Protected Test Covering using Light Weight Block Cipher

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BEST - 1 : A Light Weight Block Cipher

The demand for applications involving Wireless Sensor Network (WSN) or RFID systems is increasing. The sensor in a WSN and RFID tag/reader in a RFID system are called resource constrained devices because these devices have limited processing power, memory size and energy supply. The information transmitted among these low resource devices must be protected from unauthorized access using specifi...

متن کامل

Secure Communication over BSN Using Modified Feather Light Weight Block (MFLB) Cipher Encryption

Wireless Body Sensor Network (WBSN) has tremendous applications in healthcare domain. The body sensors collects personal as well as medical information form patient’s body and transmit it to healthcare people through internet. In this period of time, it is crucial to ensure security and privacy due to unauthorized access of personal health information by intruder or eavesdroppers. Therefore, en...

متن کامل

A Weight Based Attack on the CIKS-1 Block Cipher

In 2002, Moldovyan and Moldovyan introduced a cipher with security based mainly on data-dependent permutations (DDPs) called CIKS–1[1]. The goal of the cipher was to exploit the speed and simplicity of DDPs to create a fast hardware-oriented block cipher. This paper examines the properties of DDPs. In particular, it is noted that these structures do not change the Hamming weight of the data. Us...

متن کامل

Enhancing Channel Coding using AES Block Cipher

A key benefit of channel coding is the ability to protect data against channel impairments. Essentially, the channel coder adds redundancy bits that provide a way to correct corrupted data. Encryption is another way of protecting data against channel impairments and unintended interception or forging. This paper introduces an efficient approach of increasing coding gain at the receiver end. The...

متن کامل

A Block Cipher Generation Using Color Substitution

The most powerful and common approach to countering the threats to network / information security is encryption [1]. Even though it is very powerful, the cryptanalysts are very intelligent and they were working day and night to break the ciphers. To make a stronger cipher it is recommended that to use: More stronger and complicated encryption algorithms, Keys with more number of bits (Longer ke...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Science and Technology

سال: 2015

ISSN: 0974-5645,0974-6846

DOI: 10.17485/ijst/2015/v8i31/87299