scholarly journals Light-Weight Present Block Cipher Model for IoT Security on FPGA

2022 ◽  
Vol 33 (1) ◽  
pp. 35-49
Author(s):  
R. Bharathi ◽  
N. Parvatham
2014 ◽  
Vol 16 (2) ◽  
pp. 91-95 ◽  
Author(s):  
Jacob John ◽  
Keyword(s):  

2021 ◽  
Vol 6 (1) ◽  
pp. 188-193
Author(s):  
Dr.V.J. Arulkarthick

Light weight cryptography has been a prominent sector in exploring the cryptanalytics in contemporary world. In this paper, an elevated production capable structure and pliant implementations of hardware by SPECK, which is a lightly weighted block cipher is presented. This lightly weighted SPECK can be accustomed to diminish the retardation of critical path, a tree structure for the realization of Sklansky adder which is an efficient parallel prefix adder operation is used.


Author(s):  
S. Niveda ◽  
A. Siva Sakthi ◽  
S. Srinitha ◽  
V. Kiruthika ◽  
R. Shanmugapriya
Keyword(s):  

Author(s):  
Shrikant Taware ◽  
R. Ravi Chakravarthi ◽  
C. Anna Palagan ◽  
Kumaresan Chandrasekaran ◽  
N. Vadivelan

2017 ◽  
Vol 67 (6) ◽  
pp. 636 ◽  
Author(s):  
Manoj Kumar ◽  
Dhananjoy Dey ◽  
Saibal K Pal ◽  
Anupama Panigrahi

<p class="p1">A new hash function <em>HeW: </em>A hash function based on light weight block cipher <em>FeW </em>is proposed in this paper. The compression function of <em>HeW </em>is based on block cipher <em>FeW</em>. It is believed that key expansion algorithm of block cipher slows down the performance of the overlying hash function. Thereby, block ciphers become a less favourable choice to design a compression function. As a countermeasure, we cut down the key size of <em>FeW </em>from 80-bit to 64-bit and provide a secure and efficient key expansion algorithm for the modified key size. <em>FeW </em>based compression function plays a vital role to enhance the efficiency of <em>HeW</em>. We test the hash output for randomness using the NIST statistical test suite and test the avalanche effect, bit variance and near collision resistance. We also give the security estimates of <em>HeW </em>against differential cryptanalysis, length extension attack, slide attack and rotational distinguisher.<span class="Apple-converted-space"> </span></p>


Nonrepudiation in Mobile environment is a major challenge in the area of IoT security. Public-key-based Digital Signature schemes are common and their computational requirements and complexities do not support constrained devices. This paper presents the design and implementation results of light weight nonrepudiation architecture based on public key cryptography and Elliptic Curve addition to reduce the overhead of processing and communication


Sign in / Sign up

Export Citation Format

Share Document