Contents & References of Investigating the effects of reactive power control on the characteristics of induction motors by considering different events in a sample network
List:
List H
List of figures L
List of tables C
Abstract 1
Chapter 1- An overview of the basic concepts of cryptography. 3
1-1- Introduction 3
1-2- Necessity of network security. 3
1-3- types of attacks. 3
1-3-1- Change information. 3
1-3-2- Impersonation 4
1-3-3- Eavesdropping 4
1-4- Data encryption 4
1-5- Symmetric data encryption 5
1-6- Asymmetric data encryption 6
1-7- Digital signature. 7
1-8- abstract generator function. 7
1-9- General characteristics of abstract generator functions. 7
1-10- Classification of abstract generator functions. 8
1-11- The features of abstract generator functions. 8
1-12- Classification of abstractor functions in terms of application: 8
1-13- Properties of one-way abstractor functions. 10
1-14- Important abstract generator functions. 11
1-15- Hash security or abstract generator function. 12
Chapter 2- Introducing the final algorithm of the competition. 15
Introduction 15
2-1- History. 15
2-2- Status of the second round of the SHA-3 competition. 16
2-3- Review and evaluation of abstract generator algorithms of the semi-final round of the SHA-3 competition. 17
2-4- Review of the BLAKE abstract generator algorithm. 17
2-4-1- Features of BLAKE. 18
2-4-2- The structure of the abstract function of the BLAKE generator. 18
2-4-3- Result: 19
2-5- Review of Skein abstract generator algorithm. 19
2-5-1- Features of Skein. 20
2-5-2- The structure of the abstract generator function. 21
2-5-3- Result. 21
2-6- Review of Keccak abstract generator. 21
2-6-1- Features of Keccak. 22
2-6-2- Structure of abstract generator function. 23
2-6-3- Result. 25
2-7- Review of the Grostl abstract generator algorithm 25
2-7-1- The structure of the abstract generator function. 25
2-7-2- Structure of the Grostl compressor function 25
2-7-3- Result. 28
2-8- Review of the JH abstract generator algorithm. 28
2-8-1- Introduction of JH algorithm. 28
2-8-2- The structure of JH compressor function. 28
2-8-3- JH security analysis. 29
2-8-4- Advantage of JH.. .. 30
2-8-5- Result. 30
2-9- Conclusion. 30
2-10- The reasons for choosing the JH algorithm and its evaluation. 31
Chapter 3- JH Algorithm. 33
Introduction 33
3-1- Introducing JH abstract generator algorithm. 33
3-2- Mathematical notation and parameters used in JH abstract generator function. 37
3-3- S-box layer JH abstractor function. 38
3-4- Linear transformation of layer L. 39
3-5- Pd substitution. 40
3-6- Permutation of ??d. 40
3-7- Permutation of P´d. 41
3-8- Permutation. 41
3-9- Permutation relation of Pd. 41
3-10- Round function Rd. 42
3-11- Grouping. 43
3-12- Grouping and De-grouping to calculate rotation: 43
3-13- Constant rotation on Ed function. 45
3-14- Structure of Fd compressor function. 45
3-15- Overview of FPGA. 47
3-15-1- Various design methods using FPGA. 49
3-15-2- The different stages of an FPGA project are as follows. 51
3-15-3- A look at the architecture of today's FPGAs. 51
3-15-4- Logical cells. 51
3-15-5- Sources of internal connections. 52
3-15-6- Memory resources 52
3-15-7- Conclusion... 53
Chapter 4- Simulation and synthesis. 55
Introduction: 55
4-1- The architecture used in the JH simulator. 55
4-1-1- Analyzing the general shape of the main design. 56
4-1-2- Block architecture for 42 rounds. 58
4-1-3- FINITE STATE MACHINE 59
4-2- Analysis of simulation algorithm for JH-22458
4-1-3- FINITE STATE MACHINE 59
4-2- Analysis of simulation algorithm for JH-224 bit. 61
4-2-1- Block (Data unit) Top module. 61
4-2-2- Control unit circuit block 62
4-2-3- Control circuit 63
4-2-4- Mode circuit and FSM Controller block. 64
4-2-5- I/O input and output interface. 67
4-2-6- Connection between input and output circuit. 68
4-3- ISE emulator program. 69
4-3-1- Implementation simulator program. 69
Step by step of each block is shown. 69
4-3-2- Simulator program 72
4-4- Conclusion. 89
Chapter 5 - Conclusion and suggestions 91
References 94
Appendix 1: VHDL codes. 98
Appendix 2: Persian to English dictionary. 127
Appendix 3: English to Persian dictionary.