de
en
Schliessen
Detailsuche
Bibliotheken
Projekt
Impressum
Datenschutz
zum Inhalt
Detailsuche
Schnellsuche:
OK
Ergebnisliste
Titel
Titel
Inhalt
Inhalt
Seite
Seite
Im Dokument suchen
Fay, Robin: Modes of operation for Compressed Sensing based encryptionBetriebsarten für Compressed Sensing basierte Verschlüsselung. 2017
Inhalt
1 Introduction
1.1 Motivation
1.2 Outline
1.3 Remarks
2 Related Work
2.1 Security of Compressed Sensing Based Encryption
2.2 Related Encryption Schemes
2.3 Open Problems
3 Fundamentals
3.1 Compressive Sensing
3.1.1 Signal representation
3.1.2 Requirements on the sampling system
3.1.3 Reconstruction
3.2 Symmetric Cryptography
3.2.1 General
3.2.2 Security for one-time key encryption
3.2.3 Modes of operation
3.2.3.1 Security in the many-time key scenario
3.2.3.2 Standardized block cipher modes
3.2.4 Data integrity and authentication-encryption
3.2.4.1 Message unforgeability
3.2.4.2 Authenticated-encryption
4 Compressive Sensing Based Encryption
4.1 General
4.2 Secrecy for One-Time Encryption
4.2.1 Establishing security definitions
4.2.2 Impact of different sensing matrix designs
4.3 Secrecy for Many-Time Encryption
5 Compressive Sensing Encryption Modes
5.1 Introduction
5.2 The General Design
5.2.1 Design goals
5.2.2 Matrix generation
5.2.2.1 Matrix generation algorithm
5.2.2.2 Implementation details
5.2.2.3 Security analysis
5.2.2.4 Performance analysis
5.2.3 Normalized encryption
5.2.4 Decryption
5.3 Compressive Sensing Counter Mode
5.3.1 Design and concept
5.3.2 Security analysis
5.3.3 Properties
5.4 Compressive Sensing with Cipher Block Chaining
5.4.1 Design and concept
5.4.2 Security analysis
5.4.3 Properties
5.5 Compressive Sensing with Cipher Feedback
5.5.1 Design and concept
5.5.2 Security analysis
5.5.3 Properties
5.6 Comparison of the Proposed Modes
5.7 Experimental Results
5.7.1 Proof of concept
5.7.2 Measurement distribution
5.7.3 Error sensibility
6 Compressive Sensing with Authenticated-Encryption
6.1 Introduction
6.2 Generic Constructions
6.2.1 General
6.2.2 CS-encrypt-and-MAC
6.2.3 MAC-then-CS-encrypt
6.2.4 CS-encrypt-then-MAC
6.3 CS Authenticated-Encryption Modes
6.3.1 Design and concept
6.3.2 Implementation and security
6.3.2.1 Implementation details
6.3.2.2 Security analysis
6.3.2.3 Proof of concept
7 Fog Computing Security by Compressive Sensing Modes
7.1 System Design
7.2 Implementation
7.2.1 Software architecture
7.2.2 The service framework
8 Conclusion
8.1 Contributions
8.2 Future Work
Appendix A Alternative Confidentiality Mode Designs
Bibliography