Massey Documents by Type

Permanent URI for this communityhttps://mro.massey.ac.nz/handle/10179/294

Browse

Search Results

Now showing 1 - 3 of 3
  • Item
    Study and design of security system for AudioGraph multimedia teaching system : a thesis presented in partial fulfillment of the requirements for the degree of Master of Science in Computer Science at Massey University, Palmerston North, New Zealand
    (Massey University, 2002) Zhang, Shaohuai
    The AudioGraph is a project developed in the Institute of Information Sciences and Technology of Massey University as copyrighted software tools. The AudioGraph courseware files produced by the AudioGraph Recorder may be copyrighted. In order to protect them from being played back or copied by unauthorized parties, a security system to protect the AudioGraph courseware files is required. This thesis presents the study, design and implementation of the AudioGraph security system. The security system proposed in this thesis consists of three parts: Copy Protection Record inside the AudioGraph courseware files; a Key Insertion Tool to detect, extract, insert and update the Copy Protection Record in AudioGraph courseware files; and a scheme of usage control embedded into the AudioGraph Plug-in. The issues covered in this thesis include all relevant aspects. In order to select good encryption algorithms for the AudioGraph security system, this thesis introduces the concept of cryptography and describes some of the most important conventional and public-key encryption algorithms. It also investigates and compares various aspects of some of the conventional cryptography algorithms and chooses very strong, simple and suitable encryption algorithms to be used in the AudioGraph security system. A scheme to protect AudioGraph courseware files is described in this thesis, this scheme meets the requirements of the AudioGraph security system, and it is strong enough to withstand brute-force attack and all known cryptanalysis. The implementation of the AudioGraph security system has also been described in this thesis. The result from system testing demonstrates that this AudioGraph security system works well and had achieved its goal to protect the AudioGraph courseware material.
  • Item
    Novel digital VLSI implementation of data encryption algorithm using nano-metric CMOS technology : a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Engineering at Massey University, Auckland, New Zealand
    (Massey University, 2013) Ahmad, Nabihah Nornabihah
    Implementations of the Advanced Encryption Standard (AES) have rapidly grown in various applications including telecommunications, finance and networks that require a low power consumption and low cost design. Presented in this thesis is a new 8-bit stream cipher architecture core for an application specific integrated circuit AES crypto-processor. The chip area and power are optimised along with high throughput by employing circuit-level techniques, resource sharing and low supply voltage. The proposed design includes a novel S-box/ InvS-box, MixColumn/ InvMixColumn and ShiftRow/ InvShiftRow with a novel low power Exclusive OR (XOR) gate applied to all sub systems to minimise the power consumption. It is implemented in a 130nm CMOS process and supports both encryption and decryption in Electronic Codebook Mode (EBC) using 128-bit keys with a throughput of 0.05Gbit/s (at 100MHz clock). This design utilises 3152 gate equivalents, including an on-the-fly key scheduling unit along with 4.23μW/MHz power consumption. The area of the chip is 640μm×325μm (0.208 square mm), excluding the bonding pads. Compared to other 8-bit implementations, the proposed design achieves a smaller chip size along with higher throughput and lower power dissipation. This thesis also describes a new fault detection scheme for S-box/ InvS-box that is parity prediction based to protect the key from fault attacks.
  • Item
    Encryption key management in wireless ad hoc networks : a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science at Massey University, Auckland, New Zealand
    (Massey University, 2010) Nisbet, Alastair Jon
    Communication is an essential part of everyday life, both as a social interaction and as a means of collaboration to achieve goals. Networking technologies including the Internet have provided the ability to communicate over distances quickly and effectively, yet the constraints of having to be at a computer connected to a network access point restricts the use of such devices. Wireless technology has effectively released the users to roam more freely whilst achieving communication and collaboration, and with worldwide programs designed to increase laptop usage amongst children in developing countries to almost 100%, an explosive growth in wireless networking is expected. However, wireless networks are seen as relatively easy targets for determined attackers. Security of the network is provided by encrypting the data when exchanging messages and encryption key management is therefore vital to ensure privacy of messages and robustness against disruption. This research describes the development and testing through simulation of a new encryption key management protocol called SKYE (Secure Key deploYment & Exchange) that provides reasonably secure and robust encryption key management for a mobile ad hoc network. Threshold cryptography is used to provide a robust Certificate Authority providing certificate services to the network members using Public Key Infrastructure. The protocol is designed to be used in an environment where communications must be deployed quickly without any prior planning or prior knowledge of the size or numbers of the potential members. Such uses may be many and varied and may include military, education or disaster recovery where victims can use the protocol to quickly form ad hoc networks where other communication infrastructure has failed. Many previous protocols were examined and several key features of these schemes were incorporated into this protocol along with other unique features. These included the extensive tunability of the protocol allowing such features as increasing the number of servers that must collaborate to provide services and the trust level that must exist along a certificate chain before a request for a certificate will be accepted by a server. The locations of the servers were carefully selected so that as these parameters were altered to increase security, performance remained high. For example, when two servers were required for certificate issuance, a certificate request would succeed 92% of the time. By doubling the servers required and therefore considerably increasing resilience against attack of the certificate authority, this figure dropped only moderately to 78%. The placement of the servers proved to be a critical parameter and extensive experiments were run to identify the best placements for servers with the various parameters chosen. Simulations show that the protocol performs effectively in a developing and constantly changing network where nodes may join and leave the network frequently and where many of the members may be mobile. The many tunable parameters of the protocol ensure that it is useful in a variety of applications and has unique features making it effective and efficient in a highly dynamic network environment.