A High Rate Parallel Operation Encryption Card Design Base on FPGA

2014 ◽  
Vol 668-669 ◽  
pp. 783-786
Author(s):  
Rong Zeng ◽  
Xiu Li Huang ◽  
Ya Dong Chen

A design of encryption cards controlling multiple cipher chips’ high-rate parallel operation based on FPGA is proposed in this paper. According to the design method, we can achieve that multiple encryption card operates encryption in parallel way, which can improve the encryption and decryption rate of the encryption card without enhancing the performance of encryption chip, moreover, increase the key generation rate and management level of the key management system.

Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 682 ◽  
Author(s):  
Biao Han ◽  
Sirui Peng ◽  
Celimuge Wu ◽  
Xiaoyan Wang ◽  
Baosheng Wang

In recent years, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication brings more and more attention from industry (e.g., Google and Uber) and government (e.g., United States Department of Transportation). These Vehicle-to-Everything (V2X) technologies are widely adopted in future autonomous vehicles. However, security issues have not been fully addressed in V2V and V2I systems, especially in key distribution and key management. The physical layer key generation, which exploits wireless channel reciprocity and randomness to generate secure keys, provides a feasible solution for secure V2V/V2I communication. It is lightweight, flexible, and dynamic. In this paper, the physical layer key generation is brought to the V2I and V2V scenarios. A LoRa-based physical key generation scheme is designed for securing V2V/V2I communications. The communication is based on Long Range (LoRa) protocol, which is able to measure Received Signal Strength Indicator (RSSI) in long-distance as consensus information to generate secure keys. The multi-bit quantization algorithm, with an improved Cascade key agreement protocol, generates secure binary bit keys. The proposed schemes improved the key generation rate, as well as to avoid information leakage during transmission. The proposed physical layer key generation scheme was implemented in a V2V/V2I network system prototype. The extensive experiments in V2I and V2V environments evaluate the efficiency of the proposed key generation scheme. The experiments in real outdoor environments have been conducted. Its key generation rate could exceed 10 bit/s on our V2V/V2I network system prototype and achieve 20 bit/s in some of our experiments. For binary key sequences, all of them pass the suite of statistical tests from National Institute of Standards and Technology (NIST).


2014 ◽  
Vol 644-650 ◽  
pp. 1907-1910
Author(s):  
Wei Zhou Zhao ◽  
Hui Zhang ◽  
Hui Zhen Wang ◽  
Hui Li Jing

This paper presents an algorithm about key management including key generation and key recovery in cryptosystem based on fingerprint and fuzzy decision. Traditional key for the encryption and decryption is remembered by a trusted person, or stored in a safety location. The key may be lost or misused for the person’s self-ish desire. Sharing secret algorithm is used to prevent from misusing in a single management, and fuzzy vault scheme is used to avoid the disadvantage of numerical password. But the proposed method is not an easy combination of fuzzy vault and sharing secret. To keep from the collusion among some persons, a simple fuzzy decision is added in the proposed method. Security analysis and experimental results are given to show the proposed algorithm is feasible and safe for key management in cryptosystem.


2013 ◽  
Vol 748 ◽  
pp. 1244-1250
Author(s):  
Chen Chi

This study proposes the design method of a PLC-based laboratory intelligent management system. The proposed system presents an integration of various technologies, including fingerprint recognition, touch screen interaction, wireless coded remote control, computer software, hardware control, and software management. The practical application of the proposed system demonstrates certain advantages, such as easy installation, reliable operation, and convenient information preservation, processing, and inquiry. The proposed system can significantly improve the modern management level of university laboratories.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2962
Author(s):  
Xingda Chen ◽  
Margaret Lech ◽  
Liuping Wang

Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications. The latest LoRaWAN release v.1.1 has provided a security framework that includes data confidentiality protection, data integrity check, device authentication and key management. However, its key management part is only ambiguously defined. In this paper, a complete key management scheme is proposed for LoRaWAN. The scheme addresses key updating, key generation, key backup, and key backward compatibility. The proposed scheme was shown not only to enhance the current LoRaWAN standard, but also to meet the primary design consideration of LoRaWAN, i.e., low power consumption.


2011 ◽  
Vol 121-126 ◽  
pp. 1120-1124
Author(s):  
Yan Shang ◽  
Hong Sheng Ding ◽  
Chun Yan Wang ◽  
Long Jiang Su ◽  
Yu Can Zhao

In order to improve the automatic level of teaching management in experiment and training base, a teaching management system is designed and implemented. The teaching process such as checking on work attendance, logging on school reports and equipments’ management can be carried automatically. The efficiency and the management level can be increased, and the resource sharing can be realized. to meet this demand. The use of numerical control experiment and training management system will improve the level of teaching and management of our training base.


Author(s):  
John F. McGrew

This paper discusses a case study of a design and evaluation of a change management system at a large Telecommunications Corporation. The design and evaluation were done using the facilitated genetic algorithm (a parallel design method) and user decision style analysis. During the facilitated genetic algorithm the design team followed the procedure of the genetic algorithm. Usability was evaluated by applying user decision style analysis to the designed system. The design is compared with an existing system and with one designed by an analyst. The change management system designed by the facilitated genetic algorithm took less time to design and decision style analysis indicated it would be easier to use than the other two systems.


2014 ◽  
Vol 539 ◽  
pp. 669-673
Author(s):  
Xie Hong

This paper analyzes the actual situation of the electricity management about student apartments, and design intelligent energy student housing management system based on CAN bus. The system uses the field level, the underlying management level and upper management level three management systems. Field level with a dedicated energy metering chip AD7755 and STM32F103 microcontroller with A/D conversion function as the core, to achieve real-time power measurement; via CAN bus timing or random read live energy data for monitoring electricity consumption of the apartment, investigate abnormal electricity, thus effectively limiting the students to use electrical power to achieve the modernization and automation of power management solutions student apartments.


Sign in / Sign up

Export Citation Format

Share Document