85 Slices
Medium 9781601323279

Relationship Between Number of Stages in ROPUF and CRP Generation on FPGA

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. Security and Management | SAM'14 |

167

Relationship Between Number of Stages in ROPUF and CRP Generation on FPGA

*Muslim Mustapa, Mohammed Niamat

Electrical Engineering and Computer Science, University of Toledo muslim.mustapa@rockets.utoledo.edu, mohammed.niamat@utoledo.edu

Abstract—Physical Unclonable Function (PUF) is commonly used to prevent hackers from stealing information from semiconductor chips. The PUFs utilize the process variations on the chip to create an irreversible function that generates unique response bits for each challenge. A good response bit can be generated by comparing two Ring Oscillators (RO) frequencies, which have a significant amount of difference. An insignificant amount of frequency difference can cause bit flip in the response bit generated. A higher threshold for the frequency difference is preferred to dismiss the bit flip occurrence. As the frequency difference threshold (FDT) increased, the numbers of challenge and response pairs (CRP) were reduced. In this paper we proposed new parameter (diverseness) to measure the ROs frequencies range. High diverseness can compensate the higher

See All Chapters
Medium 9781601323279

A Distributable Hybrid Intrusion Detection System for Securing Wireless Networks

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

450

Int'l Conf. Security and Management | SAM'14 |

A Distributable Hybrid Intrusion Detection System for

Securing Wireless Networks

1

David Tahmoush1

University of Maryland, University College, Maryland, USA

Abstract - We developed a hybrid design to a NIDS that enables the seamless insertion of a machine learning component into a signature NIDS system that significantly improves throughput as well as captures additional networking traffic that is similar to known attack traffic. The throughput improvement by incorporating a normalcy classifier is significant, estimated to be the inverse of the false alarm rate which can easily net a factor of 1000. However, this can be diminished by updates that can trigger a retraining of the normalcy classifier. The addition of a normalcy classifier front-end also makes the system more highly scalable and distributable than the signature-based NIDS.

The new hybrid design also allows distributed updates and retraining of the normalcy classifier to stay up-to-date with current threats, and makes a number of important performance and quality guarantees. The distributable hybrid implementation is very useful for securing wireless networks with multiple access points.

See All Chapters
Medium 9781601323279

Towards Designing a Greener Advanced Encryption Standard (AES)

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

158

Int'l Conf. Security and Management | SAM'14 |

Towards Designing a Greener Advanced Encryption

Standard (AES)

S. Raghu Talluri

Swapnoneel Roy

School of Computing

University of North Florida

Jacksonville, Florida 32224

Email: n00926109@ospreys.unf.edu

School of Computing

University of North Florida

Jacksonville, Florida 32224

Email: s.roy@unf.edu

Abstract—In this work we study the energy consumption by Advanced Encryption Standard (AES), a symmetric key encryption protocol from the algorithmic perspective. Our work is motivated by the frequent use of AES as a specification for the encryption of electronic data established by the U.S. National

Institute of Standards and Technology (NIST) in 2001.

We use a generic energy complexity model designed by Roy et. al. to analyze the energy consumed by AES. We then show how to reduce the energy consumption by AES by performing the processing of the blocks of AES encryption (of size 16 bytes) in parallel.

I.

I NTRODUCTION

Motivation to consider energy efficiency in delivering information technology solutions comes from: 1. Data centers with strong focus on energy management for server class systems. 2.

See All Chapters
Medium 9781601323279

Session - Cryptographic Technologies II

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF
Medium 9781601323279

Session - Computer and Hardware Security

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

See All Slices