A realizable quantum three-pass protocol authentication based on Hill-cipher algorithm is presented by encoded and decoded plaintext using classical Hill-cipher algorithm. It is shown that the encoded message transferred to the particles called quantum state where we assumed that a photon is used as a qubit and after the encoded message is transferred into photons, the polarization of each photon is rotated by an angleθj, which is chosen randomly for each qubit. The sender and receiver agree over a Hill-cipher key, the encryption occurs by utilization of the quantum three-pass protocol (QTPP), the decryption will be illustrated, and an example shows how the algorithm will work. Finally, the security of this algorithm is analyzed in detail.
The current study introduces a hardware-implemented PRINCE block cipher within Field Programmable Gate Array (FPGA) determined by the quantum cryptography protocol (BB84). Most security-related software applications of cryptographic algorithms tend to be rather slow and of no efficiency. So as to present a solution to this issue, a new hardware architecture is suggested for speeding up the execution of the PRINCE algorithm and increasing its flexibility, yet with more security. Concurrent computing designs allow an encryption block data of 64 bits during a single clock cycle, resulting in the reduction of hardware area and the production of a higher throughput and relatively lower latency. Higher speed processing and lower power consumption are other features that have been observed. This could be achieved by means of implementing the encrypting, decrypting and quantum key schedule using little hardware sources, followed by the development of a sufficient hardware architecture model for the PRINCE algorithm through very high speed integrated circuit hardware description language (VHDL). The synthetization of this VHDL design is eventually performed in FPGA boards. As for the present study, two FPGA boards have been employed, namely Virtex-4 and Kintex-7. The resulting data indicates the throughput and efficiency values to be (2.029 Gbps) and (1.9 Mbps/slice) for Virtex-4, and (3.931 Gbps) and (7.290 Mbps/slice) for Kintex-7, all respectively.
Operators of networks are striving to provide functional network-based services, while keeping the cost of deploying the service to a minimum. Network Function Virtualization (NFV) is considered to be a promising model to modify such employment by separating network functions from the basic hardware properties, after which they are converted into the style of software. These are eventually referred to as Virtual Network Functions (VNFs). This separation offers numerous benefits, including the decrease of Capital Expenditure (CAPEX) and Operation Expense (OPEX), in addition to the enhanced elasticity of service preparation. Network Functions Virtualization (NFV) is found to cause a remarkable development or even a technological revolution in terms of network-based services, leading to a decrease in deployment costs for network operators. NFV reduces hardware tool costs and energy exhaustion, and it improves its operational performance whereby the network configuration is part of this optimization. Even so, there are a number of possible security problems which are the main focus in NFV. The present study surveys the applications and opportunities of NFV in terms of IoT, SDN, cloud computing and blockchain. A description of the NFV architecture is presented, and several possibilities of NFV security issues and challenges are discussed. Finally, a systematic idea is provided on the design of a Blockchain Network Virtualization System.
The restricted devices have a small memory, simple processor, and limited power. To secure them, we need lightweight cryptography algorithms, taking into account the limited specifications. Lightweight cryptography (LWC) algorithms provide confidentiality and maintain information integrity for devices with limited resources. This paper improves and enhances advanced encryption standard (AES) algorithm by reducing algorithm computation power and improving cryptography performance from the point of resource constraint devices. The proposed algorithm is fast and lightweight, which is essential for securing all kinds of data. Besides, the use of mix column overhead is dispensing with, and the ciphertext is processed by the mathematical function (continued fraction) to compress the ciphertext and make it more confusing and also to increasing the data transfer speed. The proposed lightweight cryptography-AES (LWC-AES) algorithm highly suitable for the timely execution of encryption and decryption (such as when encrypt text has (45.1 KB) encryption execution time for AES was (294 ms), while in LWC-AES was (280 ms), as well as suitable for the memory size of the resource-constrained devices for all types of data, than the AES algorithm. The proposed algorithm tested for security analysis using the avalanche effect parameter, and this test showed acceptable and within required security results.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.