scholarly journals FPGA implementation of tunable arbitrary sequencer for key generation mechanism

2017 ◽  
Vol 7 (1.5) ◽  
pp. 237
Author(s):  
M. Siva Kumar ◽  
B. Murali Krishna ◽  
N. Sai Tejeswi ◽  
Sanath Kumar Tulasi ◽  
N. Srinivasulu ◽  
...  

In the present scenario information security has become a predominant issue. Cryptography is the process used for the purpose of information security. In cryptography message is encrypted with key produces cipher and decrypts the original message from cipher uses variety mechanisms and permutations. This paper presents a key generation mechanism suitable in cryptography applications which plays a vital role in data security. Random key generation techniques are multiplexed and configured in FPGA. In run time based on priority of section inputs randomly one method selectively produces a key which inputs to cryptosystem. Jitter process generates random numbers based on clock frequency triggered to oscillators, which produces pseudo random keys, but it consumes more resources when compared with other methods, but randomness in generated key is exponential. Pre stored random numbers in Block Memory are generated using IP core generator. The main advantage of the proposed model is to produce random keys which will be secure, predictable and attains high security. Due to its configurable nature, FPGA’s are suitable for wide variety of applications which can configure in runtime to implement custom designs and needs. Random number generation techniques are designed using Verilog HDL, simulated on Xilinx ISE simulator and implemented on Spartan FPGA.

Author(s):  
Hana Ali-Pacha ◽  
Naima Hadj-Said ◽  
Adda Ali-Pacha ◽  
Mohamad Afendee Mohamed ◽  
Mustafa Mamat

<span lang="EN-US">Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.</span>


2020 ◽  
Vol 7 (04) ◽  
Author(s):  
PRADEEP H K ◽  
JASMA BALASANGAMESHWARA ◽  
K RAJAN ◽  
PRABHUDEV JAGADEESH

Irrigation automation plays a vital role in agricultural water management system. An efficient automatic irrigation system is crucial to improve crop water productivity. Soil moisture based irrigation is an economical and efficient approach for automation of irrigation system. An experiment was conducted for irrigation automation based on the soil moisture content and crop growth stage. The experimental findings exhibited that, automatic irrigation system based on the proposed model triggers the water supply accurately based on the real-time soil moisture values.


2016 ◽  
Vol 12 (04) ◽  
pp. 23
Author(s):  
Jorge Lobo

This short paper introduces the basic concepts of Stochastic Computing (SC), and presents additions to a remote lab with reconfigurable logic to allow testing SC circuits. Recently, SC has been revisited and evaluated as a possible way of performing approximate probabilistic computations for artificial perception systems. New modules allow the generation of pseudo-random numbers, given a seed key and using linear feedback shift registers, but also having true random number generation using ring oscillators and embedded PLLs. Stochastic computing allows a tradeoff between resource usage and precision, allowing very simple circuits to perform computations, at the expense of a longer integration time to have reasonable results. We provide the basic stochastic computing modules, so that any user can use them to build a stochastic computing circuit and go beyond software simulations, providing a remote hardware device to test real circuits at high clock speeds.


2020 ◽  
Author(s):  
Maneesh Pant ◽  
Brij Mohan Singh ◽  
Dharam Vir Gupta

Abstract Internet of Things (IoT) evolving and widespread presence has made the lives of all comfortable and handy, while on the other hand posing various challenges, i.e. less efficiency, less security, and high energy drain, threatening smart IoT-based applications. Compared to unicast communication, multicast communication is considered more powerful in group-oriented systems, because transmission takes place using less resources. This is why many of the IoT applications rely on multicast in their transmission. This multicast traffic needs to be handled explicitly for sensitive applications requiring actuator control. Securing multicast traffic by itself is cumbersome as it requires an efficient and flexible Group Key Establishment (GKE) protocol. We propose a three-tier model that can, not only be used to control the IoT, but also to control multicast communications. The architecture is built with a 256-bit keyless encryption technique to protect the authentication to create the network link. Machine learning-based chaotic map key generation is used to protect GKE. Finally, using MD5, the system key is authenticated. The algorithm is checked for energy used, bandwidth, and time taken. The proposed model is applied and evaluated against numerous benchmark attacks such as Distributed Denial of Service (DDoS), Man in the Middle and Fishing.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Isha Batra ◽  
Hatem S. A. Hamatta ◽  
Arun Malik ◽  
Mohammed Baz ◽  
Fahad R. Albogamy ◽  
...  

Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and mechanism they follow to secure a message. This work first determines the benefit of applying lightweight security cryptographic solutions in IoT. The existing lightweight counterparts are still vulnerable to attacks and also consume calculative more power. Therefore, this research work proposes a new hybrid lightweight logical security framework for offering security in IoT (LLSFIoT). The operations, key size, and mechanism used in the proposed framework make its lightweight. The proposed framework is divided into three phases: registration, authentication, and light data security (LDS). LDS offers security by using unique keys at each round bearing small size. Key generation mechanism used is comparatively fast making the compromise of keys as a difficult task. These steps followed in the proposed algorithm design make it lightweight and a better solution for IoT-based networks as compared to the existing solutions that are relatively heavy weight in nature.


Recently Plant phenotyping has gained the attention of many researchers such that it plays a vital role in the context of enhancing agricultural productivity. Indian economy highly depends on agriculture and this factor elevates the importance of early disease detection of the crops within the agricultural fields. Addressing this problem several researchers have proposed Computer Vision and Pattern recognition based mechanisms through which they have attempted to identify the infected crops in the early stages.in this scenario, CNN convolution neural network-based architecture has demonstrated exceptional performance when compared with state-of-art mechanisms. This paper introduces an enhanced RCNN recurrent convolution neural network-based architecture that enhances the prediction accuracy while detecting the crop diseases in early stages. Based on the simulative studies is observed that the proposed model outperforms when compared with CNN and other state-of-art mechanisms.


2020 ◽  
Author(s):  
Gwangmin Kim ◽  
Jae Hyun In ◽  
Hakseung Rhee ◽  
Woojoon Park ◽  
Hanchan Song ◽  
...  

Abstract The intrinsic stochasticity of the memristor can be used to generate true random numbers, essential for non-decryptable hardware-based security devices. Here we propose a novel and advanced method to generate true random numbers utilizing the stochastic oscillation behavior of a NbOx mott memristor, exhibiting self-clocking, fast and variation tolerant characteristics. The random number generation rate of the device can be at least 40 kbs-1, which is the fastest record compared with previous volatile memristor-based TRNG devices. Also, its dimensionless operating principle provides high tolerance against both ambient temperature variation and device-to-device variation, enabling robust security hardware applicable in harsh environments.


Author(s):  
Shrutika Khobragade ◽  
Rohini Bhosale ◽  
Rahul Jiwahe

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.


2021 ◽  
Vol 13 (16) ◽  
pp. 9281
Author(s):  
Moddassir Khan Nayeem ◽  
Gyu M. Lee

In the post-disaster response phase, an efficient relief distribution strategy plays a vital role in alleviating suffering in disaster-stricken areas, which sometimes becomes challenging in humanitarian logistics. Most governments pre-located the relief goods at the pre-determined warehouses against possible disasters. Those goods must be shipped to the relief distribution centers (RDCs) to be further distributed to the victims in impacted areas upon the disasters. Secondary disasters can occur due to the first disaster and can occur relatively close in time and location, resulting in more suffering and making the relief distribution activities more challenging. The needs of additional RDCs must be determined as well in response to the secondary disasters. A robust optimization model is proposed to hedge against uncertainties in RDCs’ capacity and relief demand. Its objective is to minimize the sum of transportation cost, additional RDC cost, and shortage of commodities. The computational results are given to demonstrate the effectiveness of the proposed model. The sensitivity analysis gives an insight to the decision-makers.


Sign in / Sign up

Export Citation Format

Share Document