemes are supported by the proposed system: AES Galois/Counter Mode (GCM) and AES Galois Message Authen- tication Code (GMAC). The GCM proposed integration, in an authentication scheme, designed to provide authenticity and confidentiality, at the same time. On the other hand, GMAC, can be applied as message authentication code. Both operations, are optimized in sense of implementation resources, since the ma- jor cost is targeted to AES core. In addition, based on the integrated hardware modules, user registration and validation is proposed and implemented, with no additional cost, and with no performance penalty. Furthermore, two factor authentication has been designed and proposed, based on One Time Passwords (OTP), which can been produced with a random procedure. After these, a reference to the security lev- els, as regards to the communication between the IoT layers of the architecture, is presented. IoT hard- ware platforms are facing lack of security level and this brings the opportunity to use advanced security mechanisms. Implementation comparison results emphasize the importance of testing and measuring the performance of the alternative encryption algorithms, supported by hardware platforms. Keywords: Internet of things (IoT) | AES | UDOO Neo board | GCM | GMAC | One time passwords (OTP) | Two factor authentication | Security system |
مقاله انگلیسی |
6 |
Undeviating Adaptive Sheltered Cryptography (UASC) method based low power and high secure cache memory design
طراحی رمزنگاری حفاظتی انطباقی مستقیم (UASC) مبتنی بر حافظه کش و توان پایین-2019 The prerequisite of data security on network has turned out to be more important. Cryptography is a technique to give data privacy, acceptability and integrity. There are such significant number of difficul- ties to realize cryptography algorithm, for example, execution time, memory requirement, and intention control. In this work, a high secure and low power use of cache memory is implemented for utilizing a new cryptography method specifically named as Undeviating Adaptive Sheltered Cryptography (UASC) algorithm. The outline of the proposed memory has been altered by the expansion of all validation su- pervisors required by the equipment usage of Advanced Encryption Standard (AES). In addition, UASC has been incorporated into real time application to permit a self-encryption based on full self-rule. There- fore, compared with the conventional design comprising of a crypto-block and an isolated memory, this new method will prompt an imperative decrease of data interactions among the encryption procedure. The proposed work is depicted utilizing Verilog language, synthesized and actualized utilizing Xilinx ISE suite based Field Programmable Gate Array (FPGA) devices. Synthesis results demonstrate that the pro- posed configuration accomplishes higher efficiency than the previous executions by decreasing area while keeping up a moderate throughput/Look UpTable (LUT) ratio. The proposed configuration is additionally more productive as far as power utilization is concerned. As compared with conventional method, the proposed Undeviating Adaptive Sheltered Cryptography achieves low power consumption for 23.02 μw and execution time is 9.5 s. Keywords: Cache memory | Encryption | Decryption | Undeviating Adaptive Sheltered | Cryptography | Field Programmable Gate Array |
مقاله انگلیسی |
7 |
ازمایش وبررسی AES مورد استفاده برای رمز نگاری تصویر
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 27 - تعداد صفحات فایل doc فارسی: 39 در این مقاله یک برنامه رمزنگاری تصویر مبتنی بر AES در حالت رمز block chaining با زبان C طراحی شده است.سرعت رمز نگاری/رمزگشایی وعملکرد امنیتی AES بر اساس سیستم رمز تصویر مورد ازمایش قرار گرفته است تا سیستم رمزنگاری پیشنهاد شده با برخی سیستم های رمزگزاری موجود براساس اشوب مقایسه شود.نتایج شبیه سازی نشان میدهد که AES میتواند برای رمزنگاری تصویر اعمال شود که نقطه پذیرش این دیدگاه که"AES برای رمزنگاری تصویر مناسب نیست"را در بسیاری از موارد تکذیب میکند.این مقاله همچنین سرعت رمزنگاری تصویر مبتنی بر AES را بعنوان معیار سرعت الگوریتم های رمزنگاری تصویر پیشنهاد میدهد.والگوریتم های رمزنگاری تصویر که سرعت انها پایین تر ازمعیار است باید در ارتباطات عملی حذف شود.
کلمات کلیدی: امنیت اطلاعات | رمزنگاری تصویر | استاندارد رمزنگاری پیشرفتهAES | رمز block chaining CBC. |
مقاله ترجمه شده |
8 |
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
رمزگذاری ECG و شناسایی بر اساس راه حل امنیتی در Zynq SoC برای سیستم های بهداشتی متصل-2017 Article history:Received 10 May 2016 Received in revised form 12 November 2016Accepted 12 December 2016Available online 23 December 2016Keywords:Advanced encryption standard (AES)Electrocardiogram (ECG) encryption and identificationField programmable gate array (FPGA) Zynq7 system on chip (SoC)Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients’ data and medical records within a connected health system should be securely stored and transmitted for further analysis and diagnosis. This paper presents a set of security solutions that can be deployed in a connected health environment, which includes the advanced encryption standard (AES) algorithm and electrocardiogram (ECG) identification system. Efficient System-on-Chip (SoC) implementations for the proposed algorithms have been carried out on the Xilinx ZC702 prototyping board. The Achieved hardware implementation results have shown that the proposed AES and ECG identification based system met the real-time requirements and outperformed existing field programmable gate array (FPGA)-based systems in different key performance metrics such as processing time, hardware resources and power consumption. The proposed systems can process an ECG sample in 10.71 ms and uses only 30% of the available hardware resources with a power consumption of 107 mW.© 2016 Elsevier Inc. All rights reserved. Keywords:Advanced encryption standard (AES) | Electrocardiogram (ECG) encryption andidentification | Field programmable gate array (FPGA) | Zynq7 system on chip (SoC) |
مقاله انگلیسی |
9 |
Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA
تجزیه و تحلیل مقایسه تکنیک های مختلف AES برای استفاده از منابع کارآمد و عملکرد بهتر FPGA-2017 Received 6 October 2015; revised 22 December 2015; accepted 10 January 2016 Available online 31 March 2016 Abstract Over the past few years, cryptographic algorithms have become increasingly important. Advanced Encryption Standard (AES) algorithm was introduced in early 2000. It is widely adopted because of its easy implementation and robust security. In this work, AES is implemented on FPGA using five different techniques. These techniques are based on optimized implementation of AES on FPGA by making efficient resource usage of the target device. Experimental results obtained are quite varying in nature. They range from smallest (suitable for area critical application) to fastest (suitable for performance critical applications) implementation. Finally, technique making efficient usage of resources leads to frequency of 886.64 MHz and throughput of 113.5 Gb/s with moderate resource consumption on a Spartan-6 device. Furthermore, comparison between proposed technique and existing work shows that our technique has 32% higher frequency, while consuming 2.63 more slice LUTs, 8.33 less slice registers, and 12.59 less LUT-FF pairs. 2016 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-NDlicense (http://creativecommons.org/licenses/by-nc-nd/4.0/). KEYWORD: SCryptography | Embedded security | AES | FPGA | Exploration |
مقاله انگلیسی |
10 |
پیاده سازی جستجوی فازی کلمات کلیدی روی داده های رمزگذاری شده در محاسبات ابری
سال انتشار: 2015 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 14 با افزایش روزانه نرخ رشد و تطبیق محاسبات ابری، اطلاعات مهم تر و بیشتری به سمت محاسبات ابری متمرکز میشود. برای محافظت از اطلاعات اختصاصی با ارزش، دادهها باید قبل از برون سپاری رمزنگاری شود. تکنیکهای جستجوی موجود به کاربر اجازه میدهد تا با استفاده از کلمات کلیدی در بین داده های رمزنگاری شده جستجو کند، اما این تکنیکها تنها بر اساس جستجوی دقیق کلمات کلیدی توجه دارد و هیچ جایی برای غلطهای املایی و فرمتهای ناسارگار که در رفتار کاربران معمولی رخ میدهد وجود ندارد. این نقطه ضعف باعث میشود که ذخیره سازی موثر داده و کارایی ذخیره سازی با چالش مواجه شود و جستجوی کاربر به صورت ناکارآمد انجام میشود. در این مقاله تمرکز ما بر روی ذخیره سازی امن با استفاده از الگوریتم AES و بازیابی اطلاعات با جستجوی کلمات کلیدی فازی در میان داده رمزنگاری شده میباشد. پیاده سازی یک مکانیزم جستجوی کلمه کلیدی فازی پیشرفته به نام تکنیک مبتنی بر wildcard در این مقاله ارائه شده است. این مکانیزم در زمانی که کاربر دقیقا کلمات کلیدی از پیش تعریف شده را جستجو کند، فایلهای منطبق بر آنها را بر میگرداند و در غیر اینصورت زمانی که کلمات کلیدی مورد جستجو عینا وجود نداشته باشد، نزدیکترین کلمات کلیدی مشابه به کلمات کلیدی مورد جستجو پیدا شده و فایلهای مرتبط با آنها بر گردانده میشود. در روش ارائه شده، از فاصله ویرایش برای تعیین میزان شباهت کلمات کلیدی و تهیه یک تکنیک کارا برای ساخت مجموعههای کلمات کلیدی فازی استفاده کردهایم. این روش بر کاهش سربار نمایش و ذخیره سازی تمرکز دارد.
کلمات کلیدی: جستجو فازی | رمزگذاری بر روی ابرها | محاسبات ابری | AES | کلمات |
مقاله ترجمه شده |