Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

University of South Florida

Theses/Dissertations

Cryptography

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Secure Hardware Constructions For Fault Detection Of Lattice-Based Post-Quantum Cryptosystems, Ausmita Sarker Mar 2022

Secure Hardware Constructions For Fault Detection Of Lattice-Based Post-Quantum Cryptosystems, Ausmita Sarker

USF Tampa Graduate Theses and Dissertations

The advent of quantum computers and the exponential speed-up of quantum computation will render classical cryptosystems insecure, as that can solve current encryptions in minutes, resulting in a catastrophic failure of privacy preservation and data security. Through the standardizing of quantum-resistant public-key cryptography algorithms, the National Institute of Standards and Technology (NIST) is evaluating potential candidates to thwart such quantum attacks. In this dissertation, countermeasures against fault attacks are proposed to secure various lattice-based cryptosystems, one of the most promising post-quantum cryptosystems. Fault detection architectures for crucial building blocks of lattice-based cryptosystems, i.e., number-theoretic transform, ring polynomial multiplication, and ring …


Secure Vlsi Hardware Design Against Intellectual Property (Ip) Theft And Cryptographic Vulnerabilities, Matthew Dean Lewandowski Jul 2021

Secure Vlsi Hardware Design Against Intellectual Property (Ip) Theft And Cryptographic Vulnerabilities, Matthew Dean Lewandowski

USF Tampa Graduate Theses and Dissertations

Over the last two decades or so, VLSI hardware is increasingly subject to sophisticated attacks on both the supply chain and design fronts. There is no explicit trust that the manufacturers/providers are not producing counterfeit designs or that cryptographic algorithms we know to be secure in software are also secure in hardware. The novelty and key contributions of this work are as follows: 1) a continually refined method for Intellectual Property (IP) Protection that provides an approach for verification of IP ownership, 2) demonstrate how to break the PRESENT-80 cryptographic algorithm with significantly limited resources, and 3) provide a multitude …


Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun Jan 2013

Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun

USF Tampa Graduate Theses and Dissertations

Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy

resources and also restricted by the ad-hoc network operational

environment. They pose unique challenges, due to limited power

supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security applications in such resource constrained WSNs with minimum overhead provides significant challenges, and is the …