1 |
Otimiza??o de Algoritmos Criptogr?ficos para Redes de Sensores e Atuadores Sem-fio para Po?os do Tipo Plunger LiftSemente, Rodrigo Soares 22 July 2011 (has links)
Made available in DSpace on 2014-12-17T14:55:50Z (GMT). No. of bitstreams: 1
DISSERTACAO RODRIGO SOARES SEMENTE.pdf: 1203856 bytes, checksum: 4eaca6c76cb5befb0c8681343579bc26 (MD5)
Previous issue date: 2011-07-22 / Wireless sensors and actuators Networks specified by IEEE 802.15.4, are
becoming increasingly being applied to instrumentation, as in instrumentation of oil
wells with completion Plunger Lift type. Due to specific characteristics of the
environment being installed, it s find the risk of compromising network security, and
presenting several attack scenarios and the potential damage from them.
It`s found the need for a more detailed security study of these networks, which calls
for use of encryption algorithms, like AES-128 bits and RC6. So then it was implement
the algorithms RC6 and AES-128, in an 8 bits microcontroller, and study its
performance characteristics, critical for embedded applications. From these results it
was developed a Hybrid Algorithm Cryptographic, ACH, which showed intermediate
characteristics between the AES and RC6, more appropriate for use in applications
with limitations of power consumption and memory. Also was present a comparative
study of quality of security among the three algorithms, proving ACH cryptographic
capability. / As redes de sensores e atuadores sem-fio especificadas pelo padr?o IEEE 802.15.4,
est?o cada vez mais sendo aplicadas ? instrumenta??o, como na instrumenta??o de
po?os de petr?leo com completa??o do tipo Plunger Lift. Devido ?s caracter?sticas
espec?ficas do ambiente que est?o sendo instaladas, foram observados riscos de
comprometimento de seguran?a da rede, e estudados v?rios cen?rios de ataques e os
danos potenciais dos mesmos.
Verificou-se assim a necessidade de um estudo mais detalhado de seguran?a dessas
redes, que preconiza o uso de algoritmos de criptografia, como o AES-128 bits e RC6.
Assim foram implementados os algoritmos AES-128 e RC6, em um microcontrolador
de apenas 8 bits, e realizados estudos detalhados de suas caracter?sticas de desempenho,
crucial para aplica??es embarcadas. A partir desses resultados foi criado um Algoritmo
Criptogr?fico H?brido, ACH, que apresentou caracter?sticas intermedi?rias entre o AES
e o RC6, mais apropriadas para uso em aplica??es com limita??es de consumo de
energia e mem?ria. Tamb?m foi realizado um estudo comparativo da qualidade de
seguran?a entre os tr?s algoritmos, provando a capacidade criptogr?fica do ACH.
|
2 |
Propagation Characteristics Of Rc5, Rc6 And Twofish CiphersArikan, Savas 01 January 2004 (has links) (PDF)
In this thesis, two finalists of the AES (Advanced Encryption Standard) contest, RC6 developed by Rivest et al, Twofish proposed by Schneier et al, and preceding algorithm of RC6 cipher, RC5, are studied. The strength of ciphers to cryptanalytic attacks is measured according to different criteria. The studied evaluation criteria are the avalanche criterion and its derivations. After theimplementation of the algorithms and the test procedures, they are compared with each other. Different test criteria, including avalanche criterion, avalanche weight distribution (AWD) for randomness of RC5, RC6 and Twofish algorithms are applied / and the S-boxes of the Twofish algorithm are analyzed according to nonlinearity criterion. The avalanche criteria results of RC6 and Twofish are compared with NIST (National Institute of Standards and Technology) Statistical Test Suite results.
|
Page generated in 0.023 seconds