{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T13:02:26Z","timestamp":1710334946801},"reference-count":28,"publisher":"Wiley","issue":"17","license":[{"start":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T00:00:00Z","timestamp":1474329600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,11,25]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the last few decades, patients demand the data integrity and confidentiality of their Electrocardiography (ECG) signal for remote diagnosis through the network. In this context, a Dynamic Hash key\u2010based stream cipher for a cryptosystem is proposed to transmit the ECG signal to maintain integrity and confidentiality. The novelty of this proposed methodology is based on real\u2010time dynamic non\u2010recursive pseudorandom keystream using dynamic Toeplitz hash value\u2010based RC4 algorithm, unlike the existing static key\u2010based stream ciphers. The Toeplitz hash value (HV) is constructed from the sequence generated using non\u2010singular sequence folding\u2010based nonlinear feedback function expressed in algebraic normal form. The proposed design is realized using Verilog hardware description language (HDL) to construct the non\u2010recursive dynamic key stream sequence and prototyped on existing hardware Field\u2010programmable gate array (FPGA) device Virtex 5 xc5vlx110t\u20102ff1136. The generated dynamic binary key stream sequence is analysed for key size, correlation and further verified by randomness tests using National Institute of Standards and Technology statistical test suites. The laboratory experiment is carried out with the existing two FPGA boards to prototype the proposed hardware cryptosystem for the encryption and decryption of real time ECG signal. The implementation result in the FPGA device accomplishes with the initial latency of 257 clock cycles and improved data throughput of 534Mbps than the existing design. Copyright \u00a9 2016 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.1615","type":"journal-article","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T02:36:44Z","timestamp":1474425404000},"page":"4391-4402","source":"Crossref","is-referenced-by-count":7,"title":["Dynamic Hash key\u2010based stream cipher for secure transmission of real time ECG signal"],"prefix":"10.1002","volume":"9","author":[{"given":"K. K. Soundra","family":"Pandian","sequence":"first","affiliation":[{"name":"Electrical Engineering Indian Institute of Technology Patna  Patna Bihar India"}]},{"given":"Kailash Chandra","family":"Ray","sequence":"additional","affiliation":[{"name":"Electrical Engineering Indian Institute of Technology Patna  Patna Bihar India"}]}],"member":"311","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"KansoA.Health insurance portability accountability act of 1996 (HIPAA) centers for medicare and medicaid services 1996."},{"key":"e_1_2_7_3_1","series-title":"Chapter Recent Developments in Cryptography","volume-title":"Performance Limits in Communication Theory and Practice","author":"Fred P","year":"1988"},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","unstructured":"XuC GeY.The public key encryption to improve the security on wireless sensor networks.IEEE \u2010 Second Int. Conf. on Information and Computing Science Vol. 1 2009;11\u201314.","DOI":"10.1109\/ICIC.2009.10"},{"issue":"3","key":"e_1_2_7_5_1","first-page":"334","article-title":"Symmetric key management for mobile ad hoc networks using novel secure and authenticated key distribution protocol","volume":"88","author":"Jegatheesan A","year":"2012","journal-title":"European Journal of Scientific Research"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19542-6_83"},{"key":"e_1_2_7_7_1","unstructured":"BartkewitzT.Building hash functions from block ciphers their security and implementation properties RuhrUniversity Bochum 2009."},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1318"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090515"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.44"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139172769"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.08.002"},{"key":"e_1_2_7_13_1","doi-asserted-by":"crossref","unstructured":"PalS PandianKKS RayKC.FPGA implementation of stream cipher using toeplitz hash function.IEEE Third Int. Conf. on Advances in Computing Communications and Informatics (ICACCI '14) 2014;1834\u20131838.","DOI":"10.1109\/ICACCI.2014.6968290"},{"key":"e_1_2_7_14_1","unstructured":"JansenCJ.Investigations On Nonlinear Streamcipher Systems: Construction and Evaluation Methods.PhD Dissertation Tech. Univ Delft The Netherlands 1989."},{"key":"e_1_2_7_15_1","doi-asserted-by":"crossref","unstructured":"CanteautA.Open problems related to algebraic attacks on stream ciphers.Proc. of WCC:Bergen Norway 2005;120\u2013134.","DOI":"10.1007\/11779360_10"},{"key":"e_1_2_7_16_1","unstructured":"MaximovA.Some Words on Cryptanalysis of Stream Ciphers.PhD Dissertation Lund Univ. Lund Sweden 2006."},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.306"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_23"},{"key":"e_1_2_7_19_1","doi-asserted-by":"crossref","unstructured":"KodaliRK GundbathulaSK BoppanaL.FPGA implementation of RC\u20104T and WPA.2014 National Conference on Communication Signal Processing and Networking (NCCSN) 2014;1\u20136.","DOI":"10.1109\/NCCSN.2014.7001163"},{"key":"e_1_2_7_20_1","unstructured":"RivestRL SchuldtJCN.Spritz\u2010A spongy RC4\u2010like stream cipher and hash function.In Proceedings of the Charles River Crypto Day Palo Alto CA USA 2014;10\u201324."},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-014-0119-0"},{"key":"e_1_2_7_22_1","volume-title":"INDOCRYPT '06. LNCS","author":"Chang D","year":"2006"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9138-1"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45537-X_1"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9206-6"},{"key":"e_1_2_7_26_1","first-page":"304","volume-title":"Advances in Cryptology C CRYPTO, LNCS","author":"Mironov I","year":"2002"},{"key":"e_1_2_7_27_1","series-title":"Lecture Notes in Computer Science","first-page":"152","volume-title":"FSE '2001","author":"Mantin I","year":"2001"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.04.039"},{"key":"e_1_2_7_29_1","unstructured":"NechvatalJ RukhinA SotoJ.A statistical test suite for random and pseudorandom number generators for cryptographic applications.NIST Special Publication 800\u201022 Revision 1a April2001;131."}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1615","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T00:12:17Z","timestamp":1693699937000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,20]]},"references-count":28,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2016,11,25]]}},"alternative-id":["10.1002\/sec.1615"],"URL":"https:\/\/doi.org\/10.1002\/sec.1615","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,20]]}}}