A Novel Simplified AES Algorithm for Lightweight Real-Time Applications: Testing and Discussion

2020 ◽  
Vol 13 (3) ◽  
pp. 435-445 ◽  
Author(s):  
Malik Qasaimeh ◽  
Raad S. Al-Qassas ◽  
Fida Mohammad ◽  
Shadi Aljawarneh

Background: Lightweight cryptographic algorithms have been the focus of many researchers in the past few years. This has been inspired by the potential developments of lightweight constrained devices and their applications. These algorithms are intended to overcome the limitations of traditional cryptographic algorithms in terms of exaction time, complex computation and energy requirements. Methods: This paper proposes LAES, a lightweight and simplified cryptographic algorithm for constricted environments. It operates on GF(24), with a block size of 64 bits and a key size of 80-bit. While this simplified AES algorithm is impressive in terms of processing time and randomness levels. The fundamental architecture of LAES is expounded using mathematical proofs to compare and contrast it with a variant lightweight algorithm, PRESENT, in terms of efficiency and randomness level. Results: Three metrics were used for evaluating LAES according to the NIST cryptographic applications statistical test suite. The testing indicated competitive processing time and randomness level of LAES compared to PRESENT. Conclusion: The study demonstrates that LAES achieves comparable results to PRESENT in terms of randomness levels and generally outperform PRESENT in terms of processing time.

AKTUELNOSTI ◽  
2017 ◽  
Vol 3 (36) ◽  
Author(s):  
Boris Damjanović

Today’s cryptographic algorithms are designed in a way that they combine mathematical theory and practice of computer science in order to improve resistance to cryptanalysis. Cryptographic algorithms are designed around the binary data format keeping in mind the presumption of hardening possibility of cracking the algorithm. One of the algorithms whose resistance to cryptanalysis during the past 16 years is extensively tested algorithm AES. The Advanced Encryption Standard (AES) is the first cryptographic standard aroused as the result of public competition established by U.S. National Institute of Standards and Technology (NIST). AES has emerged as restriction on winner of this competition, called Rijndael algorithm on the block size of 128 bits. From the moment of its acceptance of the standard in 2001, testing and research of its resistance on cryptanalysis and research focused on improving its performance are made. This paper presents a detailed overview of the algorithm AES, together with all its transformations and with ideas to speed up its work.


Security of data (text, audio, and images) is becoming more complex with the increment in its amount. In order to upsurge the reliability, the captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is used to ensure authenticity. In contrast, even these captchas can be hacked and security can be easily impeached, aim of these captchas is to identify if the user is genuine or else if it is just a robot trying to spam the system. This paper presents auxiliary hybridization of AES and Blowfish cryptographic algorithms for image encipherment and decipherment. Here, AES is using Blowfish as its subroutine where Blowfish encrypts and decrypts the AES encoded image. This is then handed to AES for second level decryption. Here the image which is to be encrypted is applied to AES algorithm, its output is further used as an input for Blowfish algorithm. Output of this doubly encrypted image is then decrypted in the reverse order of encipherment. This auxiliary hybridization adds security to the image rendering it the capacity to become useful in highly important organizations. Private key cryptography uses single secret key at both, the sender and the receiver end. Using symmetric key cryptographic algorithm for this process makes the complete process fast and more secure in comparison to when asymmetric cryptographic algorithms are used for the same purpose. Moreover, symmetric key cryptographic algorithms are more suitable for larger files and images. These also help in maintaining the confidentiality of the data.


The analysis of performance criteria for different cryptographic algorithms has increasingly been concerned in the last few years and that is because the majority of life applications need cryptographic algorithms to be involved in their structure to provide security for these applications such as banking services, e-government and online applications [1]. In this paper, the analytic study is executed on the most specific popular cryptographic algorithm which is “AES” technique [2][3] in order to research the impact of utilizing different models which are named “modes” on the behavior of “AES” technique and hence increases the cryptographic strength of “AES” technique. The criteria utilized to aid in judging on the influence of modes on the behavior of “AES” technique are enciphering time, throughput and strict avalanche criteria (SAC). Such influence has been clarified and presented through providing comparative analysis among modes of operation according to previously mentioned parameters. First the analytic study is proposed utilizing the traditional substitution box formula in constructing AES technique then an enhanced version of substitution box equation is included in AES technique to provide more complex and securing substitution box in constructing AES algorithm so as to measure the impact of changing the formula of substitution box on the behavior of AES technique and its cryptographic capabilities. Finally, the results of executing the modes on the behavior of AES technique in case of utilizing the traditional sbox and the enhanced version of s-box are listed in terms of the previously mentioned criteria enciphering time, throughput and (SAC) and consequently we come up with the conclusion that SAC parameter is the only criterion that shows the impact of utilizing different modes on the behavior of AES technique but the enciphering time and throughput has no role in showing the influence of utilizing distinctive modes on the behavior of AES technique regardless of changing the substitution box equation utilized in “AES” technique.


1996 ◽  
Vol 8 (1) ◽  
pp. 1-10 ◽  
Author(s):  
Ken Bartley

This paper discusses the need for nationally based analytical models of the medieval period. The use of cluster analysis as a method for classifying demesne farms, by the crops they grew and their livestock management, is explained. Successful implementation of cluster analysis requires both the existence of a large base sample, to permit isolation of specific groupings within the data, and access to considerable processing time. The paper concludes by demonstrating how discriminant analysis can provide an efficient and systematic way of classifying even a single manor within a national frame of reference.


2021 ◽  
pp. 155633162110266
Author(s):  
Ram K. Alluri ◽  
Fedan Avrumova ◽  
Ahilan Sivaganesan ◽  
Avani S. Vaishnav ◽  
Darren R. Lebl ◽  
...  

As robotics in spine surgery has progressed over the past 2 decades, studies have shown mixed results on its clinical outcomes and economic impact. In this review, we highlight the evolution of robotic technology over the past 30 years, discussing early limitations and failures. We provide an overview of the history and evolution of currently available spinal robotic platforms and compare and contrast the available features of each. We conclude by summarizing the literature on robotic instrumentation accuracy in pedicle screw placement and clinical outcomes such as complication rates and briefly discuss the future of robotic spine surgery.


2004 ◽  
Vol 120 ◽  
pp. 555-562
Author(s):  
D. Apelian ◽  
S. K. Chaudhury

Heat Treatment and post casting treatments of cast components has always been an important step in the control of microstructure, and resultant properties. In the past, the solutionizing, quenching and ageing process steps may have “required” in total over 20 hours of processing time. With the advent of fluidized bed reactors (FB), processing time has been dramatically reduced. For example, instead of 8-10 hours solutionizing time in a conventional furnace, the time required in FB is less than an hour. Experiments with Al-Si-Mg alloy, (both modified with Sr, and unmodified) were performed, having different diffusion distances (different DAS), and for different reaction times and temperatures. Both the model and the experimental results are presented and discussed.


2018 ◽  
Vol 7 (1.7) ◽  
pp. 10
Author(s):  
R H Aswathy ◽  
N Malarvizhi

The broad vision of IoT focuses the highly increasing the electronic devices and application in which leads to the growth of technology. The enormous amounts of constrained devices are interlinked, communicate and coordinate with each other to fulfill its tackier mainly concentrate on low energy, Resource constraint, self-organization and short range of communication. In this heterogeneous environment of Antiprivacy and security are the greatest challenge. The secure information exchange is most critical pitfall to ensure the system security. In this paper we discussed and analyzed about various security algorithms like Triple DES, AES, Blowfish and ECCwith their structure, block size, key generation, number of rounds with different settings. In order to analyze the efficiency of all said algorithms, we made an experiment on algorithms works on constrained devices in different contexts, all our experiments show that ECC is the most suitable security algorithm in IOT contexts.


2018 ◽  
Vol 18 (3) ◽  
pp. 368-401
Author(s):  
Ateeque Shaikh ◽  
Pratik Modi ◽  
Vanita Yadav ◽  
Prashant Kumar

Research on market orientation has evolved for more than two decades, and is now ripe for reflection on its paradigmatic and methodological moorings. We review market orientation research to understand research paradigms adopted in the studies using an operations research paradigm framework, and compare and contrast methodologies and research designs used in the literature. This study used the citation pearl-growing method to identify and review 137 studies on market orientation. The study finds a dominance of the positivist paradigm in the extant research, particularly in the North American journals. There have only been a few interpretive studies on market orientation in the past two decades. This study makes a case for methodological pluralism in the research on market orientation. The findings will benefit academia and practitioners in understanding the past research trends and identify potential future research areas. The review adds value to the literature in terms of presenting an overview of market orientation research, where the research field stands today, and where it is heading in the future.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5744
Author(s):  
Ashutosh Dhar Dwivedi

Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal. The majority of standard cryptographic algorithms do not fit with these constrained devices due to heavy cryptographic components. In this paper, a new block cipher, BRISK, is proposed with a block size of 32-bit. The cipher design is straightforward due to simple round operations, and these operations can be efficiently run in hardware and suitable for software. Another major concept used with this cipher is dynamism during encryption for each session; that is, instead of using the same encryption algorithm, participants use different ciphers for each session. Professor Lars R. Knudsen initially proposed dynamic encryption in 2015, where the sender picks a cipher from a large pool of ciphers to encrypt the data and send it along with the encrypted message. The receiver does not know about the encryption technique used before receiving the cipher along with the message. However, in the proposed algorithm, instead of choosing a new cipher, the process uses the same cipher for each session, but varies the cipher specifications from a given small pool, e.g., the number of rounds, cipher components, etc. Therefore, the dynamism concept is used here in a different way.


2020 ◽  
Vol 8 (5) ◽  
pp. 1836-1839

The password system is the most conventional method among validation techniques on the internet and is operated more easily and effectively than other methods. However, it is a vulnerable method against attacks such as eavesdropping or replay attack. To prevail over this problem, OTP (One Time Password) technique is used. The most popular OTP is HOTP algorithm, which is based on one-way hash function SHA-1. The recent researches show the weakness of the hash function. So, in this paper we created a module which uses another cryptographic algorithm. Cryptography in the current world serves an important role in data security. Cryptography means writing of secret codes (cipher text) which is in an unintelligible form and cannot be read unless we have a perfect key to decode it. The proposed method is AES algorithm (128 bit) followed by Middle Square method to generate an OTP. As OTP is a 4-6 bit number we will decrease the AES output to a 4-6 bit through Middle Square method and this OTP can be used as a security tool in many cases like online transaction purposes.


Sign in / Sign up

Export Citation Format

Share Document