Performance Analysis of Encryption Capabilities of ARM-based Single Board Microcomputers
نویسندگان
چکیده
In the few years since Raspberry Pi was released in 2012, countless microcomputers based on ARM architecture have been introduced.Their small size, high performance relative to their power consumption, and ability run popular Linux operating system make them ideal for a wide range of tasks. Information security is an area particular importance. Different encryption encoding algorithms play important role almost all areas information security. However, these are very computationally intensive, so it investigate which can be used tasks, under trade-offs. The ten different investigated presented application common symmetric public-key decryption, digest creation message authentication protocols, such as RSA, AES, HMAC, MD5, SHA. Reliable requires generation reliable (pseudo)random numbers (Cryptographically Secure Random Numbers, CSRN), SoCs usually hardware implemented number generators. applicability random generat er generators presented; test methoods described , recommendations made.
منابع مشابه
a gender-based pragmatic analysis of the use of english compliment responses by iraqi efl students:a speech act perspective
تعارفات کنش های گفتاری هستند که افراد در زندگی روزمر? خود به منظور برقراری دوستی یا تداوم روابط مسالمت آمیز به کار می برند. ساز و کار تعارف مختص زبان انگلیسی یا هر زبان دیگری نیست و پدیده ای است جهانی و در همه زبانها حضور دارد. تفاوتی که از این نظر در زبانها و فرهنگ ها وجود دارد مربوط به پاسخ به این کنش گفتاری در گفتمان است. این مطالعه به بررسی تنوع پاسخ های انگلیسی و عربی به کنش گفتاری تعارف د...
fabrication of new ion sensitive field effect transistors (isfet) based on modification of junction-fet for analysis of hydronium, potassium and hydrazinium ions
a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...
woman-defined identity: analysis of selected poems of adrienne rich
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
Performance Analysis of Threshold based Image Encryption
Security of wireless transmission becomes considerable issue in present scenario. To overcome the issue, several algorithms were used. Among them cryptography remains as the efficient technique that converts the user provided information into unintelligible format. The cryptographic algorithms plays important role in providing security and confidentiality to the data. In this proposed work, the...
متن کاملesp needs analysis of iranian ma students: a case study of university of isfahan
نیاز سنجی دانشجویان کارشناسی ارشد ایرانی در رابطه با زبان تخصصی: مطالعه ای در دانشگاه اصفهان هدف از این مطالعه بررسی نیازهای یادگیری زبان خارجی دانشجویان کارشناسی ارشد دانشجویان دانشگاه اصفهان در رشته های زیست شناسی، روانشناسی، تربیت بدنی، حسابداری و فلسفه ی غرب میباشد. در مجموع 80 دانشجودر پنج رشته ی متفاوت از دانشگاه اصفهان در این پژوهش شرکت داشتند.علاوه بر این هشتاد دانشجو،25 استاد دروس ت...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Híradástechnika
سال: 2023
ISSN: ['2061-2079', '0018-2028', '2061-2125']
DOI: https://doi.org/10.36244/icj.2023.2.6