The Experts below are selected from a list of 54264 Experts worldwide ranked by ideXlab platform
M P Leong - One of the best experts on this subject based on the ideXlab platform.
-
tradeoffs in parallel and serial implementations of the international Data Encryption algorithm idea
Cryptographic Hardware and Embedded Systems, 2001Co-Authors: O Y H Cheung, K H Tsoi, Philip H W Leong, M P LeongAbstract:A high-performance implementation of the International Data Encryption Algorithm (IDEA) is presented in this paper. The design was implemented in both bit-parallel and bit-serial architectures and a comparison of design tradeoffs using various measures is presented. On an Xilinx Virtex XCV300-6 FPGA, the bit-parallel implementation delivers an Encryption rate of 1166 Mb/sec at a 82 MHz system clock rate, whereas the bit-serial implementation offers a 600 Mb/sec throughput at 150 MHz. Both designs are suitable for real-time applications, such as on-line high-speed networks. The implementation is runtime reconfigurable such that key-scheduling is done by directly modifying the bitstream downloaded to the FPGA, hence enabling an implementation without the logic required for key-scheduling. Both implementations are scalable such that higher throughput is obtained with increased resource requirements. The estimated performances of the bit-parallel and bit-serial implementations on an XCV1000-6 device are 5.25 Gb/sec and 2.40 Gb/sec respectively.
-
a bit serial implementation of the international Data Encryption algorithm idea
Field-Programmable Custom Computing Machines, 2000Co-Authors: M P Leong, O Y H Cheung, K H Tsoi, Philip H W LeongAbstract:A high-performance implementation of the International Data Encryption Algorithm (IDEA) is presented in this paper. Using a novel bit-serial architecture to perform multiplication modulo 2/sup 16/+1, the implementation occupies a minimal amount of hardware. The bit-serial architecture enabled the algorithm to be deeply pipelined to achieve a system clock rate of 125 MHz on a Xilinx Virtex XCV300-6, delivering a throughput of 500 Mb/sec. With a XCV1000-6 device, the estimated performance is 2 Gb/sec, three orders of magnitude faster than a software implementation on a 450 MHz Intel Pentium II. This design is suitable for applications in on-line Encryption for high-speed networks.
Simon J Shepherd - One of the best experts on this subject based on the ideXlab platform.
-
refereed paper a high speed software implementation of the Data Encryption standard
Computers & Security, 1995Co-Authors: Simon J ShepherdAbstract:This paper describes a very fast software implementation of the Federal Data Encryption Standard (DES) for the 80-786 processor family. The complex instruction set of this processor family is exploited to implement the low-level bit manipulation of the DES in an efficient manner. A 386/33 MHz PC is capable of Data rates of over 200 kpbs, including time taken to read from and write to hard disk.
-
refereed paper a high speed software implementation of the Data Encryption standard
Computers & Security, 1995Co-Authors: Simon J ShepherdAbstract:This paper describes a very fast software implementation of the Federal Data Encryption Standard (DES) for the 80-786 processor family. The complex instruction set of this processor family is exploited to implement the low-level bit manipulation of the DES in an efficient manner. A 386/33 MHz PC is capable of Data rates of over 200 kpbs, including time taken to read from and write to hard disk.
Philip H W Leong - One of the best experts on this subject based on the ideXlab platform.
-
tradeoffs in parallel and serial implementations of the international Data Encryption algorithm idea
Cryptographic Hardware and Embedded Systems, 2001Co-Authors: O Y H Cheung, K H Tsoi, Philip H W Leong, M P LeongAbstract:A high-performance implementation of the International Data Encryption Algorithm (IDEA) is presented in this paper. The design was implemented in both bit-parallel and bit-serial architectures and a comparison of design tradeoffs using various measures is presented. On an Xilinx Virtex XCV300-6 FPGA, the bit-parallel implementation delivers an Encryption rate of 1166 Mb/sec at a 82 MHz system clock rate, whereas the bit-serial implementation offers a 600 Mb/sec throughput at 150 MHz. Both designs are suitable for real-time applications, such as on-line high-speed networks. The implementation is runtime reconfigurable such that key-scheduling is done by directly modifying the bitstream downloaded to the FPGA, hence enabling an implementation without the logic required for key-scheduling. Both implementations are scalable such that higher throughput is obtained with increased resource requirements. The estimated performances of the bit-parallel and bit-serial implementations on an XCV1000-6 device are 5.25 Gb/sec and 2.40 Gb/sec respectively.
-
a bit serial implementation of the international Data Encryption algorithm idea
Field-Programmable Custom Computing Machines, 2000Co-Authors: M P Leong, O Y H Cheung, K H Tsoi, Philip H W LeongAbstract:A high-performance implementation of the International Data Encryption Algorithm (IDEA) is presented in this paper. Using a novel bit-serial architecture to perform multiplication modulo 2/sup 16/+1, the implementation occupies a minimal amount of hardware. The bit-serial architecture enabled the algorithm to be deeply pipelined to achieve a system clock rate of 125 MHz on a Xilinx Virtex XCV300-6, delivering a throughput of 500 Mb/sec. With a XCV1000-6 device, the estimated performance is 2 Gb/sec, three orders of magnitude faster than a software implementation on a 450 MHz Intel Pentium II. This design is suitable for applications in on-line Encryption for high-speed networks.
Elaine B Barker - One of the best experts on this subject based on the ideXlab platform.
-
recommendation for the triple Data Encryption algorithm tdea block cipher nist special publication 800 67 revision 2
2012Co-Authors: William C Barker, Elaine B BarkerAbstract:This National Institute of Standards and Technology Special Publication 800-67, Revision 2: Recommendations for the Triple Data Encryption Algorithm (TDEA) Block Cipher specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38 series-compliant mode of operation and in a FIPS 140-2 compliant cryptographic module, TDEA may be used by Federal organizations to protect sensitive unclassified Data.~
-
sp 800 67 rev 1 recommendation for the triple Data Encryption algorithm tdea block cipher
2012Co-Authors: William C Barker, Elaine B BarkerAbstract:This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-series-compliant mode of operation and in a FIPS 140-2-compliant cryptographic module, TDEA may be used by Federal organizations to protect sensitive unclassified Data. Protection of Data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the Data. This Recommendation defines the mathematical steps required to cryptographically protect Data using TDEA and to subsequently process such protected Data. TDEA is made available for use by Federal agencies within the context of a total security program consisting of physical security procedures, good information management practices, and computer system/network access controls.
Riyazuddin Qureshi - One of the best experts on this subject based on the ideXlab platform.
-
Transparent Data Encryption – Solution for Security of Database Contents
2015Co-Authors: Riyazuddin QureshiAbstract:Abstract— The present study deals with Transparent Data Encryption which is a technology used to solve the problems of security of Data. Transparent Data Encryption means encryptingDatabases on hard disk and on any backup media. Present day global business environment presents numerous security threats and compliance challenges. To protect against Data thefts andfrauds we require security solutions that are transparent by design. Transparent Data Encryption provides transparent, standards-based security that protects Data on the network, on disk and on backup media. It is easy and effective protection ofstored Data by transparently encrypting Data. Transparent Data Encryption can be used to provide high levels of security to columns, table and tablespace that is Database files stored onhard drives or floppy disks or CD’s, and other information that requires protection. It is the technology used by Microsoft SQL Server 2008 to encrypt Database contents. The term Encryptionmeans the piece of information encoded in such a way that it can only be decoded read and understood by people for whom the information is intended. The study deals with ways to createMaster Key, creation of certificate protected by the master key, creation of Database master key and protection by the certificate and ways to set the Database to use Encryption in Microsoft SQLServer 2008.
-
Transparent Data Encryption – Security of Database Using Microsoft SQL Server 2008 and Oracle
2015Co-Authors: Riyazuddin QureshiAbstract:AbstractPresent day global business environment presents numerous security threats and compliance challenges. To protect against Data thefts and frauds we require security solutions that aretransparent by design. The present study deals with Transparent Data Encryption which is a technology used to solve the problems of security of Data. Transparent Data Encryption means encryptingDatabases on hard disk and on any backup media. Transparent Data Encryption provides transparent, standards-based security that protects Data on the network, on disk and on backup media.It is easy and effective protection of stored Data by transparently encrypting Data. Transparent Data Encryption can be used to provide high levels of security to columns, table and tablespacethat is Database files stored on hard drives or floppy disks or CD’s, and other information that requires protection. It is the technology used by Microsoft SQL Server 2008, Oracle 10g and 11g to encrypt Database contents. The term Encryption means thepiece of information encoded in such a way that it can only be decoded read and understood by people for whom the information is intended. The study deals with ways to create Master Key, creation of certificate protected by the master key, creation ofDatabase master key and protection by the certificate and ways to set the Database to use Encryption in Microsoft SQL Server 2008,Oracle 10g and 11g.
-
transparent Data Encryption solution for security of Database contents
arXiv: Databases, 2013Co-Authors: Anwar Pasha Deshmukh, Riyazuddin QureshiAbstract:The present study deals with Transparent Data Encryption which is a technology used to solve the problems of security of Data. Transparent Data Encryption means encrypting Databases on hard disk and on any backup media. Present day global business environment presents numerous security threats and compliance challenges. To protect against Data thefts and frauds we require security solutions that are transparent by design.
-
Transparent Data Encryption- Security of Database Using Microsoft SQL Server 2008 and Oracle 1
2012Co-Authors: Anwar Pasha Deshmukh, Riyazuddin QureshiAbstract:Present day global business environment presents numerous security threats and compliance challenges. To protect against Data thefts and frauds we require security solutions that are transparent by design. The present study deals with Transparent Data Encryption which is a technology used to solve the problems of security of Data. Transparent Data Encryption means encrypting Databases on hard disk and on any backup media. Transparent Data Encryption provides transparent, standards-based security that protects Data on the network, on disk and on backup media. It is easy and effective protection of stored Data by transparently encrypting Data. Transparent Data Encryption can be used to provide high levels of security to columns, table and tablespace that is Database files stored on hard drives or floppy disks or CD’s, and other information that requires protection. It is the technology used by Microsoft SQL Server 2008, Oracle 10g and 11g to encrypt Database contents. The term Encryption means the piece of information encoded in such a way that it can only be decoded read and understood by people for whom the information is intended. The study deals with ways to create Master Key, creation of certificate protected by the master key, creation of Database master key and protection by the certificate and ways to set the Database to use Encryption in Microsoft SQL Server 2008, Oracle 10g and 11g
-
transparent Data Encryption solution for security of Database contents
International Journal of Advanced Computer Science and Applications, 2011Co-Authors: Anwar Pasha Deshmukh, Riyazuddin QureshiAbstract:The present study deals with Transparent Data Encryption which is a technology used to solve the problems of security of Data. Transparent Data Encryption means encrypting Databases on hard disk and on any backup media. Present day global business environment presents numerous security threats and compliance challenges. To protect against Data thefts and frauds we require security solutions that are transparent by design. Transparent Data Encryption provides transparent, standards-based security that protects Data on the network, on disk and on backup media. It is easy and effective protection of stored Data by transparently encrypting Data. Transparent Data Encryption can be used to provide high levels of security to columns, table and tablespace that is Database files stored on hard drives or floppy disks or CD's, and other information that requires protection. It is the technology used by Microsoft SQL Server 2008 to encrypt Database contents. The term Encryption means the piece of information encoded in such a way that it can only be decoded read and understood by people for whom the information is intended. The study deals with ways to create Master Key, creation of certificate protected by the master key, creation of Database master key and protection by the certificate and ways to set the Database to use Encryption in Microsoft SQL Server 2008.