[PDF] Towards Designing Energy Efficient Secure Hashes - eBooks Review

Towards Designing Energy Efficient Secure Hashes


Towards Designing Energy Efficient Secure Hashes
DOWNLOAD

Download Towards Designing Energy Efficient Secure Hashes PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Towards Designing Energy Efficient Secure Hashes book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages. If the content not found or just blank you must refresh this page



Towards Designing Energy Efficient Secure Hashes


Towards Designing Energy Efficient Secure Hashes
DOWNLOAD
Author : Priyanka Dhoopa Harish
language : en
Publisher:
Release Date : 2015

Towards Designing Energy Efficient Secure Hashes written by Priyanka Dhoopa Harish and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2015 with Computer security -- Software -- Energy consumption -- Design categories.


In computer security, cryptographic algorithms and protocols are required to ensure security of data and applications. This research investigates techniques to reduce the energy consumed by cryptographic hash functions. The specific hash functions considered are Message Digest-2 (MD2), Message Digest-5 (MD5), Secure Hash Algorithm-1 (SHA-1) and Secure Hash Algorithm-2 (SHA-2). The discussion around energy conservation in handheld devices like laptops and mobile devices is gaining momentum. Research has been done at the hardware and operating system levels to reduce the energy consumed by these devices. However, research on conserving energy at the application level is a new approach. This research is motivated by the energy consumed by anti-virus applications which use computationally intensive hash functions to ensure security. To reduce energy consumption by existing hash algorithms, the generic energy complexity model, designed by Roy et al. [Roy13], has been applied and tested. This model works by logically mapping the input across the eight available memory banks in the DDR3 architecture and accessing the data in parallel. In order to reduce the energy consumed, the data access pattern of the hash functions has been studied and the energy complexity model has been applied to hash functions to redesign the existing algorithms. These experiments have shown a reduction in the total energy consumed by hash functions with different degrees of parallelism of the input message, as the energy model predicted, thereby supporting the applicability of the energy model on the different hash functions chosen for the study. The study also compared the energy consumption by the hash functions to identify the hash function suitable for use based on required security level. Finally, statistical analysis was performed to verify the difference in energy consumption between MD5 and SHA2.



Design Of Hashing Algorithms


Design Of Hashing Algorithms
DOWNLOAD
Author : Josef Pieprzyk
language : en
Publisher: Springer
Release Date : 1993

Design Of Hashing Algorithms written by Josef Pieprzyk and has been published by Springer this book supported file pdf, txt, epub, kindle and other format this book has been release on 1993 with Algorithms categories.


This work presents recent developments in hashing algorithm design. Hashing is the process of creating a short digest (i.e., 64 bits) for a message of arbitrary length, for exam- ple 20 Mbytes. Hashing algorithms were first used for sear- ching records in databases; they are central for digital si- gnature applications and are used for authentication without secrecy. Covering all practical and theoretical issues related to the design of secure hashing algorithms the book is self contained; it includes an extensive bibliography on the topic.



Towards Designing Energy Efficient Symmetric Key Protocols


Towards Designing Energy Efficient Symmetric Key Protocols
DOWNLOAD
Author : S. Raghu Talluri
language : en
Publisher:
Release Date : 2018

Towards Designing Energy Efficient Symmetric Key Protocols written by S. Raghu Talluri and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2018 with Algorithms -- Energy conservation -- Design and construction categories.


Energy consumption by various modern symmetric key encryption protocols (DES, 3-DES, AES and, Blowfish) is studied from an algorithmic perspective. The work is directed towards redesigning or modifying the underlying algorithms for these protocols to make them consume less energy than they currently do. This research takes the approach of reducing energy consumption by parallelizing the consecutive memory accesses of symmetric key encryption algorithms. To achieve parallelization, an existing energy complexity model is applied to symmetric key encryption algorithms. Inspired by the popular DDR3 architecture, the model assumes that main memory is divided into multiple banks, each of which can store multiple blocks. Each block in a bank can only be accessed from a cache of its own, that can hold exactly one block. However all the caches from different banks can be accessed simultaneously. In this research, experiments are conducted to measure the difference in energy consumption by varying the level of parallelization, i.e. variations of, number of banks that can be accessed in parallel. The experimental results show that the higher the level of parallelism, smaller is the energy consumption.



Open Problems In Network Security


Open Problems In Network Security
DOWNLOAD
Author : Jan Camensich
language : en
Publisher: Springer Science & Business Media
Release Date : 2012-01-12

Open Problems In Network Security written by Jan Camensich and has been published by Springer Science & Business Media this book supported file pdf, txt, epub, kindle and other format this book has been release on 2012-01-12 with Computers categories.


This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection, saving energy, policies, and problems in the cloud.



Design Of Energy Efficient Application Specific Instruction Set Processors


Design Of Energy Efficient Application Specific Instruction Set Processors
DOWNLOAD
Author : Tilman Glökler
language : en
Publisher: Springer Science & Business Media
Release Date : 2007-05-08

Design Of Energy Efficient Application Specific Instruction Set Processors written by Tilman Glökler and has been published by Springer Science & Business Media this book supported file pdf, txt, epub, kindle and other format this book has been release on 2007-05-08 with Technology & Engineering categories.


After a brief introduction to low-power VLSI design, the design space of ASIP instruction set architectures (ISAs) is introduced with a special focus on important features for digital signal processing. Based on the degrees of freedom offered by this design space, a consistent ASIP design flow is proposed: this design flow starts with a given application and uses incremental optimization of the ASIP hardware, of ASIP coprocessors and of the ASIP software by using a top-down approach and by applying application-specific modifications on all levels of design hierarchy. A broad range of real-world signal processing applications serves as vehicle to illustrate each design decision and provides a hands-on approach to ASIP design. Finally, two complete case studies demonstrate the feasibility and the efficiency of the proposed methodology and quantitatively evaluate the benefits of ASIPs in an industrial context.



Energy Efficient Protocols And Hardware Architectures For Transport Layer Security


Energy Efficient Protocols And Hardware Architectures For Transport Layer Security
DOWNLOAD
Author : Utsav Banerjee
language : en
Publisher:
Release Date : 2017

Energy Efficient Protocols And Hardware Architectures For Transport Layer Security written by Utsav Banerjee and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2017 with categories.


The Internet of Things (IoT) has introduced a vision of an Internet where computing and sensing devices are interconnected. Digitally connected devices are encroaching on every aspect of our lives, including our homes, cars, offices, and even our bodies. Researchers estimate that there will be over 50 billion wireless connected devices by 2020 [1]. On one hand, the IoT enables fundamentally new applications, but on the other, these devices are attractive targets for cyber attackers, thus making IoT security a major concern. Datagram Transport Layer Security (DTLS) is considered to be one of the most suited protocols for securing the IoT. However, computation and communication overheads make it very expensive to implement DTLS on resource-constrained IoT sensor nodes. In this work, we profile the energy costs of DTLS version 1.3, using experimental models for cryptographic computations and radio-frequency (RF) communications. Based on this analysis, we propose protocol optimizations that can reduce the overall energy consumption of DTLS up to 45%, while still maintaining the same security strength of the standard DTLS. We discuss energy-efficient architectures for implementing the standard cryptographic primitives AES (Advanced Encryption Standard), SHA (Secure Hash Algorithm) and ECC (Elliptic Curve Cryptography) in hardware. Our hardware can provide more than 2,500 times reduction in energy consumption compared to traditional software implementations. These hardware primitives are integrated with dedicated control and memory to design a DTLS co-processor that can accelerate the complete DTLS state machine in hardware, thus minimizing the energy consumption due to DTLS computations. The proposed DTLS core is integrated with a RISC-V micro-processor to accurately profile these functions, as well as design custom protocols using standalone cryptographic instructions.



Principles Of Secure Processor Architecture Design


Principles Of Secure Processor Architecture Design
DOWNLOAD
Author : Jakub Szefer
language : en
Publisher: Morgan & Claypool Publishers
Release Date : 2018-10-18

Principles Of Secure Processor Architecture Design written by Jakub Szefer and has been published by Morgan & Claypool Publishers this book supported file pdf, txt, epub, kindle and other format this book has been release on 2018-10-18 with Computers categories.


This book presents the different challenges of secure processor architecture design for architects working in industry who want to add security features to their designs as well as graduate students interested in research on architecture and hardware security. It educates readers about how the different challenges have been solved in the past and what are the best practices, i.e., the principles, for design of new secure processor architectures. Based on the careful review of past work by many computer architects and security researchers, readers also will come to know the five basic principles needed for secure processor architecture design. The book also presents existing research challenges and potential new research directions. Finally, it presents numerous design suggestions, as well as discussing pitfalls and fallacies that designers should avoid. With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book gives readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered).



Principles Of Secure Processor Architecture Design


Principles Of Secure Processor Architecture Design
DOWNLOAD
Author : Jakub Szefer
language : en
Publisher: Springer Nature
Release Date : 2022-06-01

Principles Of Secure Processor Architecture Design written by Jakub Szefer and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2022-06-01 with Technology & Engineering categories.


With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book aims to give readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered). This book aims to present the different challenges of secure processor architecture design to graduate students interested in research on architecture and hardware security and computer architects working in industry interested in adding security features to their designs. It aims to educate readers about how the different challenges have been solved in the past and what are the best practices, i.e., the principles, for design of new secure processor architectures. Based on the careful review of past work by many computer architects and security researchers, readers also will come to know the five basic principles needed for secure processor architecture design. The book also presents existing research challenges and potential new research directions. Finally, this book presents numerous design suggestions, as well as discusses pitfalls and fallacies that designers should avoid.



Proceedings Of The International Conference On Interdisciplinary Research In Electronics And Instrumentation Engineering 2015


Proceedings Of The International Conference On Interdisciplinary Research In Electronics And Instrumentation Engineering 2015
DOWNLOAD
Author : Kokula Krishna Hari Kunasekaran
language : en
Publisher: Association of Scientists, Developers and Faculties (ASDF)
Release Date : 2015-08-11

Proceedings Of The International Conference On Interdisciplinary Research In Electronics And Instrumentation Engineering 2015 written by Kokula Krishna Hari Kunasekaran and has been published by Association of Scientists, Developers and Faculties (ASDF) this book supported file pdf, txt, epub, kindle and other format this book has been release on 2015-08-11 with Computers categories.


Proceedings of the International Conference on Interdisciplinary Research in Electronics and Instrumentation Engineering 2015 (ICIREIE)



Deep Learning Strategies For Security Enhancement In Wireless Sensor Networks


Deep Learning Strategies For Security Enhancement In Wireless Sensor Networks
DOWNLOAD
Author : Sagayam, K. Martin
language : en
Publisher: IGI Global
Release Date : 2020-06-12

Deep Learning Strategies For Security Enhancement In Wireless Sensor Networks written by Sagayam, K. Martin and has been published by IGI Global this book supported file pdf, txt, epub, kindle and other format this book has been release on 2020-06-12 with Computers categories.


Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.