Figure 2 - uploaded by Anand Nayyar
Content may be subject to copyright.
Architecture of 64-bit path encryption

Architecture of 64-bit path encryption

Source publication
Article
Full-text available
Lightweight Cryptography (LWC) iswidely used to provide integrity, secrecy and authentication for the sensitive applications.However, the LWC is vulnerable to various constraints such as high-power consumption, time consumption, and hardware utilization and susceptible to the malicious attackers. In order to overcome this, a lightweight block ciphe...

Context in source publication

Context 1
... overall architecture of the path encryption for 64-bit data is shown in Fig. 2. At first, the one pixel from the image is converted into 8 bits and total plain text of 64-bit data (PT) is kept in the register. The plaintext stored in the register is denoted as Dreg. On the other hand, the TRNG-PRNG module generates an appropriate key to accomplish the encryption operation over the 64-bit value of plaintext. The ...

Similar publications

Article
Full-text available
Nowadays, a huge amount of digital data is frequently changed among different embedded devices over wireless communication technologies. Data security is considered an important parameter for avoiding information loss and preventing cyber-crimes. This research article details the low power high-speed hardware architectures for the efficient field p...

Citations

... The location of the base station is one of the most effective factors in saving and maintaining the balance of power consumption, which is different from the application nodes in heterogeneous wireless sensor networks [8]. The application nodes close to the base station are destroyed earlier because they are affected by the heavy load of the relay compared to the application nodes further away [9]. The optimal location of the base station is such that determining the relative position of the base station with the application nodes is done for the balanced distribution of energy consumption among the application nodes as long as the network service quality remains. ...
... where, b D and b M refer to paired parents in this case. Eqs. (8) and (9) demonstrate that the choice was chosen randomly and prove the initial supposition. ...
Article
In recent years, wireless sensor networks have been studied in many applications. One of the important issues studied in these networks is the optimal placement of cells in order to achieve optimal energy consumption. Therefore, intelligent algorithms have been used in most research to achieve this goal. In order to properly roll out 5G, the network must be able to handle the increase in data traffic. The essential aspects of resource allocation systems, such as scalability and throughput, are under too much stress due to the rising amount of traffic. In the present work, network planning is characterized by the optimal selection of the base station location and transmission power in 5G networks. Here, an Amended design of the Barnacles Mating Optimizer (ABMO) Algorithm is proposed and is employed to get higher efficiency in both terms of total connected users and transmit power saving for 5G networks. Therefore, the novelty of this study is in the use of an amended design of the Barnacles Mating Optimizer (ABMO) Algorithm. This amended design improves the accuracy and performance of the ABMO and makes it more effective in finding the best locations for base stations and changing the power level for 5G networks. The amended design also offers several advantages over some other state-of-the-art algorithms and makes the ABMO useful for improving 5G networks Simulations of the proposed ABMO algorithm are then compared with some other state-of-the-art algorithms and the results showed the right location and changing the range of the power level for the proposed method. The outcomes show that the suggested Amended Barnacles Mating Optimizer Algorithm statistically outperforms the original BMO, and some other methods based on DE, and RGA. The findings show that the t-value for BMO and the modified BMO is 4.339e−35 which is so better than that of DE and ABMOO with 1.926e−22, and for the RGA and ABMOO with 4.826e−32.
... Nowadays, more and more designers use a security chip with TRNG to generate random numbers and use the random numbers directly as keys or as a seed for generating keys. In [125], the true random number generator-pseudo random number generator (TRNG-PRNG) module is used to generate keys randomly. Therefore, in the process of encryption and decryption, the key value is difficult to be used by unauthenticated users (i.e., malicious attackers), thus improving the robustness of the architecture against malicious attackers. ...
Article
Full-text available
Entropy is a measure of uncertainty or randomness. It is the foundation for almost all cryptographic systems. True random number generators (TRNGs) and physical unclonable functions (PUFs) are the silicon primitives to respectively harvest dynamic and static entropy to generate random bit streams. In this survey paper, we present a systematic and comprehensive review of different state-of-the-art methods to harvest entropy from silicon-based devices, including the implementations, applications, and the security of the designs. Furthermore, we conclude the trends of the entropy source design to point out the current spots of entropy harvesting.
... Method that generates a symmetric session key simulta-neously with two different healthcare providers based on available patient information. The approach allows healthcare providers to generate appropriate key when the patients are available and enter the details [7,17]. A unique key is created based on patient information and a new key is created for the transferring of individual health information to maintain patient privacy. ...
Conference Paper
Full-text available
—The Health Information Exchange (HIE) expresses the incredible convenience of patient care for better health care and more integrated care. The National Information Coordinator’s Office (ONC) seeks out patient-centered HIE designs that transfer ownership of data from providers to patients. In this paper, the complexity provides practical results through different features about AWS technology that is considered “immovable”. By making the data classification personal and “approved file” as physicians for accessing the data, the work gains exchange of health information. The HIE patient proce- dure was centralized and extensively evaluated model feasibility, stability, safety, and durability. Developed the patient record that have been centralized for exchanging the data of patients through the different hospitals. The patient data will be stored in the AWS S3 service by creating new file path for each patient.
... In [27], Authors introduced lightweight block cipher architecture to ensure security against attacks of malicious that make used of pseudo random number with good random statistical features This architecture utilizes dual-port read-only memory to generate the 80-bit key from 64-bit of input. The operating frequency of the generator architecture was 612.208 ...
Article
This paper presents an efficient parallelism architecture that uses a dual-computing engine architecture to better throughput using both spatial and temporal parallelism on FPGA technology. This architecture will enhance the performance in terms of operating frequency and throughput and reduces the power consumption that meets applications with huge data processing such as Internet of Things .in this design, two boards are used, "DE1_Soc and NEEK board" with Altera Quartus Prime 18 for synthesis and simulation. The proposed design architecture gives better resource usage and throughput through fewer hardware redundancies using a frequency of 600MHZ with 64 bits for each engine from the dual-engine. Furthermore, the proposed architecture implementation results show the reduction in the time delay by 40 % and achieves a throughput of 153.6 Gb/s
... One alignment is called "Standard " and the other is "Rotated " alignments. Standard wire has a 90°alignment whereas Rotated cells have 45°alignment [2] , as shown in Fig. 5 . ...
Article
Quantum Dot Cellular Automata (QCA) is one of the new technologies beyond CMOS. Among various other technologies, this is considered to be most feasible and viable due to its area and power advantages. In this paper the discussion about the origin and progress of research works is carried out with respect to QCA domain. Starting from the basic gate study and designing of Adders few other functional blocks are also discussed. This paper proposes QCA as it is considered as the upcoming technology after the saturation of CMOS technology. QCA is considered so due to its advantages in area, power and timing requirements. This domain is still under research and has not been carried to large extent. Hence the authors have made an attempt in exploring it through designing and have simulated the proposed designs. the working of the design is proved through the simulation results.
... Public key cryptography (asymmetric cryptography) is the most widely used type of cryptography to secure data in most fields. On the other hand, symmetric cryptography is mostly used in the military field [24][25][26][27][28][29][30][31]. ...
Conference Paper
Full-text available
Cryptography plays a vital role in securing data for IT infrastructure by enabling an adequate level of security to the business. The increased significance of security in the IT infrastructure has raised the demand for public key cryptography. Public key cryptography eliminates the primary concern in private key cryptography, i.e. exchanging the key between the sender and the receiver by having a pair of keys. Public key cryptography enables the exchange of the key even in an unsecured network. After the introduction of public key cryptography, this type of cryptography is the best solution in securing the transmitted data between the sender and the receiver. However, there are vulnerabilities in this type of cryptography that both the sender and the receiver need to know. This research is focused on determining the vulnerabilities of public key cryptography. It also emphasizes how security specialists can overcome these vulnerabilities in public key cryptography.
... Smart meters have been implemented as an alternative to traditional electric meters which uses IoT technology helps consumers to monitor and regulate energy consumption remotely [6] [24][25][26][27][28]. According to [6] study, one of the factors that influence consumer's acceptance to smart meter is greatly increased when consumers are educated with environmental awareness and electricity-saving knowledge. ...
... It includes many components that similar to traditional checkout counters, which including components for scanning, packing, and bidding customer orders. [30] This invention is to reduce the time required for customers to process the purchased items and also reduce labor costs [51]. [15] Normally, customers can handle all the items that they want to purchase by themselves. ...
... However, it also raises the rate of cybercrime at the same time. According to the survey result of a target group of secondary students aged 13-17 years, 80% of them uses internet at least 2-3 days a week, 92.47% of them have social media accounts, 77% of them seldom change their password [17] [33][34][35][36]. Based on that result, it can be concluded that the students are highly exposed to the internet. ...