Explore chapters and articles related to this topic
Applications of IoT in Medical Technology and Healthcare
Published in Rajdeep Chowdhury, S. K. Niranjan, Advances in Applications of Computational Intelligence and the Internet of Things, 2022
Parshant Kumar Sharma, Shraddha Kaushik, Saurabh Pandey, Megha Gupta, Nishant Vats, Manu Gautam, Madhusudan Sharma
To get plaintext as an output requires codes and secret keys as an input. An encipher algorithm for interactive media data based on arithmetic modulo. Both coded text and clear text are of block size 64. 64-bit length is for secret key. The structure of this block cipher provides confusion and diffusion.17
Introduction to Information Security Systems Primitives
Published in S. Ramakrishnan, Cryptographic and Information Security, 2018
Majid Khan, Syeda Iram Batool Naqvi
Current block ciphers utilize both confusion and diffusion. The codebook parts of such frameworks give confusion practically equivalent to however on a considerably more fabulous scale-a basic substitution. All modern block ciphers utilized this nonlinear component [2,3].
How to encrypt a graph
Published in International Journal of Parallel, Emergent and Distributed Systems, 2020
It is said that cryptography is the process of applying confusion and diffusion to a plaintext in order to obtain a corresponding ciphertext. In a classical encryption scheme, confusion is implemented by substitution, that is, by using an encryption key to replace basic constituents of the plaintext (such as letters, symbols, bits, and so on) by other objects of the same or another type, and then diffusion is implemented by permutation, that is, by shuffling these objects, also under the control of the encryption key.
Reconfigurable Architecture for Image Encryption Using a Three-Layer Artificial Neural Network
Published in IETE Journal of Research, 2022
M. Devipriya, M. Sreenivasan, M. Brindha
Hardware Encryption is needed nowadays for various reasons such as speed, security and parallelism. DES and RSA algorithms run inefficiently on general-purpose computers when compared with the specialized hardware for encryption which is usually a computation-intensive task. Hence, moving encryption to a single-chip solution makes the computation of the system faster. Running an encryption process on a generalized processor does not have physical protection. An attacker may use various tools to modify the encryption process. Hardware-based encryption devices can have physical protection to resist tampering attacks, thereby the security of the system can be ensured. Special purpose chemical coated VLSI chips destruct the logic inside it if any malicious attempts to access its internal contents. Dedicated shielding can prevent the hardware chip from revealing/modifying the data using electromagnetic radiation. The most important reason to use hardware encryption is its installation is easier. Telephonic conversation, facsimile transmissions, data links, modems, CCTV footage and medical devices that involve scanning, devices that record brain signals and heart signals can be encrypted using special purpose encryption hardware than using a conventional microprocessor with software-based encryption solutions. Even if the protected data come from a generalized processor, it is simple to install a dedicated hardware encryption device than to use software in the computer system. There are three kinds of hardware encryption devices. They are (a) modules of self-contained hardware encryption for functions such as key management, password verification, etc., (b) dedicated encryption boxes for communication links and (c) boards to be used within personal computers. The involvement of confusion and diffusion in an encryption scheme defines the versatility of the algorithm in the security aspect. It was introduced by Claude Shannon in 1945. These characteristics when adopted, will prevent statistical attacks and other cryptanalyses. In confusion, the change of the values should depend on the key and should provide ambiguity of the cipher. In diffusion, a change of a single-bit value in the actual image could change more than half the cipher bits. To ensure the high-security standard in the proposed technique, a novel key generation scheme using the plain image has been deployed to resist the differential attack. Field programmable gate array (FPGA) has been utilized to realize and test the encryption algorithm as hardware which also paves a way for developing it as an application-specific integrated circuit (ASIC) in the future.