![]() ![]() In our views, randomly generated component units eliminate the feared concerns regarding perpetrators' possible knowledge of the internal structures of the static component units. Precisely, generation of the PC-1, rotation and PC-2 tables is revisited to random dynamic tables created at run time. We then propose a re-engineering view towards a more white-box design. We investigate the design features of the DES key schedule and implement the same. We propose an alternative approach for re-implementing the DES key schedule using, rather, dynamic instead of static tables. In addition, reproducing the DES model with unknown component units is challenging, making it hard to adapt and bring implementation of the DES model closer to novice developers' context. Understanding the DES key schedule is, thus, hard. However, can these three static components of the key schedule be altered? The DES development team never explained most of these component units. The key schedule, in particular, uses three static component units, the PC-1, PC-2 and rotation tables. It comprises a key schedule, encryption and decryption components. The DES is a symmetric cryptosystem which encrypts data in blocks of 64 bits using 48 bit keys in 16 rounds. Keywords: Cryptography, symmetric key encryption, block cipher, delay and performance, quantum computing. The results showed that the proposed system reduces the delay by 97% relative to the utilized algorithms' upper-bound delay. The inputs are processed, and ciphertext is produced based on the identified requirements and the suitable cryptography algorithm. The requirements are then identified and encoded according to four options: high, moderate, low, and no security requirements. The requirement identifier examines the header of the data, determines the underlying application and its type. The proposed system consists of the requirements identifier and the implementer, implemented on the application and transportation layer. To solve this problem, an Adaptive Multi-Application Cryptography System is proposed in this paper. ![]() Yet, with the distribution of the low-energy and low-storage devices, in the Internet-of-Things (IoT), the cryptography protocols cannot be implemented because of the power constraints or because the implementation is beyond the time constraints that hindered their usability of these protocols in real-time critical applications. Cryptography is the core method utilized to protect the communications between different applications, terminals, and agents distributed worldwide and connected via the internet.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |