scholarly journals Improving Security Using Modified S-Box for AES Cryptographic Primitives

2021 ◽  
Author(s):  
S. Sudhakar ◽  
A. Akashwar ◽  
M. Ajay Someshwar ◽  
T. Dhaneshguru ◽  
M. Prem Kumar

The growing network traffic rate in wireless communication demands extended network capacity. Current crypto core methodologies are already reaching the maximum achievable network capacity limits. The combination of AES with other crypto cores and inventing new optimization models have emerged. In this paper, some of the prominent issues related to the existing AES core system, namely, lack of data rate, design complexity, reliability, and discriminative properties. In addition to that, this work also proposes a biometric key generation for AES core that constitutes simpler arithmetic such as substitution, modulo operation, and cyclic shifting for diffusion and confusion metrics which explore cipher transformation level. It is proved that in AES as compared to all other functions S-Box component directly influences the overall system performance both in terms of power consumption overhead, security measures, and path delay, etc.

Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5616
Author(s):  
Xintong Ling ◽  
Zheng Gao ◽  
Yuwei Le ◽  
Li You ◽  
Jiaheng Wang ◽  
...  

In this work, we propose a satellite-aided permissionless consensus protocol for scalable space–terrestrial blockchains. We design its working principle and workflow by taking full advantage of satellites for extensive coverage and ubiquitous connectivity. Based on the proposed protocol, we demonstrate how such a space–terrestrial blockchain grows and evolves through several typical cases in the presence of adversarial nodes, user misbehavior, and transmission outage. Taking proof of work (PoW) as a benchmark, we assess the system security by considering both adversarial miners and possible colluding satellites. Then, we analyze the maximum blockchain throughput under network capacity limits and evaluate the impact of information propagation delay via a Markov model. Simulation results support that the proposed satellite-aided consensus protocol achieves higher throughput and exhibits greater scalability than PoW.


Author(s):  
Lennert Wouters ◽  
Benedikt Gierlichs ◽  
Bart Preneel

This paper documents a practical security evaluation of the Tesla Model X keyless entry system. In contrast to other works, the keyless entry system analysed in this paper employs secure symmetric-key and public-key cryptographic primitives implemented by a Common Criteria certified Secure Element. We document the internal workings of this system, covering the key fob, the body control module and the pairing protocol. Additionally, we detail our reverse engineering techniques and document several security issues. The identified issues in the key fob firmware update mechanism and the key fob pairing protocol allow us to bypass all of the cryptographic security measures put in place. To demonstrate the practical impact of our research we develop a fully remote Proof-of-Concept attack that allows to gain access to the vehicle’s interior in a matter of minutes and pair a modified key fob, allowing to drive off. Our attack is not a relay attack, as our new key fob allows us to start the car anytime anywhere. Finally, we provide an analysis of the update performed by Tesla to mitigate our findings. Our work highlights how the increased complexity and connectivity of vehicular systems can result in a larger and easier to exploit attack surface.


2021 ◽  
Vol 13 (0) ◽  
pp. 1-6
Author(s):  
Darius Chmieliauskas

With a growing network traffic Mobile Network Operators (MNO) looking for ways to increase network capacity and improve customer experience. One of the ways is to find the best parameters from the set defined by 3GPP. In the study, closed-loop MIMO was compared to open-loop MIMO on the LTE FDD network. Network performance was evaluated in 3 different scenarios: slow and fast-moving UE under different SINR levels and large scale on 2T2R and 4T4R cells. The result shows gains of using closed-loop and it is recommended to use it commercial LTE networks.


2019 ◽  
Vol 42 ◽  
Author(s):  
Guido Gainotti

Abstract The target article carefully describes the memory system, centered on the temporal lobe that builds specific memory traces. It does not, however, mention the laterality effects that exist within this system. This commentary briefly surveys evidence showing that clear asymmetries exist within the temporal lobe structures subserving the core system and that the right temporal structures mainly underpin face familiarity feelings.


2019 ◽  
Author(s):  
Marjin Martens ◽  
Ralf De Wolf ◽  
Lieven De Marez
Keyword(s):  

Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document