Design And Analysis Of Light Weight Symmetric Cryptographic Frameworks And Constructs For Secure Packet Mode Wireless Communication


Download Design And Analysis Of Light Weight Symmetric Cryptographic Frameworks And Constructs For Secure Packet Mode Wireless Communication PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Design And Analysis Of Light Weight Symmetric Cryptographic Frameworks And Constructs For Secure Packet Mode Wireless Communication book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Design and Analysis of Light-weight Symmetric Cryptographic Frameworks and Constructs for Secure Packet Mode Wireless Communication


Design and Analysis of Light-weight Symmetric Cryptographic Frameworks and Constructs for Secure Packet Mode Wireless Communication

Author: Andrew A. Adekunle

language: en

Publisher:

Release Date: 2012


DOWNLOAD





This thesis reports research undertaken to address the deficiencies that existing standardised cryptographic constructs exhibit when securing packet mode wireless communication in WSN. The aim of the research is to devise innovative cryptographic frameworks, which will facilitate design and implementation of light-weight symmetric cryptographic modular constructs. Four cryptographic frameworks have been devised and block cipher based light-weight constructs using the frameworks have been designed and benchmarked against contemporary standard constructs. The constructs introduced in this dissertation, proved to be better suited to providing secure packet mode data communication, in applications utilising wireless networks consisting of characteristically constrained nodes. The four proposed frameworks are: - The Zone-based framework for data packet integrity and authentication security services is proposed and described. The Quicker Block Chaining (QBC) family of message authentication constructs designed using the framework, are shown, via software simulation, to operate with better efficiency (i.e. uses fewer instruction cycles) than similar contemporary standard constructs and with a comparable level of security. - The Hybrid Encryption Mode (HEM) framework for data packet confidentiality security service is proposed and described. The HEM framework facilitated the design of constructs that provide probabilistic, randomising and tweakable encryption. - The Joint Cypher Mode (JCM) framework for authenticated encryption with associated-data (AEAD) security service is proposed and described. The range of constructs designed using the JCM framework, are shown, via software simulation and practical deployment, to Design and Analysis of Light-weight Symmetric Cryptographic Frameworks and Constructs for Secure Packet Mode Wireless Communication operate with better efficiency (i.e. uses fewer instruction cycles) than contemporary standard constructs. - The Joint Authenticated Combined Mode (JACM) framework for authenticate authenticated-encryption with associated-data (AAEAD) security service is proposed and described. The new AAEAD secure packet paradigm addresses a limitation and cryptographic protection failure of the standardised AEAD secure packet paradigm, in communication scenarios when untrustworthy intermediary forwarding nodes are utilised to authenticate and relay packets. The outcomes of the research undertaken are relevant to practitioners and cryptographic engineers that require symmetric cryptographic light-weight constructs for providing secure packet mode communications. It is shown that the resulting light-weight symmetric cryptographic constructs are better suited to providing secure packet mode wireless networked communication.

Hybrid Encryption Algorithms over Wireless Communication Channels


Hybrid Encryption Algorithms over Wireless Communication Channels

Author: Mai Helmy Shaheen

language: en

Publisher: CRC Press

Release Date: 2021-03-04


DOWNLOAD





This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, “Hybrid Encryption Algorithms over Wireless Communication Channels”, examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik’s cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today’s communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB® codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.

Lightweight Cryptography for Security and Privacy


Lightweight Cryptography for Security and Privacy

Author: Gildas Avoine

language: en

Publisher: Springer

Release Date: 2013-08-20


DOWNLOAD





This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols.