Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,364 Hits in 6.8 sec

Lightweight Cryptography for IoT: A State-of-the-Art [article]

Vishal A. Thakor, M.A. Razzaque, Muhammad R. A. Khandaker
2020 arXiv   pre-print
More than four dozens of lightweight cryptography algorithms have been proposed, designed for specific application(s).  ...  This new security threats could be minimized by lightweight cryptography, a sub-branch of cryptography, especially derived for resource-constrained devices such as RFID tags, smart cards, wireless sensors  ...  LED (Lightweight Encryption Device) [73] is designed with a novel concept of no key scheduling process, the PRESENT S-box, the row-wise processing as described in lightweight AES [47] and the mix column  ... 
arXiv:2006.13813v1 fatcat:tydoekhuvrhjtek64z77zw34ti

Efficient Hardware Encryption Using Lightweight Process

2015 International Journal of Science and Research (IJSR)  
Hence, we propose a novel approach in lightweight hardware cryptography which provides higher throughput, faster execution, lower memory consumption and reliable security.  ...  We are using the hybrid encryption system which is a combination of PRESENT, HUMMING-BIRD, TWOFISH algorithm and GRP.  ...  Raisoni Institute of Engineering and Technology, Wagholi, Pune, for his constant support and constructive criticism.  ... 
doi:10.21275/v4i11.nov151369 fatcat:6b64wix55rgfhet2z3pmjpegzq

Towards Designing Efficient Lightweight Ciphers for Internet of Things

2017 KSII Transactions on Internet and Information Systems  
In this paper, a total of 13 lightweight cryptographic algorithms are evaluated based on their implementation results on 8-bit, 16-bit, and 32-bit microcontrollers and their appropriateness is examined  ...  This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT.  ...  Different Parameters Parameter Value Label 64 bit A Key Size 128 bit B 96 bit A Block Size 128 bit B 80 bit C Not Based A 4*4 B S box 8 bit C Bit Slice D 2 S box E Table 5 . 5 Summary of Rules to keep  ... 
doi:10.3837/tiis.2017.08.014 fatcat:jvagcfbzm5dt5jsiv5vxuczj34

Lightweight Security Algorithm For Wireless Node Connected with IoT

D. Aakash, P. Shanthi
2016 Indian Journal of Science and Technology  
Method: In this work, a novel approach is made with new hybrid lightweight security algorithm named PRESENT-GRP which is derived in Intel Galileo Gen 2 board.  ...  Findings: This hybrid algorithm is an enhancement of the GRP permutation algorithm because it lags an S-box. This proposed algorithm is for low power devices which consumes relatively less memory.  ...  The authors would like to thank SASTRA University, Thanjavur for providing support for this research work under the "Fund for Improvement of S&T Infrastructure in Universities and Higher Educational Institutions  ... 
doi:10.17485/ijst/2016/v9i30/99035 fatcat:snerqlxgvvfwpk677tpow277t4

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

Vishal A. Thakor, Mohammad Abdur Razzaque, Muhammad R. A. Khandaker
2021 IEEE Access  
More than fifty lightweight cryptography (plain encryption) algorithms are available in the market with a focus on a specific application(s), and another 57 algorithms have been submitted by the researchers  ...  Also, we have discussed the demand and a direction for new research in the area of lightweight cryptography to optimize balance amongst cost, performance and security.  ...  PICARO [78] is a novel cipher with a good balance between performance and security (by an adequate choice of S-box).  ... 
doi:10.1109/access.2021.3052867 fatcat:lidatyjdtrh4jirpxnnvgwsupi

Modern and Lightweight Component-based Symmetric Cipher Algorithms

Samar A. Qassir, Methaq T. Gaata, Ahmed T. Sadiq
2022 ARO. The Scientific Journal of Koya University  
Moreover, a new classification of cryptography algorithms to four categories based on four factors is presented.  ...  The aim of this review is to present symmetric cipher main components, the modern and lightweight symmetric cipher algorithms design based on the components that utilized in cipher design, highlighting  ...  General Model of Cryptography Process. Fig. 3 . 3 Fig. 3. Stream cipher encryption process. Fig. 5 . 5 Fig. 5. Modern symmetric cipher components. Fig. 6 . 6 Fig. 6. S-Box in DES algorithm.  ... 
doi:10.14500/aro.11007 fatcat:xug57anonbhuzks25wiqscjl7y

Implementation of new hybrid lightweight cryptosystem

C.G. Thorat, V.S. Inamdar
2018 Applied Computing and Informatics  
Proposed technique uses the fastest bit permutation instruction PERMS with S-box of PRESENT block cipher for non-linearity.  ...  Lightweight cryptography is an aspiring field which investigates the implementation of cryptographic primitives and algorithms for resource constrained devices.  ...  Figure 2 . 2 P-box comparison. b ≤ 1/(2n) Maximum with s 5 t 5 0 b ≤ 1/(2n) Maximum with s 5 u 5 t 5 0 Table 2 . 2 Comparison of bit permutation instructions.  ... 
doi:10.1016/j.aci.2018.05.001 fatcat:xuaaor2tqzaxjnjinfa5k4ttym

A NOVEL ARCHITECTURE FOR LIGHTWEIGHT BLOCK CIPHER, PICCOLO

Rahiyanath T. Y. .
2015 International Journal of Research in Engineering and Technology  
Lightweight cryptography is a cryptographic algorithm or protocol tailored for implementation in constrained environments including RFID tags, sensors, contactless smart cards, health-care devices and  ...  Piccolo is a new lightweight block cipher which is optimized for extremely constrained devices.  ...  The F function has 16-bit input, which are grouped as four nibbles and produces a 16-bit output. In the SubNibble operation, each nibble is passed through an S-box.  ... 
doi:10.15623/ijret.2015.0409017 fatcat:evebockoifbidhx76h4pp76ulu

Lightweight Cryptographic for Securing Constrained Resource IoT Devices

2020 International journal of recent technology and engineering  
For that, lightweight cryptographic primitives (LWC) have been introduced.  ...  Internet of Things IoT become a recent concept of communication technologies and a novel computing paradigm.  ...  operations and a limited number of rounds compared with standard and conventional block cipher algorithms. e.g., in a lightweight, a single 4-bit S-box has been utilised in place of 8-bit boxes inside  ... 
doi:10.35940/ijitee.d9060.029420 fatcat:fne4gzufcnfslpsua4jw2ifpzm

CLEFIA- A Encryption Algorithm using Novel S-Box Architecture

Manjushree B Somasagar, BMS College of Engineering
2020 International Journal of Engineering Research and  
Lightweight cryptography is a class in cryptography that is employed in resource constrained devices like embedded systems to provide security.  ...  CLEFIA is one of the light weight cryptography algorithms which suits the resource constrained environments in providing security thus enhancing the privacy.  ...  Key scheduling block The key scheduling block is designed using a technique called double swap. A 128 bit long word is split as 2, 57 bits and 2, 7 bits [5] [6] .  ... 
doi:10.17577/ijertv9is070314 fatcat:myex5c65pvcwlmtbow3oj2m5ki

Proposal Framework to Light Weight Cryptography Primitives

Mustafa Abd Zaid, Soukaena Hassan
2022 Engineering and Technology Journal  
LWC can define as a trade-off between cryptography and lightweight [5] .  ...  [7] , designing of an LWC and securing a suitable IoT-based application substitution box (S-box) were the significant points targeted by the present work.  ...  A, B, C, D, E, F, G, and  ... 
doi:10.30684/etj.v40i4.1679 fatcat:eh6wmf7jwnh3toyydivafzhjem

LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications

2021 KSII Transactions on Internet and Information Systems  
Keeping the issue in mind a novel light encryption strategy known as LCB is designed for IoT devices for optimal security.  ...  The IoT devices are designed in a way that it helps to collect various forms of data from varied sources and transmit them in digitalized form.  ...  Acknowledgement Authors would like to acknowledge to the reviewers for their valuable feedback. This publication is an outcome of the R&D work undertaken project under the Ph.D.  ... 
doi:10.3837/tiis.2021.11.014 fatcat:beell73eqjcmfbzsnbgxhc4yvi

Optimization of Security and Privacy- Preserving Data Using an IoT CLEFIA Based Security LFSR

Nahla F. Osman
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
The CLEFIA algorithm is a suitable lightweight cryptographic algorithm used in medium security systems.  ...  Lightweight cryptography enables secure and efficient communication between networked smart objects.  ...  In this work, Block cipher encrypts 16-bit data blocks using 64-bit subkey. The main idea of Hummingbird solution is used with a new Boolean function is derived for the S-box and Inverse S-boxes.  ... 
doi:10.32628/cseit1953126 fatcat:taabtgogeretrheullros7fk2y

A novel of substitution-box design using PLL algorithms in magic cube

Rana M. Zaki, Hala Bahjat Abdul Wahab
2021 Periodicals of Engineering and Natural Sciences (PEN)  
Because S-Box and its reverse take but smaller milliseconds to construct it ability be applied in a variety of lightweight applications  ...  The results of the analysis show that the novel S-Box overrun each of these statistical tests, has a good avalanche impact, and thus can protect against a wide range of attacks.  ...  into used in lightweight cryptography for appropriate devices.  ... 
doi:10.21533/pen.v9i4.2402 fatcat:lamejwd4sfdufk6cgrgiefwsd4

Internet of Things Security using New Chaotic System and Lightweight AES

Jolan Rokan Naif, Ghassan H. Abdul-majeed, Alaa K. Farhan
2019 Journal of Al-Qadisiyah for Computer Science and Mathematics  
The Lightweight AES was design in case to reduce CPU computation cycles and complexity of AES. Results show that computation time for proposed system decreased (has 145% speedup more).  ...  Generated chaos keys (used JORN) were used in the lightweight AES and the Secure Hash Algorithm version 3 (SHA3-256).  ...  Each 64 bits are utilized with S-box (there are two S-boxes proposed for use in this modified Sub-bytes). The S-Boxes shifted at each iteration using K1 to generate new S-box values.  ... 
doi:10.29304/jqcm.2019.11.2.571 fatcat:zzrvwyw2rrbyppstg7qxsa7ooq
« Previous Showing results 1 — 15 out of 1,364 results