Multi-symmetric Ciphering System Module Based on Microcontroller

Show simple item record

dc.contributor.author Abdelhady, Ghada
dc.contributor.author Elbehiery, Hussam
dc.date.accessioned 2020-02-29T07:58:22Z
dc.date.available 2020-02-29T07:58:22Z
dc.date.issued 2012
dc.identifier.citation [1] “Cracking DES. Secrets of encryption research, wiretap politics and chip design”, Electronic Frontier Foundation, May 1998. [2] Ghada Abdelmouez M., Fathy S. Helail, and Abdellatif A. Elkouny, “New DES based on Elliptic Curves,” World Academy of Science, Engineering and Technology, 63, March 2010. [3] Ghada Abdelmouez M., Fathy S. Helail, and Abdellatif A. Elkouny, “Elliptic Curve Cryptographic based DES Reinforcement,” ICGSTCNIR Journal, Volume 10, Issue 1, December 2010. [4] Paar C, Jan Pelzl, Understanding Cryptography A Textbook for Students and Practitioners , Springer-Verlag Berlin Heidelberg, Germany, pp 70-71, 2010. [5] “Data Encryption Standard (DES)”, FIPS PUB 46-3 Federal Information Processing Standards Publications, U.S. Department of Commerce/National Institute of Standards and Technology, October 25, 1999. [6] H. Darrel, A Menezes., S. Vanstone: Guide to Elliptic Curve Cryptography, Springer- Verlag New York, Inc., 2004. [7] Paar C.: Implementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems ECC, Worcester Polytechnic Institute, USA, 1999. [8] E. Matthew, The Weierstrass Theory For Elliptic Functions, Department of Mathematics, MACS Herriot Watt University, Edinburgh, The Burn 2007. [9] N. Torri, K. Yokoyama, Elliptic Curve Cryptosystems, Fujtsu Sci. Tech. J. pp. 140-146, December 2002. [10] A. Stuart, Encryption and Security: the Advanced Encryption Standard, EDN, October, 2002. [11] Poettering.AVRAES:TheAESblockcipheronAVRcontrollers,2006. http://point-at-infinity.org/avraes/ [12] S. Wiliam, Cryptography and Network Security Principles and Practices, Fourth Edition, Prentice Hall, November 16, 2005. [13] Hugo Fruehauf , “Encryption Fundamentals,” in Zyfers, October 2001. [14] Thomas Wollinger, Jorge Guajardo, and Christof Paar, “Cryptography in Embedded Systems: An Overview,” Embedded World 2003 Exhibition and Conference, pp. 735-744, Design & Elektronik, Nuernberg, Germany, February 18-20, 2003. [15] Archana Ramachandran, Zhibin Zhou, and Dijiang Huang, Computing Cryptographic Algorithms in Portable and Embedded Devices, in Proceedings of the IEEE International Conference on Portable Information Devices (PORTABLE), pages 1-7, 2007. [16] Chung-Chu Chia and Shuenn-Shyang Wang, “Efficient design of an embedded microcontroller for Advanced Encryption Standard,” Proceeding of the 2005 Workshop on Consumer Electronics and Signal Processing (WCEsp 2005). [17] Anton Kargl, Stefan Pyka and Hermann Seuschek, “Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography,” context of the SMEPP project (Secure Middleware for Embedded Peer-to-Peer Systems, FP6 IST-5-033563). [18] Axel Sikora, “Implementing DES/3DES with Atmel FPSLIC,” ATMEL Corporation, Security Application, University of Cooperative Education Loerrach, Germany, 2002. www.atmel.com [19] D. S. Abdul Elminaam, H. M. Abdul Kader, M. M. Hadhoud, Performance Evaluation of Symmetric Encryption Algorithms, Communications of the IBIMA Volume 8, 2009 ISSN: 1943-7765. en_US
dc.identifier.issn 2078-0958 (Print)
dc.identifier.issn 2078-0966 (Online)
dc.identifier.uri https://t.ly/6xLnB
dc.description MSA Google Scholar en_US
dc.description.abstract It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems, which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, and ATM security system in Banks. All modern security protocols use symmetrickey and public-key algorithms. This contribution presents a ciphering module that surveys several important cryptographic concepts and their relevance to embedded system applications. This study presents a module that includes three different symmetric ciphering algorithms: DES, DES-EC and AES based on microcontroller. Depending on the application and the data type, each user can select the suitable algorithm from the presented module. This study provides a comparison between the regular DES and the presented new DES. A comparison has been conducted for those encryption algorithms at different settings such as the key size, block size, speed, security, and the execution time. en_US
dc.description.uri https://www.scimagojr.com/journalsearch.php?q=21100228745&tip=sid&clean=0
dc.language.iso en en_US
dc.publisher Proceedings of the World Congress on Engineering en_US
dc.relation.ispartofseries Proceedings of the World Congress on Engineering;2012 Vol II
dc.subject Elliptic Curves en_US
dc.subject Ciphering System Module en_US
dc.subject Microcontroller en_US
dc.title Multi-symmetric Ciphering System Module Based on Microcontroller en_US
dc.type Article en_US
dc.Affiliation October University for modern sciences and Arts (MSA)


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search MSAR


Advanced Search

Browse

My Account