Abstract
Nowadays, securing information is one of the major concerns. It deals with preventing the data from unauthorized access, modification, cloning, attacking, and tampering. As a result, many cryptography algorithms such as AES, DES, RSA, and blowfish have been developed to overcome all threats and to improve security. But then, fast growth in computers may threaten these cryptography algorithms. This paper proposes two levels of security wherein data passes through two phases: one is encryption, and the second one is through scrambling. At the encryption phase, data is encrypted based on the array of elements that are considered. At the scrambling phase, the data is scrambled based on the proposed scrambling algorithm. This paper considers three performance metrics: time, space, and security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Haidar I, Haidar A, Haraty R (2018) Scrambled prime key encryption, pp 94–99. https://doi.org/10.1145/3281375.3281376
Singh G, Kinger S (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67:33–38. https://doi.org/10.5120/11507-7224
Chakraborty R, Narasimhan S, Bhunia S (2009) Hard-ware Trojan: threats and emerging solutions, pp 166–171. https://doi.org/10.1109/HLDVT.2009.5340158
Chakraborty R, Saha I, Palchaudhuri A, Naik G (2013) Hardware Trojan insertion by direct modification of FPGA configuration bitstream. Design Test IEEE 30:45–54. https://doi.org/10.1109/MDT.2013.2247460
Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware Trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247. https://doi.org/10.1109/JPROC.2014.2334493
** Y, Kupp N, Makris Y (2009) Experiences in hardware Trojan design and implementation, pp 50–57.https://doi.org/10.1109/HST.2009.5224971
Joe CV, Raj JS (2021) Deniable authentication encryption for privacy protection using blockchain. J Artif Intell Capsule Netw 3(3): 259–271
Shakya S (2021) collaboration of smart city services with appropriate resource management and privacy protection. J Ubiquit Comput Commun Technol (UCCT) 3(01):43–51
Hemachand M, Prabhu E (2020) Secured netlist generation using obfuscation technique. J Crit Rev 7(4):878–881
Gowtham M, Nikhil J, Eswar MS, Ramesh SR (2021)Hardware Trojan de tection using supervised machine learning. In: 2021 6th international conference on communication and electronics systems (ICCES), pp 1451–1456
Tripathi SL, Saxena S, Sinha SK, Patel GS (2022)Digital VLSI design and simulation with Verilog. Wiley Online Library, pp 1
Deepthi S (2021) Hardware Trojan detection using ring oscillator. In: 2021 6th international conference on communication and electronics systems (IC-CES),pp 362–368. https://doi.org/10.1109/ICCES51350.2021.9488935
Wang T-H, Edsall T (1998) Practical FSM analysis for Verilog. In: Proceedings international Verilog HDL conference and VHDL international users forum, pp 52–58. https://doi.org/10.1109/IVC.1998.660680
Krishna AV, Prabhu E (2022) Hardware Trojan detection at behavioral level using inline assertions and verification using UVM. In: Smys S, Balas VE, Palanisamy R (eds) Inventive computation and information technologies. Lecture notes in networks and systems, vol 336. Springer, Singapore
Thomas DE, Moorby PR (2007) The Verilog® hardware description language. Springer US. https://books.google.co.in/books?id=cZIMBwAAQBAJ
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Madhuri, P., Prabhu, E. (2023). Data Protection Using Scrambling Technique. In: Smys, S., Kamel, K.A., Palanisamy, R. (eds) Inventive Computation and Information Technologies. Lecture Notes in Networks and Systems, vol 563. Springer, Singapore. https://doi.org/10.1007/978-981-19-7402-1_58
Download citation
DOI: https://doi.org/10.1007/978-981-19-7402-1_58
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7401-4
Online ISBN: 978-981-19-7402-1
eBook Packages: EngineeringEngineering (R0)