In order to meet the requirements of electronic medical devices, it is necessary to collect physiological image data related to the human body. This highly sensitive personal data is encrypted and transmitted to remote monitoring devices or medical systems for processing and analysis. In scenarios involving the processing of large amounts of encrypted data, lightweight encryption algorithms are currently the most suitable approach, while maintaining the hardware architecture unchanged.
This improves the existing Advanced Encryption Standard (AES) architecture by incorporating the Secure Hash Algorithm 3 (SHA-3) hash function to modify the computation of the round keys. This enhancement increases the complexity of each round key, leading to higher security while reducing the number of rounds. Apart from avoiding the issue of repeated computation of round keys, the overall architecture enhances security while decreasing the time required to encrypt files, thereby improving the overall encryption throughput.
摘要 i
Abstract ii
目次 iii
表目次 v
圖目次 vi
第一章 緒論 1
1.1 簡介 1
1.2 研究動機 5
1.3 設計理念及貢獻 7
1.4 論文架構 10
第二章 背景知識及相關文獻 11
2.1 前言 11
2.2 高級加密標準(Advanced Encryption Standard, AES) 12
2.2.1 AddRoundKey 13
2.2.2 SubBytes 13
2.2.3 ShiftRows 14
2.2.4 MixColumns 15
2.2.5 金鑰擴展(Key Expansion) 16
2.3 SHA-3 (Secure Hash Algorithm 3) [8] 18
2.4 相關文獻 21
第三章 研究方法 23
3.1 設計構想 23
3.2 輕量化AES架構模型 25
3.3 金鑰拓展(Key Expansion) 27
3.4 Modified SubBytes 31
3.5 Modified ShiftRows 34
第四章 安全性分析與效能比較 37
4.1 概述 37
4.2 時間安全分析 39
4.3 雪崩效應安全分析 41
4.4 記憶體使用分析 59
4.5 執行速度與吞吐量 61
第五章 結論 66
參考文獻 67
附錄 72
1. 雪崩效應增加不同Input Key的測試結果 72
2. LRK-AES降低回合數目測試結果 78
[1]Saloni Bansal, V.K Tomar, “Challenges & Security Threats in IoT with Solution Architectures,” in 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), 2022
[2]Bravo Imaging, “Medical Imaging Modality Options and Their Uses,” https://www.bravoimaging.com/medical-imaging-equipment-miami/medical-imaging-modality-options-and-their-uses/ , July 20 2018.
[3]Muhammad Ali Siddiqi, Georg Hahn, Said Hamdioui, “Improving the Security of the IEEE 802.15.6 Standard for Medical BANs,” in IEEE Access, vol. 10, pp. 62953-62975, 2022
[4]Liu, F.; Hernandez-Cabronero, M.; Sanchez, V.; Marcellin, M.W.; Bilgin, A, “The Current Role of Image Compression Standards in Medical Imaging. Information,” Information 8, no. 4: 131. https://doi.org/10.3390/info8040131, 2017.
[5]M. Bedoui, H. Mestiri, B. Bouallegue, B. Hamdi, and M. Machhout,“An improvement of both security and reliability for AES implementations”, J. King Saud Univ. - Comput. Inf. Sci., Jan. 2022
[6]B. Khalil, A. Ahmed, R. D. Mahdi, T. I. Mohamed, and R. A. Jaleel,“A novel secure artificial bee colony with advanced encryption standard technique for biomedical signal processing”, Period. Eng. Nat. Sci., vol. 10, no. 1, pp. 288–294, 2022
[7]C. Tezcan, “Optimization of Advanced Encryption Standard on Graphics Processing Units”, IEEE Access, vol. 9, pp. 67315–67326, 2021.
[8]Morris Dworkin, “SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions”, Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8900, http://dx.doi.org/10.6028/NIST.FIPS.202, 2015.
[9]J. Damen, V. Rijmen, “The Block Cipher Rijndael”, available from NIST’s AES homepage, URL: http//www.nist.gov/aes
[10]Vishal A. Thakor, Mohammad Abdur Razzaque, “Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities”, IEEE Access, vol. 9, pp. 28177 – 28193, 2021.
[11]S. Sallam, B. D. Beheshti, “A survey on lightweight cryptographic algorithms”, IEEE Region Conf., pp. 1784-1789, Oct. 2018
[12]W. Easttom, “Substitution-Permutation Networks”, Modern Cryptography, pp. 165-186, 2021.
[13]H. K. Hoomod and A. M. Radi, “New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm”, Journal of Physics: Conference Series, Volume 1003, Issue 1, article id. 012025, 2018.
[14]M. S. Fadhil, A. K. Farhan, M. N. Fadhil and N. M. G. Al-Saidi, “A New Lightweight AES Using a Combination of Chaotic Systems”, Proceedings of 2020 1st Information Technology to Enhance E-Learning and other Application Conference IT-ELA 2020, pp. 82-88, 2020.
[15]F. Hazzaa, A. M. Shabut, N. H. M. Ali and M. Cirstea, “Security Scheme Enhancement for Voice over Wireless Networks”, Journal of Information Security and Applications, vol. 58, pp. 102798 - 102804, 2021.
[16]Chittibabu, Priya, “A Comparative Analysis of DES, AES and RSA Crypt Algorithms For Network Security in Cloud Computing”, JETIR Research Journal 574-582, 2019.
[17]A. O. Mulani and P. B. Mane, “High-Speed Area-Efficient Implementation of AES Algorithm on Reconfigurable Platform”, Computer and Network Security. IntechOpen, Jun. 10, 2020.
[18]Hojin Chio, Seog Chung Seo, “Fast Implementation of SHA-3 in GPU Environment”, IEEE Access, pp. 144574 – 144586, Oct 2021.
[19]Batel Oved, Orian Leitersdorf, “HashPIM: High-Throughput SHA-3via Memristive Digital Processing-in-Memory”, 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2022.
[20]R. S. Salman, A. K. Farhan and A. Shakir, "Lightweight Modifications in the Advanced Encryption Standard (AES) for IoT Applications: A Comparative Survey," 2022 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, pp. 325-330, March 2022.
[21]H. B. Acla and B. D. Gerardo, "Security Analysis of Lightweight Encryption based on Advanced Encryption Standard for Wireless Sensor Networks," 2019 IEEE 6th International Conference on Engineering Technologies and Applied Sciences (ICETAS), Kuala Lumpur, Malaysia, pp. 1-6, 2019.
[22]Y. Sverdlik, "The world's 10 fastest supercomputer - in pictures", Data Center Knowledge, 2019.
[23]W. Stallings, Cryptography and Network Security - Principles and Practice, Upper Saddle River, New Jersey:Pearson Education Limited, pp. 130-155, 2014
[24]Abikoye, O.C., Haruna, A.D., Abubakar, A., Akande, N.O., Asani, E.O., “Modified Advanced Encryption Standard Algorithm for Information Security,” Symmetry 11, no. 12: 1484, https://doi.org/10.3390/sym11121484, 2019
[25]Soukaena Hassan and M. Abd Zaid, “Modification Advanced Encryption Standard for Design Lightweight Algorithms”, Jour. Kufa Math. Comp., vol. 6, pp. 21-27, May 2019.
[26]Y. Zhou, G. -M. Tang, J. -H. Yang, P. -S. Yu and C. Peng, "Logic Design and Simulation of a 128-b AES Encryption Accelerator Based on Rapid Single-Flux-Quantum Circuits," in IEEE Transactions on Applied Superconductivity, vol. 31, no. 6, pp. 1-11, Sept. 2021.
[27]I. F. Alshaikhli, M. A. Alahmad and K. Munthir, "Comparison and Analysis Study of SHA-3 Finalists," 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, pp. 366-371, doi: 10.1109/ACSAT.2012.64, 2012.
[28]DICOM Standards Committee. Digital Imaging and Communications in Medicine (DICOM) PS3.1 2023c - Introduction and Overview (NEMA Standards Publication No. PS3.8-2023), National Electrical Manufacturers Association, https://dicom.nema.org/medical/dicom/current/output/html/part01.html#figure_5-1, 2023.
[29]Kannammal, A., Subha Rani, S., “DICOM Image Authentication and Encryption Based on RSA and AES Algorithms,” In: Ponnambalam, S.G., Parkkinen, J., Ramanathan, K.C. (eds) Trends in Intelligent Robotics, Automation, and Manufacturing. IRAM Communications in Computer and Information Science, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35197-6_39, 2012.
[30]M. Dzwonkowski, M. Papaj and R. Rykaczewski, “A New Quaternion-Based Encryption Method for DICOM Images,” in IEEE Transactions on Image Processing, vol. 24, no. 11, pp. 4614-4622, doi: 10.1109/TIP.2015.2467317, Nov. 2015.