Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

SEARCH GUIDE  Download Search Tip PDF File

  • chapterNo Access

    Chapter 5: Ransomware

    In this modern era, malware has emerged as a malicious cyber threat to critical information and communication infrastructure. Ransomware is a type of malware which holds the victim’s computer hostage by encrypting the data available on it, which makes the data unusable and inaccessible to its legitimate user. The attacker demands that the user pay before the decryption key is released to reverse the attack. This chapter explains about ransomware and its classification, how it impacts different platforms, the severity of ransomware, the methodology used by ransomware to penetrate target machines, the attack vectors used, the latest ransomware attacks, the most common targets of ransomware attacks, how to prevent ransomware attacks, and ways to recover.

  • chapterNo Access

    A RECONFIGURABLE ARCHITECTURE FOR ACCELERATING DES, 3DES AND AES

    A reconfigurable cipher chip has higher security and flexibility than a conventional one. Therefore, it will be an important part of the future security mechanisms. For designing such kind of chips, the challenge is to improve the throughput rate. In this paper, the reconfiguration of DES, 3DES and AES is analyzed firstly. Then, it proposes a new reconfigurable architecture based on pipelining and paralleling which can implement the three algorithms with a high-speed. The results show that the operating frequency is 100MHz and the throughput rate is 7Gbps for DES, 2.3Gbps for 3DES and 1.4Gbps for AES. Compared with the similar existing implementations, our design can achieve a higher performance.

  • chapterNo Access

    Encrypted Electron Beam Lithography Nano-Signatures for Authentication

    In this work, engineered nanostructures (ENS) have been fabricated on the packed integrated circuits. Coding lookup tables were developed to assign different digits in numerical matrices to different fabricated nano-signatures. The numerical matrices are encrypted according to advanced encryption standard (AES). The encrypted numerical matrix is ink printed on the components, and the nanosignatures are fabricated on the packaged of the chips via electron beam lithography (EBL). This process is to be done in the manufacturer side of the supply chain. The numerical matrix and the nanosignature accompany the product in its long journey in the global supply chain. The global supply chain is proved to be susceptible to counterfeiters. For keeping counterfeiters hands out of the process, the cipher key and the coding lookup tables are provided to the consumer using a secure direct line between the authentic manufacturer and the consumer. In the consumer side, the printed numerical matrix is decrypted. Having the decrypted numerical matrix makes it possible to extract the nanosignature from the laser speckle pattern shined on the packaged product. In this work, an algorithm is developed to extract the nano-signature by having the decrypted matrix and reflected laser speckle patterns as inputs. Confirming the existence of the nano-signature confirms the authenticity of the component. Imitating the nano-signatures by the counterfeiters is not possible because there is no way for them to observe the shape of these signatures without having access to the cipher key.

  • chapterNo Access

    A COMPARATIVE STUDY OF PERFORMANCE BASED CRYPTO ANALYSIS FEATURES FOR STANDARD DATA ENCRYPTION ALGORITHMS WITH (MODDES)

    While designing an encryption algorithm, apart from security, one of the most important parameter that are required to be considered is it's performance and cost analysis. Here we have tried to highlight the performance of some well known data encryption algorithms like DES, 3DES, AES ( Rijndael ) and compare them with the MODDES. Based on the experiment, it can be said that the MODDES algorithm is one of the best performing partially symmetric key algorithm among the algorithms chosen for implementation, particularly for the text message with limited size.