Data Protection Using Scrambling Technique

  • Conference paper
  • First Online:
Inventive Computation and Information Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 563))

  • 453 Accesses

Abstract

Nowadays, securing information is one of the major concerns. It deals with preventing the data from unauthorized access, modification, cloning, attacking, and tampering. As a result, many cryptography algorithms such as AES, DES, RSA, and blowfish have been developed to overcome all threats and to improve security. But then, fast growth in computers may threaten these cryptography algorithms. This paper proposes two levels of security wherein data passes through two phases: one is encryption, and the second one is through scrambling. At the encryption phase, data is encrypted based on the array of elements that are considered. At the scrambling phase, the data is scrambled based on the proposed scrambling algorithm. This paper considers three performance metrics: time, space, and security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 192.59
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 242.64
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Haidar I, Haidar A, Haraty R (2018) Scrambled prime key encryption, pp 94–99. https://doi.org/10.1145/3281375.3281376

  2. Singh G, Kinger S (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67:33–38. https://doi.org/10.5120/11507-7224

    Article  Google Scholar 

  3. Chakraborty R, Narasimhan S, Bhunia S (2009) Hard-ware Trojan: threats and emerging solutions, pp 166–171. https://doi.org/10.1109/HLDVT.2009.5340158

  4. Chakraborty R, Saha I, Palchaudhuri A, Naik G (2013) Hardware Trojan insertion by direct modification of FPGA configuration bitstream. Design Test IEEE 30:45–54. https://doi.org/10.1109/MDT.2013.2247460

    Article  Google Scholar 

  5. Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware Trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247. https://doi.org/10.1109/JPROC.2014.2334493

  6. ** Y, Kupp N, Makris Y (2009) Experiences in hardware Trojan design and implementation, pp 50–57.https://doi.org/10.1109/HST.2009.5224971

  7. Joe CV, Raj JS (2021) Deniable authentication encryption for privacy protection using blockchain. J Artif Intell Capsule Netw 3(3): 259–271

    Google Scholar 

  8. Shakya S (2021) collaboration of smart city services with appropriate resource management and privacy protection. J Ubiquit Comput Commun Technol (UCCT) 3(01):43–51

    Google Scholar 

  9. Hemachand M, Prabhu E (2020) Secured netlist generation using obfuscation technique. J Crit Rev 7(4):878–881

    Google Scholar 

  10. Gowtham M, Nikhil J, Eswar MS, Ramesh SR (2021)Hardware Trojan de tection using supervised machine learning. In: 2021 6th international conference on communication and electronics systems (ICCES), pp 1451–1456

    Google Scholar 

  11. Tripathi SL, Saxena S, Sinha SK, Patel GS (2022)Digital VLSI design and simulation with Verilog. Wiley Online Library, pp 1

    Google Scholar 

  12. Deepthi S (2021) Hardware Trojan detection using ring oscillator. In: 2021 6th international conference on communication and electronics systems (IC-CES),pp 362–368. https://doi.org/10.1109/ICCES51350.2021.9488935

  13. Wang T-H, Edsall T (1998) Practical FSM analysis for Verilog. In: Proceedings international Verilog HDL conference and VHDL international users forum, pp 52–58. https://doi.org/10.1109/IVC.1998.660680

  14. Krishna AV, Prabhu E (2022) Hardware Trojan detection at behavioral level using inline assertions and verification using UVM. In: Smys S, Balas VE, Palanisamy R (eds) Inventive computation and information technologies. Lecture notes in networks and systems, vol 336. Springer, Singapore

    Google Scholar 

  15. Thomas DE, Moorby PR (2007) The Verilog® hardware description language. Springer US. https://books.google.co.in/books?id=cZIMBwAAQBAJ

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Prabhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Madhuri, P., Prabhu, E. (2023). Data Protection Using Scrambling Technique. In: Smys, S., Kamel, K.A., Palanisamy, R. (eds) Inventive Computation and Information Technologies. Lecture Notes in Networks and Systems, vol 563. Springer, Singapore. https://doi.org/10.1007/978-981-19-7402-1_58

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-7402-1_58

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-7401-4

  • Online ISBN: 978-981-19-7402-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation