A novel secure multiple QoS guaranteed multicast routing protocol for Ad hoc networks NSQMRAN is presented, which uses NTRUSign as cryptographic mechanism to sign the route massages. NSQMRAN enhances the security with source authentication mechanism and provides such security services as reality, integrity and non-repudiation for the QoS multicast route messages in Ad hoc networks to guard against the attacks caused by malicious nodes. And the main simulating on results based on NS2 shows that compared with other protocols which use RSA as public key cryptographic algorithm, the performance of NSQMRAN protocol based on NTRUSign is better and it causes less delay of end to end.
In order to design digital signal processor with own property right, one kind of pipeline structure of floating point digital signal processor based on VelociTI architecture is studied and a new processing method for pipeline exception is proposed. Abnormal things affecting pipeline are classified reasonably. Pipeline registers’ clock signals of pipeline registers are controlled for memory blocking, many execute packets, many cycles NOP instructions. Some instructions should be disabled when interruption occurs, this work is done by controlling execute condition of these instructions. The correctness can be confirmed by simulation results.
The problem region of software code walkthrough is analyzed, and the basic functions of software walkthrough assistant tool are offered. By applying model driven architecture method, according to the features of the tool, this paper builds the platform independent model, platform specific model and the code model step by step. Initial transition principles among different models are studied. The non-automatic transitions among models of the tool are reached.
Block cipher cryptosystems embedded in cryptographic devices are sensitive to a series of cryptanalysis such as power analysis. The Walsh spectrum is an important basis for studying the Boolean functions in block cipher. This paper proposes a new method based on Walsh spectrum to reveal the key embedded in cryptographic. Furthermore, conclusion are drawn and proved that the vulnerability against power analysis caused by the highly nonlinear S-boxes. Experimental results indicate that the new method speeds up the revelation of key and yields higher precision.
This paper presents a composite spatial-temporal approach to image encryption. In the temporal domain, chaotic series acts as a key for the AES encryption. It generates and administers its key without compromising any of its nice features. In the spatial domain, the paper presents a new way of deriving a space transform matrix by chaotic series. The chaos series is generated by the logistic equation, whose parameters are modulated. Therefore, short cycles are avoided in the solution sequence of the chaotic system. Experimental results confirm the effectiveness of the proposed method. Also, there is no damage to the decrypted image.
This paper introduces HSV color space and an algorithm of automatic recognition character color. By using background subtraction technique and color analysis methods, the positions of characters are found, and characters are segmented with projection algorithm. BP neural network is applied in characters recognition to identify the number 0 to 9. Experimental results show that the proposed scheme is feasible and has great robustness.