Security Framework for Combining Confidentiality and Integrity
dc.contributor.author | Narayanaswamy, Jayagopal | |
dc.contributor.copyright-release | Not Applicable | en_US |
dc.contributor.degree | Master of Computer Science | en_US |
dc.contributor.department | Faculty of Computer Science | en_US |
dc.contributor.ethics-approval | Not Applicable | en_US |
dc.contributor.external-examiner | n/a | en_US |
dc.contributor.graduate-coordinator | Dr. Evangelos Milios | en_US |
dc.contributor.manuscripts | Not Applicable | en_US |
dc.contributor.thesis-reader | Dr. Keith Johnson | en_US |
dc.contributor.thesis-reader | Dr. Liam Keliher | en_US |
dc.contributor.thesis-supervisor | Dr. Srinivas Sampalli | en_US |
dc.date.accessioned | 2015-05-08T11:52:22Z | |
dc.date.available | 2015-05-08T11:52:22Z | |
dc.date.defence | 2015-04-02 | |
dc.date.issued | 2015-05-08 | |
dc.description | Master's Thesis | en_US |
dc.description.abstract | Radio Frequency Identification (RFID) technology represents objects uniquely in order to track their movement in the real world. To avoid an unauthorized entity tracking the object and to offer security, RFID systems require data encryption algorithms. However, they are severely resource-constrained and consequently, there has been an interest in the research community for proposing light-weight security protocols for RFID systems. This thesis proposes two novel algorithms, namely, Standalone Simple Cryptographic Algorithm for RFID Systems (S-SCARS) that offers data security by combining integrity and authentication as part of the encryption process and Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption (HIDE), that generates keys dynamically, along with integrity check parameters. A software implementation of the proposed algorithms, and a hardware implementation using Xilinx have been completed in order to analyze the resource utilization of each algorithm. Furthermore, a security analysis of S-SCARS and HIDE has been evaluated using Cryptool in order to compare the proposed algorithms with standard algorithms such as AES, DES, RC4 and IDEA. | en_US |
dc.identifier.uri | http://hdl.handle.net/10222/56768 | |
dc.language.iso | en | en_US |
dc.subject | Security | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Symmetric Key Encryption | en_US |
dc.subject | Security Framework | en_US |
dc.title | Security Framework for Combining Confidentiality and Integrity | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Narayanaswamy-Jayagopal-MCSc-CS-April-2015.pdf
- Size:
- 1.65 MB
- Format:
- Adobe Portable Document Format
- Description:
- Master's Thesis
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: