Energy analysis of the AAβ lightweight asymmetric encryption scheme on an embedded device

Author(s):  
Syed Farid Syed Adnan ◽  
Mohd Anuar Mat Isa ◽  
Habibah Hashim
2019 ◽  
Vol 116 ◽  
pp. 32-40 ◽  
Author(s):  
Gaurav Verma ◽  
Meihua Liao ◽  
Dajiang Lu ◽  
Wenqi He ◽  
Xiang Peng ◽  
...  

Author(s):  
Syed Farid Syed Adnan ◽  
Mohd Anuar Mat Isa ◽  
Habibah Hashim

Internet of Things (IoT) is a way of providing data with the physical thing that interconnected to the network, which is the Internet. The IoT devices connected to the internet, broadcast of the data to the broker or a server, becomes an open route for attackers to gain the data and making the data becomes vulnerable. Thus, the data could be altered or spoofed by an attacker which led to security issues especially on data integrity. Therefore, the data security collected from the sensors is as important as on the servers that eventually become the big data. However, most sensors are low powered devices in term of CPU, storage, memory and batteries that cryptographic algorithm computations might give overhead to the sensors and reduce the batteries even faster than it is supposed to be. Instead of looking at symmetric encryption scheme, this paper tries to explore the capabilities of the asymmetric scheme on resource constrained devices communications. Thus, this paper presents an RF communication analysis of a low consumption asymmetric encryption, the AAβ (AA-Beta) that promising to implement on the IoT devices to secure the IoT networks. The result shows only 14% size increased in ciphertext from plaintext and the RF simulation communications show a better result in Raspbian OS environment compare to windows environment even though with same configurations


2018 ◽  
Vol 62 (4) ◽  
pp. 563-578 ◽  
Author(s):  
Ming Zeng ◽  
Kai Zhang ◽  
Haifeng Qian ◽  
Xiaofeng Chen ◽  
Jie Chen

2019 ◽  
Vol 9 (7) ◽  
pp. 1452
Author(s):  
Han-Yu Lin

Nowadays there are many social networking services supporting three-party communication such as Skype, Line, and Facebook Messenger. To ensure the message security, a cryptographic encryption scheme is a commonly adopted measure. However, the traditional asymmetric encryption only allows one designated recipient to decrypt the ciphertext with his/her private key. It is thus difficult for two parties to share the same ciphertext without exposing their private keys. In this paper, the author comes up with a novel dual authenticated encryption (DAE) scheme designed for three-party communication environments. Specifically, a DAE scheme enables a party to generate a single ciphertext that could be solely decrypted by the other two participants without sharing their private keys. It is also formally shown that the proposed scheme achieves the crucial security properties using the random oracle proof model.


2020 ◽  
Vol 2020 ◽  
pp. 1-14 ◽  
Author(s):  
Kaixin Jiao ◽  
Guodong Ye ◽  
Youxia Dong ◽  
Xiaoling Huang ◽  
Jianqing He

This study proposes a new image encryption scheme based on a generalized Arnold map and Rivest–Shamir–Adleman (RSA) algorithm. First, the parameters of the generalized Arnold map are generated by an asymmetric encryption-system RSA algorithm, and the keystream is produced iteratively. To change the distribution of pixel values, the image data are hidden by XOR diffusion. Second, both rows and columns of the image are cyclically confused to hide the image data again. Then, the additive mode diffusion operation is performed to realize third-layer hiding for image content. The overall diffusion and confusion operations are conducted twice to obtain the final cipher image. Test results prove that the encryption scheme proposed in this study is effective and has strong antiattack capabilities and key sensitivity. In addition, because the scheme security relies on the RSA algorithm, it has high security.


2016 ◽  
Vol 22 (10) ◽  
pp. 2910-2913 ◽  
Author(s):  
Syed Farid Syed Adnan ◽  
Mohd Anuar Mat Isa ◽  
Habibah Hashim

2014 ◽  
Vol 598 ◽  
pp. 691-694
Author(s):  
Lei Song ◽  
Jun Qin ◽  
Sheng Xi Liang ◽  
Xing Wang

With the rapid development of cloud computing, Security problems has become one of the major obstacle against it. In this paper, we present a hybrid encryption scheme based on the characteristics of RC5 and ECC encryption to deal with security issues caused by data residue in static storage and Save the storage space at the same time.


Author(s):  
J. R. Fields

The energy analysis of electrons scattered by a specimen in a scanning transmission electron microscope can improve contrast as well as aid in chemical identification. In so far as energy analysis is useful, one would like to be able to design a spectrometer which is tailored to his particular needs. In our own case, we require a spectrometer which will accept a parallel incident beam and which will focus the electrons in both the median and perpendicular planes. In addition, since we intend to follow the spectrometer by a detector array rather than a single energy selecting slit, we need as great a dispersion as possible. Therefore, we would like to follow our spectrometer by a magnifying lens. Consequently, the line along which electrons of varying energy are dispersed must be normal to the direction of the central ray at the spectrometer exit.


Sign in / Sign up

Export Citation Format

Share Document