By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribu More
By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarking have used. On the other hand, the key management is very important in digital rights management systems, and methods such as Digital watermarking methods are not effective in preventing copying files and digital documents. In this paper, we have proposed a model to improve the performance of digital rights management systems. This method is based on multi-part encryption and control on documents publication. The main distinction of this approach with other methods employed is using Obfuscation techniques to protect the key generation algorithm against reverse engineering.
Manuscript profile
Secure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the More
Secure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the need to implement these algorithms on flexible platforms can be challenging. Reducing the area and speeding up the execution of operations are the main challenges for designing and implementing these algorithms. This paper proposes a new architecture for the FPGA-based processor for SHA-2 series cryptographic algorithms. In the proposed processor, the use of memory units and multi-port data path, followed by parallel processor performance, has reduced the use of resources and increased the speed of data processing. Processor architecture for SHA-2 cryptographic algorithms is modeled in VHDL and implemented on the FPGA platform in the Virtex series by ISE software. Implementation results show that the proposed compact processor compared to previous tasks with similar objectives, was able to increase the operating frequency for the SHA-256 cryptographic algorithm by 25% and occupy 55% less space for the SHA-512 cryptographic algorithm to the desired level of operational power and efficiency. Also maintain. The proposed processor is suitable for applications such as trusted mobile platforms (TMP), digital currency (Bitcoin) and secure on-chip network routing (NoC).
Manuscript profile
Considering the expansion of the use of digital rights management systems, the use of methods such as encryption and encryption, although they have advantages, but they do not meet the requirements of the aforementioned systems responsible for the safe distribution of d More
Considering the expansion of the use of digital rights management systems, the use of methods such as encryption and encryption, although they have advantages, but they do not meet the requirements of the aforementioned systems responsible for the safe distribution of digital content. In this regard, the need for an alternative or hybrid method to protect digital content from the production stage to the transfer and storage of data in digital rights management systems is undeniable. In this paper, we have proposed a model to improve the performance of digital rights management systems, which is based on multi-part cryptography and not only monitors and controls the publication and distribution of documents, but also by using distinct and unique data in key generation. It also effectively prevents copying. The main difference between the proposed approach and other methods used in this field is the use of obfuscation technique in order to protect the key generation algorithm against reverse engineering attacks. The proposed system covers more security criteria compared to the existing systems in the field of digital rights management.
Manuscript profile