TAILIEUCHUNG - Eloba chaotic keystream cipher: implementation, analysis and performance

In our paper, we describe eLoBa architecture, based on Lorenz chaotic system. We also analyze one important security issue of keystream cryptographic systems, the cycle length. Finally, we compare eLoBa against several cryptographic systems, for its performance on a authentication service implementation on a resource constraint smart-card. | International Journal of Computer Networks and Communications Security C VOL. 2, NO. 3, MARCH 2014, 119–124 Available online at: ISSN 2308-9830 N C S eLoBa Chaotic Keystream Cipher: Implementation, Analysis and Performance RUI MIGUEL SILVA1, RUI GUSTAVO CRESPO2 1 Polytechnic Institute of Beja (IPBeja)/Lab UbiNET/INESC-ID, Department of Engineering, Beja, Portugal 2 Technical University of Lisbon (UTL)/INESC-ID, Department of Electrical and Computer Engineering, Lisbon, Portugal E-mail: 1ruisilva@, 2(Posthumous Co-Author) ABSTRACT Many computer-based security services are required by modern society, such as cipher/decipher, authentication and integrity. Security services are implemented by cryptographic systems, such as symmetric (block and keystream) and asymmetric. We focus our attention to a special sort of keystream cryptographic systems, based on chaotic systems. In our paper, we describe eLoBa architecture, based on Lorenz chaotic system. We also analyze one important security issue of keystream cryptographic systems, the cycle length. Finally, we compare eLoBa against several cryptographic systems, for its performance on a authentication service implementation on a resource constraint smart-card. Keywords: Chaotic Cipher, Smart-Card Authentication, Keystream Cipher, Security and Privacy, Cryptography. 1 INTRODUCTION Cryptography for resource constrained devices is a challenge with increasing interest due to the rise of Internet of Thing, the applications of Wireless Sensor Networks, or the massive usage of smartcards, among other areas. However, most of the cryptographic algorithms demand for computational resources that could not be available in such devices. One important cryptographic service is Authentication and chaos cryptography is low resource consumer. In this paper we merge this two facts and evaluate the results in real world smart-card implementation. 2 CHAOTIC KEYSTREAM CIPHER In this section we briefly present

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.