Weitere Kapitel dieses Buchs durch Wischen aufrufen
Pseudorandom numbers are at the core of any network security application. Also, security of satellite phones and cellular phones depends heavily on the pseudorandom numbers generated. In the network security domain, its use is particularly in key generation, re-keying, authentication, smart-phone security, etc. Also, current research shows that satellite-based telephony system, having GMR-1 and GMR-2 algorithms for secret key generation is prone to attacks. The algorithm A5/1 used in GSM technology is also cryptographically poor. Hence generation of strong sets of pseudorandom number is needed. These random numbers are produced through a pseudorandom number generator (PRNG). This generator in general terms is called a Cipher. Hence, if there is a flaw or the PRNG produces predictable sets of random numbers, then the entire application would be prone to attacks. Therefore, development of a generic framework for generating strong sets of pseudorandom numbers is proposed. The proposal aims to build an in-general framework and a unified model for enhanced security specifically for LFSR-based stream ciphers. The proposed generic model uses results from the above case study. For the hardware deployment, Spartan-6 FPGA toolkit is used and for the software part a parallel computing platform namely CUDA is used. The model is aimed at development of a framework which generates strong sets of pseudorandom numbers for its use in various network security, satellite and cellular applications.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
M. Garland, S. Le Grand, J. Nickolls, J. Anderson, J. Hardwick, S. Morton, E. Phillips, Y. Zhang, and V. Volkov, “Parallel Computing Experiences with CUDA,” IEEE Micro, vol. 28, pp. 13–27, July 2008.
Wasim A Al-Hamdani and Ivory J Griskell. A proposed curriculum of cryptography courses. In Proceedings of the 2nd annual conference on Information security curriculum development, pages 4–11. ACM, 2005.
Bart Preneel, Christof Paar, and Jan Pelzl. Understanding cryptography: a textbook for students and practitioners. Springer, 2009.
Tara Chand Singhal. Systems and methods for complex encryption keys, January 29 2013. US Patent 8, 363, 834.
Jianbin Fang, Ana Lucia Varbanescu, and Henk Sips. A comprehensive performance comparison of cuda and opencl. In Parallel Processing (ICPP), 2011 International Conference on, pages 216–225. IEEE, 2011.
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications.
Cuda toolkit documentation- Developer Zone.
Jonathan Passerat-Palmbach, Claude Mazel, and David RC Hill. Pseudo-random number generation on gp-gpu. In Principles of Advanced and Distributed Simulation (PADS), 2011 IEEE Workshop on, pages 1–8. IEEE, 2011.
Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for rfid systems using the aes algorithm. In Cryptographic Hardware and Embedded Systems-CHES 2004, pages 357–370. Springer, 2004.
Darshana Upadhyay, Ankit Shah and Priyanka Sharma. “Design, Implementation and Analysis of GSM stream cipher: Software simulators v/s real test bed-FPGA”, IEEE Conference: 2014 Sixth International Conference on Computational Intelligence and Communication Networks.
D. P. Upadhyay, P. Sharma and S. Valiveti, “Randomness analysis of A5/1 Stream Cipher for secure mobile communication,” International Journal Of Computer Science & Communication, vol. 3, pp. 95–100, 2014.
Upadhyay, D.; Shah, T.; Sharma, P., “Cryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR stream cipher,” in VLSI Design and Test (VDAT), 2015 19th International Symposium on, vol., no., pp. 1–6, 26–29 June 2015.
- Design Analysis of an n-Bit LFSR-Based Generic Stream Cipher and Its Implementation Discussion on Hardware and Software Platforms
- Springer Singapore