Relating Boolean Gate Truth Tables to One-Way Functions

Relating Boolean Gate Truth Tables to One-Way Functions

Date: March 3, 2008
Creator: Gomathisankaran, Mahadevan & Tyagi, Akhilesh
Description: In this paper, the authors present a schema to build one way functions from a family of Boolean gates. Moreover, the authors relate characteristics of these Boolean gate truth tables to properties of the derived one-way functions.
Contributing Partner: UNT College of Engineering
Secret Key Agreement without Public-Key Cryptography

Secret Key Agreement without Public-Key Cryptography

Access: Use of this item is restricted to the UNT Community.
Date: August 2003
Creator: Surapaneni, Smitha
Description: Secure communication is the primary challenge in today's information network. In this project an efficient secret key agreement protocol is described and analyzed along with the other existing protocols. We focus primarily on Leighton and Micali's secret-key agreement without the use of public-key encryption techniques. The Leighton-Micali protocol is extremely efficient when implemented in software and has significant advantages over existing systems like Kerberos. In this method the secret keys are agreed upon using a trusted third party known as the trusted agent. The trusted agent generates the keys and writes them to a public directory before it goes offline. The communicating entities can retrieve the keys either from the online trusted agent or from the public directory service and agree upon a symmetric-key without any public-key procedures. The principal advantage of this method is that the user verifies the authenticity of the trusted agent before using the keys generated by it. The Leighton-Micali scheme is not vulnerable to the present day attacks like fabrication, modification or denial of service etc. The Leighton-Micali protocol can be employed in real-time systems like smart cards. In addition to the security properties and the simplicity of the protocol, our experiments show that in ...
Contributing Partner: UNT Libraries
Secure execution environments through reconfigurable lightweight cryptographic components

Secure execution environments through reconfigurable lightweight cryptographic components

Date: 2006
Creator: Gomathisankaran, Mahadevan
Description: This doctoral dissertation discusses secure execution environments through reconfigurable lightweight cryptographic components. The author considers the four most important dimensions of software protection.
Contributing Partner: UNT College of Engineering
Tantra: A fast PRNG algorithm and its implementation

Tantra: A fast PRNG algorithm and its implementation

Date: June 2009
Creator: Gomathisankaran, Mahadevan & Lee, Ruby Bei-Loh
Description: This paper discusses Tantra. Tantra is a novel Pseudorandom number generator (PRNG) design that provides a long sequence high quality pseudorandom numbers at very high rate both in software and hardware implementations.
Contributing Partner: UNT College of Engineering
Implementation of Scalable Secure Multicasting

Implementation of Scalable Secure Multicasting

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Vellanki, Ramakrishnaprasad
Description: A large number of applications like multi-player games, video conferencing, chat groups and network management are presently based on multicast communication. As the group communication model is being deployed for mainstream use, it is critical to provide security mechanisms that facilitate confidentiality, authenticity and integrity in group communications. Providing security in multicast communication requires addressing the problem of scalability in group key distribution. Scalability is a concern in group communication due to group membership dynamics. Joining and leaving of members requires the distribution of a new session key to all the existing members of the group. The two approaches to key management namely centralized and distributed approaches are reviewed. A hybrid solution is then provided, which represents a improved scalable and robust approach for a secure multicast framework. This framework then is implemented in an example application of a multicast news service.
Contributing Partner: UNT Libraries