Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 229
Filtrar
1.
Interdiscip Sci ; 2024 Aug 19.
Artigo em Inglês | MEDLINE | ID: mdl-39155324

RESUMO

Recent advancements in synthesis and sequencing techniques have made deoxyribonucleic acid (DNA) a promising alternative for next-generation digital storage. As it approaches practical application, ensuring the security of DNA-stored information has become a critical problem. Deniable encryption allows the decryption of different information from the same ciphertext, ensuring that the "plausible" fake information can be provided when users are coerced to reveal the real information. In this paper, we propose a deniable encryption method that uniquely leverages DNA noise channels. Specifically, true and fake messages are encrypted by two similar modulation carriers and subsequently obfuscated by inherent errors. Experiment results demonstrate that our method not only can conceal true information among fake ones indistinguishably, but also allow both the coercive adversary and the legitimate receiver to decrypt the intended information accurately. Further security analysis validates the resistance of our method against various typical attacks. Compared with conventional DNA cryptography methods based on complex biological operations, our method offers superior practicality and reliability, positioning it as an ideal solution for data encryption in future large-scale DNA storage applications.

2.
Heliyon ; 10(15): e35042, 2024 Aug 15.
Artigo em Inglês | MEDLINE | ID: mdl-39170177

RESUMO

In the context of the rapid development of Internet of Things technology, urban cultural communication and information security have become a new focus in the field of landscape design. This paper innovatively discusses the landscape design of urban cultural communication based on Internet of Things regional information security, aiming at building a safe and culturally rich urban landscape environment. Taking the unique regional culture of Zhangjiajie as an example, this study evaluated the cultural communication effect of landscape design under information security guarantee through in-depth case analysis and field investigation, combined with Internet of Things information security technology. The results show that the cluster head node strategy has significant advantages in resisting physical capture attacks, especially when the number of sensor nodes captured is less than 2000, the information loss rate is less than 0.1. This discovery not only improves the level of information security in the Internet of Things environment, but also provides technical support for the effective dissemination of urban culture. In addition, through the detailed analysis and evaluation of landscape, this study further reveals the important role of landscape design in regional cultural inheritance. To sum up, this study not only provides a new perspective for urban landscape design, but also provides practical guidance for the protection and dissemination of urban culture in the era of Internet of Things.

3.
J Colloid Interface Sci ; 678(Pt A): 141-151, 2024 Aug 19.
Artigo em Inglês | MEDLINE | ID: mdl-39182388

RESUMO

Luminescent materials with engineered optical properties play an important role in anti-counterfeiting and information security technology. However, conventional luminescent coding is limited by fluorescence color or intensity, and high-level multi-dimensional luminescent encryption technology remains a critically challenging goal in different scenarios. To improve the encoding capacity, we present an optical multiplexing concept by synchronously manipulating the emission color and decay lifetimes of room-temperature phosphorescence materials at molecular level. Herein, we devise a family of zero-dimensional (0D) hybrid metal halides by combining organic phosphonium cations and metal halide tetrahedral anions as independent luminescent centers, which display blue phosphorescence and green persistent afterglow with the highest quantum yields of 39.9 % and 57.3 %, respectively. Significantly, the luminescence lifetime can be fine-tuned in the range of 0.0968-0.5046 µs and 33.46-125.61 ms as temporary time coding through precisely controlling the heavy atomic effect and inter-molecular interactions. As a consequence, synchronous blue phosphorescence and green afterglow are integrated into one 0D halide platform with adjustable emission lifetime acting as color- and time-resolved dual RTP materials, which realize the multiple applications in high-level anti-counterfeiting and information storage. The color-lifetime-dual-resolved encoding ability greatly broadens the scope of luminescent halide materials for optical multiplexing applications.

4.
Heliyon ; 10(14): e34159, 2024 Jul 30.
Artigo em Inglês | MEDLINE | ID: mdl-39092267

RESUMO

In the era of sharing economy, the tourism market is increasingly characterized by personalized demand, mobile consumption and product segmentation. This paper aims to apply big data mining technology in the field of smart tourism. Firstly, it focuses on image summary selection and collaborative filtering technology based on big data mining. It then demonstrates the integration of blockchain in smart tourism, emphasizing the use of decentralized structures and smart contracts to achieve data security and transparency, and describes the testing process of smart tourism platforms, including data preparation and platform operational efficiency testing. Finally, the research results of this paper are summarized, and the development potential and practical application value of smart tourism are demonstrated. The results show that in the smart tourism big data mining model, the minimum support for the data set is 10 % and 20 %, respectively. Moreover, with the increase of the number of nodes in the same data set, the running time decreases gradually. It can be seen that smart tourism big data mining has strong scalability.

5.
Zhonghua Xue Ye Xue Za Zhi ; 45(4): 330-338, 2024 Apr 14.
Artigo em Chinês | MEDLINE | ID: mdl-38951059

RESUMO

Blood cell morphological examination is a crucial method for the diagnosis of blood diseases, but traditional manual microscopy is characterized by low efficiency and susceptibility to subjective biases. The application of artificial intelligence (AI) technology has improved the efficiency and quality of blood cell examinations and facilitated the standardization of test results. Currently, a variety of AI devices are either in clinical use or under research, with diverse technical requirements and configurations. The Experimental Diagnostic Study Group of the Hematology Branch of the Chinese Medical Association has organized a panel of experts to formulate this consensus. The consensus covers term definitions, scope of application, technical requirements, clinical application, data management, and information security. It emphasizes the importance of specimen preparation, image acquisition, image segmentation algorithms, and cell feature extraction and classification, and sets forth basic requirements for the cell recognition spectrum. Moreover, it provides detailed explanations regarding the fine classification of pathological cells, requirements for cell training and testing, quality control standards, and assistance in issuing diagnostic reports by humans. Additionally, the consensus underscores the significance of data management and information security to ensure the safety of patient information and the accuracy of data.


Assuntos
Inteligência Artificial , Células Sanguíneas , Consenso , Humanos , Células Sanguíneas/citologia , China , Algoritmos
7.
ACS Appl Mater Interfaces ; 16(31): 41099-41106, 2024 Aug 07.
Artigo em Inglês | MEDLINE | ID: mdl-39047193

RESUMO

Optical encryption is receiving much attention with the rapid growth of information technology. Conventional optical encryption usually relies on specific configurations, such as metasurface-based holograms and structure colors, not meeting the requirements of increasing dynamic and programmable encryption. Here, we report a programmable optical encryption approach using WS2/SiO2/Au metal-oxide-semiconductor (MOS) devices, which is based on the electrical-field-controlled exciton-trion transitions in monolayer WS2. The modulation depth of the MOS device reflection amplitude up to 25% related to the excitons ensures the fidelity of information, and the decryption based on the near excitonic resonance assures security. With such devices, we successfully demonstrate their applications in real-time encryption of ASCII codes and visual images. For the latter, it can be implemented at the pixel level. The strategy shows significant potential for low-cost, low-energy-consumption, easily integrated, and high-security programmable optical encryptions.

8.
J Biomed Inform ; 156: 104670, 2024 Aug.
Artigo em Inglês | MEDLINE | ID: mdl-38880235

RESUMO

BACKGROUND: Art. 50 of the proposal for a Regulation on the European Health Data Space (EHDS) states that "health data access bodies shall provide access to electronic health data only through a secure processing environment, with technical and organizational measures and security and interoperability requirements". OBJECTIVE: To identify specific security measures that nodes participating in health data spaces shall implement based on the results of the IMPaCT-Data project, whose goal is to facilitate the exchange of electronic health records (EHR) between public entities based in Spain and the secondary use of this information for precision medicine research in compliance with the General Data Protection Regulation (GDPR). DATA AND METHODS: This article presents an analysis of 24 out of a list of 72 security measures identified in the Spanish National Security Scheme (ENS) and adopted by members of the federated data infrastructure developed during the IMPaCT-Data project. RESULTS: The IMPaCT-Data case helps clarify roles and responsibilities of entities willing to participate in the EHDS by reconciling technical system notions with the legal terminology. Most relevant security measures for Data Space Gatekeepers, Enablers and Prosumers are identified and explained. CONCLUSION: The EHDS can only be viable as long as the fiduciary duty of care of public health authorities is preserved; this implies that the secondary use of personal data shall contribute to the public interest and/or to protect the vital interests of the data subjects. This condition can only be met if all nodes participating in a health data space adopt the appropriate organizational and technical security measures necessary to fulfill their role.


Assuntos
Segurança Computacional , Registros Eletrônicos de Saúde , Medicina de Precisão , Medicina de Precisão/métodos , Humanos , Espanha , Europa (Continente) , Confidencialidade
9.
Entropy (Basel) ; 26(6)2024 Jun 09.
Artigo em Inglês | MEDLINE | ID: mdl-38920512

RESUMO

We refine and extend Ziv's model and results regarding perfectly secure encryption of individual sequences. According to this model, the encrypter and the legitimate decrypter share a common secret key that is not shared with the unauthorized eavesdropper. The eavesdropper is aware of the encryption scheme and has some prior knowledge concerning the individual plaintext source sequence. This prior knowledge, combined with the cryptogram, is harnessed by the eavesdropper, who implements a finite-state machine as a mechanism for accepting or rejecting attempted guesses of the plaintext source. The encryption is considered perfectly secure if the cryptogram does not provide any new information to the eavesdropper that may enhance their knowledge concerning the plaintext beyond their prior knowledge. Ziv has shown that the key rate needed for perfect secrecy is essentially lower bounded by the finite-state compressibility of the plaintext sequence, a bound that is clearly asymptotically attained through Lempel-Ziv compression followed by one-time pad encryption. In this work, we consider some more general classes of finite-state eavesdroppers and derive the respective lower bounds on the key rates needed for perfect secrecy. These bounds are tighter and more refined than Ziv's bound, and they are attained using encryption schemes that are based on different universal lossless compression schemes. We also extend our findings to the case where side information is available to the eavesdropper and the legitimate decrypter but may or may not be available to the encrypter.

10.
Nurs Open ; 11(6): e2203, 2024 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-38845463

RESUMO

AIM: Nurses play a crucial role within medical institutions, maintaining direct interaction with patient data. Despite this, there is a scarcity of tools for evaluating nurses' perspectives on patient information security. This study aimed to translate the Information Security Attitude Questionnaire into Chinese and validate its reliability and validity among clinical nurses. DESIGN: A cross-sectional design. METHODS: A total of 728 clinical nurses from three hospitals in China participated in this study. The Information Security Attitude Questionnaire (ISA-Q) was translated into Chinese utilizing the Brislin two-way translation method. The reliability was assessed through internal consistency coefficient and test-retest reliability. The validity was determined through the Delphi expert consultation method and factor analysis. RESULTS: The Chinese version of ISA-Q consists of 30 items. Cronbach's α coefficient of the questionnaire was 0.930, and Cronbach's α coefficient of the six dimensions ranged from 0.781 to 0.938. The split-half reliability and test-retest reliability were 0.797 and 0.848, respectively. The content validity index (S-CVI) was 0.962. Exploratory factor analysis revealed a 6-factor structure supported by eigenvalues, total variance interpretation, and scree plots, accounting for a cumulative variance contribution rate of 69.436%. Confirmatory factor analysis further validated the 6-factor structure, demonstrating an appropriate model fit. CONCLUSION: The robust reliability and validity exhibited by the Chinese version of ISA-Q establish it as a dependable tool for evaluating the information security attitudes of clinical nurses. IMPLICATIONS FOR NURSING PRACTICE: The Chinese iteration of the ISA-Q questionnaire offers a profound insight into the information security attitudes held by clinical nurses. This understanding serves as a foundation for nursing managers to develop targeted intervention strategies aimed at fortifying nurses' information security attitudes, thereby enhancing patient safety.


Assuntos
Atitude do Pessoal de Saúde , Psicometria , Humanos , Inquéritos e Questionários/normas , Reprodutibilidade dos Testes , China , Estudos Transversais , Feminino , Adulto , Masculino , Psicometria/instrumentação , Psicometria/normas , Psicometria/métodos , Enfermeiras e Enfermeiros/psicologia , Enfermeiras e Enfermeiros/estatística & dados numéricos , Segurança Computacional/normas , Tradução , Pessoa de Meia-Idade , Análise Fatorial
11.
Small ; : e2401510, 2024 May 15.
Artigo em Inglês | MEDLINE | ID: mdl-38745545

RESUMO

To simulate life's emergent functions, mining the multiple sensing capabilities of nanosystems, and digitizing networks of transduction signals and molecular interactions, is an ongoing endeavor. Here, multifunctional antimonene-silver nanocomposites (AM-Ag NCs) are synthesized facilely and fused for molecular sensing and digitization applications (including ultra-multi-mode and multi-analyte sensing, parallel and batch logic computing, long-text information protection). By mixing surfactant, AM, Ag+ and Sodium borohydride (NaBH4) at room temperature for 5 min, the resulting NCs are comprised of Ag nanoparticles scattered within AM nanosheets and protected by the surfactant. Interestingly, AM-Ag NCs exhibit ultra-multi-mode sensing ability for multiplex metal ions (Hg2+, Fe3+, or Al3+), which significantly improved selectivity (≈2 times) and sensitivity (≈400 times) when analyzing the combined channels. Moreover, multiple sensing capabilities of AM-Ag NCs enable diverse batch and parallel molecular logic computations (including advanced cascaded logic circuits). Ultra-multi-mode selective patterns of AM-Ag NCs to 18 kinds of metal ions can be converted into a series of binary strings by setting the thresholds, and realized high-density, long-text information protection for the first time. This study provides new ideas and paradigms for the preparation and multi-purpose application of 2D nanocomposites, but also offers new directions for the fusion of molecular sensing and informatization.

12.
PeerJ Comput Sci ; 10: e1958, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38660181

RESUMO

Higher education institutions (HEIs) have a significant presence in cyberspace. Data breaches in academic institutions are becoming prevalent. Online platforms in HEIs are a new learning mode, particularly in the post-COVID era. Recent studies on information security indicate a substantial increase in cybersecurity attacks in HEIs, because of their decentralized e-learning structure and diversity of users. In Western Balkans, there is a notable absence of incident response plans in universities, colleges, and academic institutions. Moreover, e-learning management systems have been implemented without considering security. This study proposes a cybersecurity methodology called a lightweight framework with proactive controls to address these challenges. The framework aims to identify cybersecurity vulnerabilities in learning management systems in Western Balkan countries and suggest proactive controls based on a penetration test approach.

13.
PeerJ Comput Sci ; 10: e1954, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38660176

RESUMO

Background: Digitalization and rapid technological improvement in the present day bring numerous benefits, but they also raise the complexity and diversity of cyber security risks, putting critical information security issues on the agenda. Growing issues and worries about information security endanger not only the security of individuals and organizations but also global social and economic stability. Methods: This study investigates the issues and challenges regarding information security by analyzing all the postings on ISSE (Information Security Stack Exchange), a Q&A website focused on information security. In order to identify the primary topics addressed in postings shared on the ISSE platform, we employed a probabilistic topic modeling method called latent Dirichlet allocation (LDA), which is generative in nature and relies on unsupervised machine learning processes. Results: Through this investigation, a total of 38 topics were identified, demonstrating the present state of information security issues and challenges. Considering these topics, a comprehensive taxonomy of seven categories was devised to address information security issues, taking into account their backgrounds and perspectives. Subsequently, we conducted an examination of the prevalence and complexity of the matters at hand. In addition, we have defined the prevailing technologies utilized in the realm of information security, including tasks, certifications, standards, methods, tools, threats, and defenses. We have provided a number of implications for different stakeholders, including academics, developers, educators, and practitioners, who are working towards advancing the field of information security.

14.
ACS Appl Mater Interfaces ; 16(8): 10522-10531, 2024 Feb 28.
Artigo em Inglês | MEDLINE | ID: mdl-38353225

RESUMO

A facilely in situ fabricated hydrogen-bonded organic framework (HOF) hydrogel film with perfect photoluminescent performance was designed for visual sensing of tetracycline antibiotics (TCs) and information security. Luminescent HOF (MA-IPA) was combined with sodium alginate (SA) through hydrogen bonding actions and electrostatic interactions, then cross-linked with Ca2+ ions to form HOF hydrogel film (Ca@MA-IPA@SA). The HOF hydrogel film exhibited exceptional mechanical robustness along with stable blue fluorescence and ultralong green phosphorescence. After exposure to TCs, Ca2+ was combined with TCs to generate a new green fluorescence exciplex (TC-Ca2+) in hydrogel films. Due to fluorescence resonance energy transfer, the fluorescence of MA-IPA was quenched, and the fluorescent color of the HOF hydrogel film was changed from blue to green. This dichromatic fluorescent response is convenient for the visual and rapid detection of TCs. The detection limits of tetracycline (TC), oxytetracycline (OTC), and chlortetracycline (CTC) were 5.1, 7.7, and 32.7 ng mL-1, respectively. Importantly, this hydrogel sensing platform was free of tedious operation and enabled the ultrasensitive and selective detection of TCs within 6 min. It has been successfully applied to TC detection in pork and milk samples. Based on the stable photoluminescence performance of HOF hydrogel films and fluorescent-responsive properties to TCs, two types of anticounterfeiting arrays were fabricated for information encryption and decryption. This work provides a novel approach for on-site detection of TCs and offers valuable insights into information security.


Assuntos
Antibacterianos , Metilgalactosídeos , Tetraciclinas , Ligação de Hidrogênio , Tetraciclina , Hidrogéis
15.
Front Psychol ; 15: 1343077, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38333061

RESUMO

Introduction: Despite the increasing use of domestic social robots by older adults, there remains a significant knowledge gap regarding attitudes, concerns, and potential adoption behavior in this population. This study aims to categorize older adults into distinct technology adoption groups based on their attitudes toward domestic social robots and their behavior in using the existing technology. Methods: An exploratory qualitative research design was used, involving semi-structured interviews with 24 retired Slovenian older adults aged 65 years or older, conducted between 26 June and 14 September 2023. Results: Four distinct groups of older adults were identified: (1) Cautious Optimists, (2) Skeptical Traditionalists, (3) Positive Optimists, and (4) Technophiles based on eight characteristics. Discussion: These groups can be aligned with the categories of the Diffusion of Innovation Theory. Privacy and security concerns, influenced by varying levels of familiarity with the technology, pose barriers to adoption. Perceived utility and ease of use vary considerably between groups, highlighting the importance of taking into account the different older adults. The role of social influence in the adoption process is complex, with some groups being more receptive to external opinions, while others exhibit more autonomous decision-making.

16.
Sensors (Basel) ; 24(3)2024 Jan 28.
Artigo em Inglês | MEDLINE | ID: mdl-38339569

RESUMO

With the advent of 6G Narrowband IoT (NB-IoT) technology, IoT security faces inevitable challenges due to the application requirements of Massive Machine-Type Communications (mMTCs). In response, a 6G base station (gNB) and User Equipment (UE) necessitate increased capacities to handle a larger number of connections while maintaining reasonable performance during operations. To address this developmental trend and overcome associated technological hurdles, this paper proposes a hardware-accelerated and software co-designed mechanism to support streaming data transmissions and secure zero-trust inter-endpoint communications. The proposed implementations aim to offload processing efforts from micro-processors and enhance global system operation performance by hardware and software co-design in endpoint communications. Experimental results demonstrate that the proposed secure mechanism based on the use of non-repeating keys and implemented in FPGA, can save 85.61%, 99.71%, and 95.68% of the micro-processor's processing time in key block generations, non-repeating checks, and data block transfers, respectively.

17.
JMIR Form Res ; 8: e47091, 2024 Jan 12.
Artigo em Inglês | MEDLINE | ID: mdl-38214962

RESUMO

BACKGROUND: Web-based surveys increase access to study participation and improve opportunities to reach diverse populations. However, web-based surveys are vulnerable to data quality threats, including fraudulent entries from automated bots and duplicative submissions. Widely used proprietary tools to identify fraud offer little transparency about the methods used, effectiveness, or representativeness of resulting data sets. Robust, reproducible, and context-specific methods of accurately detecting fraudulent responses are needed to ensure integrity and maximize the value of web-based survey research. OBJECTIVE: This study aims to describe a multilayered fraud detection system implemented in a large web-based survey about COVID-19 attitudes, beliefs, and behaviors; examine the agreement between this fraud detection system and a proprietary fraud detection system; and compare the resulting study samples from each of the 2 fraud detection methods. METHODS: The PhillyCEAL Common Survey is a cross-sectional web-based survey that remotely enrolled residents ages 13 years and older to assess how the COVID-19 pandemic impacted individuals, neighborhoods, and communities in Philadelphia, Pennsylvania. Two fraud detection methods are described and compared: (1) a multilayer fraud detection strategy developed by the research team that combined automated validation of response data and real-time verification of study entries by study personnel and (2) the proprietary fraud detection system used by the Qualtrics (Qualtrics) survey platform. Descriptive statistics were computed for the full sample and for responses classified as valid by 2 different fraud detection methods, and classification tables were created to assess agreement between the methods. The impact of fraud detection methods on the distribution of vaccine confidence by racial or ethnic group was assessed. RESULTS: Of 7950 completed surveys, our multilayer fraud detection system identified 3228 (40.60%) cases as valid, while the Qualtrics fraud detection system identified 4389 (55.21%) cases as valid. The 2 methods showed only "fair" or "minimal" agreement in their classifications (κ=0.25; 95% CI 0.23-0.27). The choice of fraud detection method impacted the distribution of vaccine confidence by racial or ethnic group. CONCLUSIONS: The selection of a fraud detection method can affect the study's sample composition. The findings of this study, while not conclusive, suggest that a multilayered approach to fraud detection that includes conservative use of automated fraud detection and integration of human review of entries tailored to the study's specific context and its participants may be warranted for future survey research.

18.
Small ; 20(3): e2305825, 2024 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-37699756

RESUMO

Information security has become a major global problem in recent years. Thus, people continue to exert much effort in developing new information security technologies based on encryption and storage. In this study, a 2D information security technology based on polyurethane optical devices with inverse photonic glass structure (PU-IPG) is introduced. Based on 1) the swelling and plasticizing effects of various solvents on PU-IPG and 2) the capillary force that can produce geometric deformation on micro/nanostructures when solvents evaporate, a 2D information security system with two modules of decryption (structural color information display) and anticounterfeiting (structural color transformation) is successfully constructed. The spraying method adopted can be simple and fast and can provide a large area to build photonic glass templates, which greatly improves the capacity and category of information in the encryption system. The prepared PU-IPG optical devices can produce large-area multicolor output capability of information. These devices also have excellent mechanical properties, strong cycle stability, environmental friendliness, and low price. Therefore, the preparation strategy has great reference value and application prospects in the field of information security.

19.
Adv Mater ; 36(13): e2310524, 2024 Mar.
Artigo em Inglês | MEDLINE | ID: mdl-38150659

RESUMO

Smart control of ionic interaction dynamics offers new possibilities for tuning and editing luminescence properties of lanthanide-based materials. However, it remains a daunting challenge to achieve the dynamic control of cross relaxation mediated photon upconversion, and in particular the involved intrinsic photophysics is still unclear. Herein, this work reports a conceptual model to realize the color-switchable upconversion of Tm3+ through spatiotemporal control of cross relaxation in the design of NaYF4:Gd@NaYbF4:Tm@NaYF4 sandwich nanostructure. It shows that cross relaxation plays a key role in modulating upconversion dynamics and tuning emission colors of Tm3+. Interestingly, it is found that there is a short temporal delay for the occurrence of cross relaxation in contrast to the spontaneous emission as a result of the slight energy mismatch between relevant energy levels. This further enables a fine emission color tuning upon non-steady state excitation. Moreover, a characteristic quenching time is proposed to describe the temporal evolution of cross relaxation quantitatively. These findings present a deep insight into the physics of ionic interactions in heavy doping systems, and also show great promise in frontier applications including information security, anti-counterfeiting and nanophotonics.

20.
MethodsX ; 11: 102491, 2023 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-38076709

RESUMO

The phenomenal growth of resource constrained devices in IoT set ups has motivated the researchers to develop solutions for securing information flow. In this paper, we present a compact and efficient field programmable gate array (FPGA) implementation of AES with 32-bit data-path named, AES-32GF. The implementation is carried out on different Xilinx FPGAs. In FPGAs, utilization of slices and look up tables (LUTs) reflect on the compactness of the design. Numerical results show that lesser resources are required with smaller data path in comparison with the original standard. With the help of data path compression and Galois field implementation of the s-box resource consumption is minimized. S-box is the most resource consuming component in the AES structure. In our implementation, Artix-7 series FPGA for the same. It results in significant resource savings. In comparison to unrolled AES-128 architecture, it achieves 87 % resource savings. With 595 slices and 2.004 Gbps throughput, AES-32GF cipher achieves an efficiency of 3.37 Mbps/slice. It outperforms other designs in terms of efficiency. •A compact and efficient FPGA implementation of AES with 32-bit data-path has been proposed.•The proposed design utilizes data path compression and Galois field implementation of the s-box to minimize resource consumption.•With 595 slices and 2.004 Gbps throughput, AES-32GF cipher achieves an efficiency of 3.37 Mbps/slice.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA