Skip to main content

2016 | OriginalPaper | Buchkapitel

A Comparative Analysis of Different LFSR-Based Ciphers and Parallel Computing Platforms for Development of Generic Cipher Compatible on both Hardware and Software Platforms

verfasst von : Trishla Shah, Darshana Upadhyay, Priyanka Sharma

Erschienen in: Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Pseudorandom numbers are at the core of any network security application. Pseudorandom numbers find its application in the network security domain in key generation, re-keying, authentication, smart-phone security, etc. These random numbers are produced through PRNG (Pseudorandom Number Generator). Hence, if there is a flaw or the PRNG produces predictable sets of random numbers, then the entire application would be prone to attacks. Therefore, development of a generic framework for generating strong sets of pseudorandom numbers is proposed. Hardware implementation for GSM stream cipher has already been implemented, under a particular segment of mobile communication. The project advanced into many dimensions like vulnerability testing, protocol designing, implementation in both software and hardware and evaluating. The proposal aims to build an in-general framework and a unified model for enhanced security specifically for LFSR (Linear-feedback shift register)-based stream ciphers. Hence, a thorough study on already existing LFSR-based ciphers is done. This study aims to extract out the behaviour of different ciphers under different application domains. As pseudorandom numbers are used in both software (stream ciphers, protocol design) as well as hardware (wireless devices, smart phones) areas of security, the generic model proposed is aimed at using a co-simulation of both hardware and software. For software development of the cipher, a parallel computing environment has been chosen because in today’s computing trends, multi-core processors are superseding the sequential ones; hence, the basic force for growth of processor is to increase parallelism rather than increasing the clock rate. The paper thus presents the CSPRNG (Cryptographically secure pseudo-random number generator) model based on hardware and software co-simulations, using a generic approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Garland, M., Le Grand, S., Nickolls, J., Anderson, J., Hardwick, J., Morton, S., Phillips, E., Zhang, Y., Volkov, V.: Parallel computing experiences with CUDA. IEEE Micro 28, 13–27 (2008)CrossRef Garland, M., Le Grand, S., Nickolls, J., Anderson, J., Hardwick, J., Morton, S., Phillips, E., Zhang, Y., Volkov, V.: Parallel computing experiences with CUDA. IEEE Micro 28, 13–27 (2008)CrossRef
2.
Zurück zum Zitat Al-Hamdani, W.A., Griskell, I.J.: A proposed curriculum of cryptography courses. In: Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, pp. 4–11. ACM (2005) Al-Hamdani, W.A., Griskell, I.J.: A proposed curriculum of cryptography courses. In: Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, pp. 4–11. ACM (2005)
3.
Zurück zum Zitat Preneel, B., Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students And Practitioners. Springer (2009) Preneel, B., Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students And Practitioners. Springer (2009)
4.
Zurück zum Zitat Singhal, T.C.: Systems and methods for complex encryption keys. US Patent 8,363,834, Jan 29 2013 Singhal, T.C.: Systems and methods for complex encryption keys. US Patent 8,363,834, Jan 29 2013
5.
Zurück zum Zitat Topaloglu, U., Bayrak, C., Iqbal, K.: A pseudo random number generator in mobile agent interactions. In: IEEE International Conference on Engineering of Intelligent Systems, pp. 1–5 (2006) Topaloglu, U., Bayrak, C., Iqbal, K.: A pseudo random number generator in mobile agent interactions. In: IEEE International Conference on Engineering of Intelligent Systems, pp. 1–5 (2006)
6.
Zurück zum Zitat Fan, J.-W., Chan, C.-W., Chang, Y.-F.: A random increasing sequence hash chain and smart card-based remote user authentication scheme. In: 9th International Conference on Information, Communications and Signal Processing (ICICS), pp. 1–5. IEEE (2013) Fan, J.-W., Chan, C.-W., Chang, Y.-F.: A random increasing sequence hash chain and smart card-based remote user authentication scheme. In: 9th International Conference on Information, Communications and Signal Processing (ICICS), pp. 1–5. IEEE (2013)
7.
Zurück zum Zitat Khan, M.A., Hasan, A.: Pseudo random number based authentication to counter denial of service attacks on 802.11. In: 5th IFIP International Conference on Wireless and Optical Communications Networks, WOCN’08, pp. 1–5. IEEE (2008) Khan, M.A., Hasan, A.: Pseudo random number based authentication to counter denial of service attacks on 802.11. In: 5th IFIP International Conference on Wireless and Optical Communications Networks, WOCN’08, pp. 1–5. IEEE (2008)
8.
Zurück zum Zitat Hell, Martin, Johansson, Thomas, Meier, Willi: Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2(1), 86–93 (2007)CrossRef Hell, Martin, Johansson, Thomas, Meier, Willi: Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2(1), 86–93 (2007)CrossRef
9.
Zurück zum Zitat Agren, M., Hell, M., Johansson, T., Meier, W.: A new version of grain-128 with authentication. In: Symmetric Key Encryption Workshop (2011) Agren, M., Hell, M., Johansson, T., Meier, W.: A new version of grain-128 with authentication. In: Symmetric Key Encryption Workshop (2011)
10.
Zurück zum Zitat Ekdahl, P., Johansson, T.: Snow-a new stream cipher. In: Proceedings of First Open NESSIE Workshop, KU-Leuven, pp. 167–168 (2000) Ekdahl, P., Johansson, T.: Snow-a new stream cipher. In: Proceedings of First Open NESSIE Workshop, KU-Leuven, pp. 167–168 (2000)
11.
Zurück zum Zitat Ekdahl, P., Johansson, T.: A new version of the stream cipher snow. In: Selected Areas in Cryptography, pp. 47–61. Springer (2003) Ekdahl, P., Johansson, T.: A new version of the stream cipher snow. In: Selected Areas in Cryptography, pp. 47–61. Springer (2003)
12.
Zurück zum Zitat Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for rfid systems using the aes algorithm. In: Cryptographic Hardware and Embedded Systems-CHES 2004, pp. 357–370. Springer (2004) Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for rfid systems using the aes algorithm. In: Cryptographic Hardware and Embedded Systems-CHES 2004, pp. 357–370. Springer (2004)
13.
Zurück zum Zitat Analysis of different hardware ciphers Analysis of different hardware ciphers
14.
15.
Zurück zum Zitat Cuda toolkit documentation—Developer Zone Cuda toolkit documentation—Developer Zone
16.
Zurück zum Zitat Passerat-Palmbach, J., Mazel, C., Hill, D.R.C.: Pseudo-random number generation on gp-gpu. In: IEEE Workshop on Principles of Advanced and Distributed Simulation (PADS), pp. 1–8. IEEE (2011) Passerat-Palmbach, J., Mazel, C., Hill, D.R.C.: Pseudo-random number generation on gp-gpu. In: IEEE Workshop on Principles of Advanced and Distributed Simulation (PADS), pp. 1–8. IEEE (2011)
17.
Zurück zum Zitat A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
18.
19.
Zurück zum Zitat Effectiveness of Cuda for existing ciphers Effectiveness of Cuda for existing ciphers
20.
Metadaten
Titel
A Comparative Analysis of Different LFSR-Based Ciphers and Parallel Computing Platforms for Development of Generic Cipher Compatible on both Hardware and Software Platforms
verfasst von
Trishla Shah
Darshana Upadhyay
Priyanka Sharma
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2638-3_35

Neuer Inhalt