Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "lightweight encryption algorithm" wg kryterium: Wszystkie pola


Wyświetlanie 1-3 z 3
Tytuł:
FPGA-based secure and noiseless image transmission using lea and optimized bilateral filter
Autorzy:
Hebbale, Sunil B.
Akula, V.S. Giridhar
Baraki, Parashuram
Powiązania:
https://bibliotekanauki.pl/articles/27312891.pdf
Data publikacji:
2022
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
lightweight encryption algorithm
bilateral filter
whale optimization algorithm
discrete wavelet transform
Opis:
In today’s world, the transmission of secured and noiseless images is a difficult task. Therefore, effective strategies are important for securing data or secret images from attackers. Besides, denoising approaches are important for obtaining noise-free images. For this, an effective crypto-steganography method that is based on a lightweight encryption algorithm (LEA) and the modified least significant bit (MLSB) method for secured transmission is proposed. Moreover, a bilateral filter-based whale optimization algorithm (WOA) is used for image denoising. Before the image transmission, a secret image is encrypted by the LEA algorithm and embedded into the cover image using discrete wavelet transform (DWT) and MLSB techniques. After the image transmission, an extraction process is performed in order to recover the secret image. Finally, a bilateral WOA filter is used to remove the noise from the secret image. The Verilog code for the proposed model is designed and simulated in Xilinx software. Finally, the simulation results show that the proposed filtering technique results in performance that is superior to conventional bilateral and Gaussian filters in terms of the peak signal-to-noise ratio (PSNR) and structural similarity index measure (SSIM).
Źródło:
Computer Science; 2022, 23 (4); 451--466
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages
Autorzy:
Maleszewski, Wiesław
Powiązania:
https://bibliotekanauki.pl/articles/23313488.pdf
Data publikacji:
2022
Wydawca:
Politechnika Gdańska
Tematy:
IoT cryptography
lightweight cryptography
flexible cryptography
Opis:
The IoT technology is currently used in many areas and marked by growing popularity. On the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in terms of security and privacy protection. An IoT infrastructure is characterized by a high level of threats due to, inter alia, numerous technical barriers that make it difficult to use conventional methods to protect information. The aim of this paper is to present a symmetric coding algorithm based on algebraic groups generated by specific trigonometric curves. The algorithm is dedicated to short data sequences transmitted by devices with limited computing power.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2022, 26, 3
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Implementacja kryptoalgorytmu GOST do systemów wbudowanych
Implementation of GOST algorithm in embedded systems crypto applications
Autorzy:
Khoma, V.
Smolczyk, A.
Reshetar, Y.
Powiązania:
https://bibliotekanauki.pl/articles/155560.pdf
Data publikacji:
2013
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
kryptoalgorytm GOST
kryptografia lekka (lightweight-cryptography)
procesory ARM
szyfrowanie w systemach wbudowanych
cryptography algorithm GOST
liglightweight-cryptographyhtweight-cryptography
ARM-core processors
encryption for embedded systems
Opis:
Artykuł poświęcono problemowi skutecznej implementacji w systemach wbudowanych blokowego symetrycznego algorytmu kryptograficznego GOST. Przeprowadzone badania programowej implementacji na platformie AVR algorytmu GOST wykazały lepszy wskaźnik wydajność/rozmiar kodu w porównaniu z innymi znanymi algorytmami. Analiza porównawcza implementacji kryptoalgorytmu GOST na bardziej zaawansowanych mikrokontrolerach (ARM) ujawniła ponadto mniejsze zapotrzebowanie na pamięć w porównaniu z najnowszym algorytmem AES przy porównywalnej wydajności.
This paper discusses the implementation of a cryptographic algorithm GOST in common used 8-bit (AVR) and 32-bit (ARM) processors for embedded systems. The GOST algorithm has a Feistel network structure with 32-rounds and uses simple operations (Fig. 1), which are easily implemented in general purpose microcontrollers by system-level commands. In addition, the algorithm has no expansion key procedure, which is an advantage for lightweight-cryptography. The basic method to improve GOST performance is associated with careful substitution cycle (S1…S8) programming and, first of all, the number of reductions of such iterations (substitution boxes extension, registers exchange for bitwise rotation, key and substitution tables locations in RAM). Considering GOST as a lightweight-algorithm we obtain the best throughput/code size ratio (Fig. 3) compared with known implementations of other algorithms [1, 2]. The GOST efficiency on ARM-based architectures increases more due to the possibility of rotation (<<<11) and addition modulo 2 operations to combine in one instruction. The authors conclude that with similar performance (for AES-128), GOST implementation requires approximately 5 times less memory usage. In the identical key version AES-256 almost loses its advantage for maximum performance variant, outpacing GOST not more than 1.4 times (Tab. 2).
Źródło:
Pomiary Automatyka Kontrola; 2013, R. 59, nr 12, 12; 1264-1267
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-3 z 3

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies