Explore chapters and articles related to this topic
Mobile Technologies
Published in Kris MY Law, Andrew WH Ip, Brij B Gupta, Shuang Geng, Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing, 2021
Shuang Geng, Yingsi Tan, Lu Yang
Considering the importance of security issues when using mobile technologies, researchers and industrial practitioners have dedicated collaborative efforts in protecting users. Encryption is one of the most widely adopted measures to avoid the security threat. Encryption technology generally refers to the encryption and authentication of data and information. The purpose is to keep objects confidential, thus to improve the reliability and security. Encryption techniques usually function in two ways: software-based encryption and hardware-based encryption.
Reconfigurable Architecture for Image Encryption Using a Three-Layer Artificial Neural Network
Published in IETE Journal of Research, 2022
M. Devipriya, M. Sreenivasan, M. Brindha
Hardware Encryption is needed nowadays for various reasons such as speed, security and parallelism. DES and RSA algorithms run inefficiently on general-purpose computers when compared with the specialized hardware for encryption which is usually a computation-intensive task. Hence, moving encryption to a single-chip solution makes the computation of the system faster. Running an encryption process on a generalized processor does not have physical protection. An attacker may use various tools to modify the encryption process. Hardware-based encryption devices can have physical protection to resist tampering attacks, thereby the security of the system can be ensured. Special purpose chemical coated VLSI chips destruct the logic inside it if any malicious attempts to access its internal contents. Dedicated shielding can prevent the hardware chip from revealing/modifying the data using electromagnetic radiation. The most important reason to use hardware encryption is its installation is easier. Telephonic conversation, facsimile transmissions, data links, modems, CCTV footage and medical devices that involve scanning, devices that record brain signals and heart signals can be encrypted using special purpose encryption hardware than using a conventional microprocessor with software-based encryption solutions. Even if the protected data come from a generalized processor, it is simple to install a dedicated hardware encryption device than to use software in the computer system. There are three kinds of hardware encryption devices. They are (a) modules of self-contained hardware encryption for functions such as key management, password verification, etc., (b) dedicated encryption boxes for communication links and (c) boards to be used within personal computers. The involvement of confusion and diffusion in an encryption scheme defines the versatility of the algorithm in the security aspect. It was introduced by Claude Shannon in 1945. These characteristics when adopted, will prevent statistical attacks and other cryptanalyses. In confusion, the change of the values should depend on the key and should provide ambiguity of the cipher. In diffusion, a change of a single-bit value in the actual image could change more than half the cipher bits. To ensure the high-security standard in the proposed technique, a novel key generation scheme using the plain image has been deployed to resist the differential attack. Field programmable gate array (FPGA) has been utilized to realize and test the encryption algorithm as hardware which also paves a way for developing it as an application-specific integrated circuit (ASIC) in the future.