Protected Test Covering using Light Weight Block Cipher
نویسندگان
چکیده
منابع مشابه
BEST - 1 : A Light Weight Block Cipher
The demand for applications involving Wireless Sensor Network (WSN) or RFID systems is increasing. The sensor in a WSN and RFID tag/reader in a RFID system are called resource constrained devices because these devices have limited processing power, memory size and energy supply. The information transmitted among these low resource devices must be protected from unauthorized access using specifi...
متن کاملSecure Communication over BSN Using Modified Feather Light Weight Block (MFLB) Cipher Encryption
Wireless Body Sensor Network (WBSN) has tremendous applications in healthcare domain. The body sensors collects personal as well as medical information form patient’s body and transmit it to healthcare people through internet. In this period of time, it is crucial to ensure security and privacy due to unauthorized access of personal health information by intruder or eavesdroppers. Therefore, en...
متن کاملA Weight Based Attack on the CIKS-1 Block Cipher
In 2002, Moldovyan and Moldovyan introduced a cipher with security based mainly on data-dependent permutations (DDPs) called CIKS–1[1]. The goal of the cipher was to exploit the speed and simplicity of DDPs to create a fast hardware-oriented block cipher. This paper examines the properties of DDPs. In particular, it is noted that these structures do not change the Hamming weight of the data. Us...
متن کاملEnhancing Channel Coding using AES Block Cipher
A key benefit of channel coding is the ability to protect data against channel impairments. Essentially, the channel coder adds redundancy bits that provide a way to correct corrupted data. Encryption is another way of protecting data against channel impairments and unintended interception or forging. This paper introduces an efficient approach of increasing coding gain at the receiver end. The...
متن کاملA Block Cipher Generation Using Color Substitution
The most powerful and common approach to countering the threats to network / information security is encryption [1]. Even though it is very powerful, the cryptanalysts are very intelligent and they were working day and night to break the ciphers. To make a stronger cipher it is recommended that to use: More stronger and complicated encryption algorithms, Keys with more number of bits (Longer ke...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2015
ISSN: 0974-5645,0974-6846
DOI: 10.17485/ijst/2015/v8i31/87299