Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Permanent URI for this collectionhttps://hdl.handle.net/11147/7148
Browse
6 results
Search Results
Conference Object Citation - WoS: 1Citation - Scopus: 1Robust and Energy-Efficient Hardware Architectures for Dizy Stream Cipher(IEEE, 2024) Schmid, Martin; Arul, Tolga; Kavun, Elif Bilge; Regazzoni, Francesco; Kara, OrhunIn the era of ubiquitous computing, efficient and secure implementations of cryptographic hardware are crucial. This paper extends the hardware implementations of a Small Internal State Stream (SISS) cipher, namely DIZY. Previous work shows that DIZY's hardware performance, in terms of area cost and power consumption, is among the best when compared to notable stream ciphers, especially for frame-based encryptions requiring frequent initialization. In this study, we initially optimize the existing hardware implementation and then evaluate the energy efficiency of DIZY. We implement different unrolled versions of DIZY and analyze their energy consumption. Furthermore, we address physical security by integrating masking techniques into the DIZY S-box to protect the implementation against side-channel attacks. We thoroughly investigate the associated overhead and apply optimizations to reduce it, ensuring robust security without compromising efficiency. Our results present a secure, energy-efficient, and lightweight cryptographic hardware design for the stream cipher DIZY, making it suitable for various applications, including Internet of Things (IoT) and embedded systems.Conference Object Citation - Scopus: 1Privacy-Preserving Targeted Advertising Scheme for Iptv Using the Cloud(SciTePress, 2012) Khayati, Leyli Javid; Savaş, Erkay; Ustaoğlu, Berkant; Örencik, CengizIn this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud server. To provide high quality directed advertising service, the advertiser can utilize not only demographic information of subscribers, but also their watching habits. The latter includes watching history, preferences for IPTV content and watching rate, which are published on the cloud server periodically (e.g. weekly) along with anonymized demographics. Since the published data may leak sensitive information about subscribers, it is safeguarded using cryptographic techniques in addition to the anonymization of demographics. The techniques used by the advertiser, which can be manifested in its queries to the cloud, are considered (trade) secrets and therefore are protected as well. The cloud is oblivious to the published data, the queries of the advertiser as well as its own responses to these queries. Only a legitimate advertiser, endorsed with a so-called trapdoor by the IPTV, can query the cloud and utilize the query results. The performance of the proposed scheme is evaluated with experiments, which show that the scheme is suitable for practical usage.Conference Object Citation - WoS: 4Reusing Static Keys in Key Agreement Protocols(Springer Verlag, 2009) Chatterjee, Sanjit; Menezes, Alfred; Ustaoğlu, BerkantContrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we give examples of key establishment protocols that are individually secure, but which are insecure when static key pairs are reused in two of the protocols. We also propose an enhancement of the extended Canetti-Krawczyk security model and definition for the situation where static public keys are reused in two or more key agreement protocols. © 2009 Springer-Verlag.Article Citation - WoS: 4Citation - Scopus: 9End-To Security Implementation for Mobile Devices Using Tls Protocol(Springer Verlag, 2006) Kayayurt, Barış; Tuğlular, TuğkanEnd-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol. By implementing TLS protocol in the mobile world, the advantage of the proven security model of this protocol can be utilized. The main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object oriented architecture of proposed end-to-end security protocol implementation makes the replacement of this library with another cryptography package easier. The implementation has been experimented with different cases, which represent use of different cryptographic algorithms.Conference Object Citation - WoS: 2Citation - Scopus: 4Computational Cost Analysis of Elliptic Curve Arithmetic(Institute of Electrical and Electronics Engineers Inc., 2006) Atay, Serap; Koltuksuz, Ahmet; Hışıl, Hüseyin; Eren, ŞabanElliptic curves are proposed for the asymmetrical cryptography by Neal Koblitz and Victor Miller in 1986 separately. Elliptic curve cryptography (ECC) is utilized by hardware embedded solutions on mobile equipments and smart cards after 2000. Currently, software implementation of ECC faces the computational speed problem. One of the proposed solutions is to do the arithmetic operations on different Euclidean coordinate systems. This paper concentrates on the research of this technique and delineates the performance results of the implementation of the aforementioned technique on the different cryptographic libraries such as CRYMPIX, GMP and MIRACL.Conference Object Citation - WoS: 1Citation - Scopus: 1Satellite Networks for Key Management(Institute of Electrical and Electronics Engineers Inc., 2007) Koltuksuz, AhmetThe cryptographic key management center is the place where all the cryptographical protocols and related keys are in action. Traditionally the key management centers operate on the ground. However; with the satellites, it is possible to conceive a space based key management center. This paper underlines the pros and cons of having a satellite networks key management center.
