Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2007, Lecture Notes in Computer Science
With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such as RFID tags and sensor networks. In this paper we describe an ultra-lightweight block cipher, present. Both security and hardware efficiency have been equally important during the design of the cipher and at 1570 GE, the hardware requirements for present are competitive with today's leading compact stream ciphers.
Journal of Cryptographic Engineering
Embedded Systems are deployed in various domains, including industrial installations, critical and nomadic environments, private spaces and public infrastructures. Their operation typically involves access, storage and communication of sensitive and/or critical information that requires protection, making the security of their resources and services an imperative design concern. The demand for applicable cryptographic components is therefore strong and growing. However, the limited resources of these devices, in conjunction with the ever-present need for smaller size and lower production costs, hinder the deployment of secure algorithms typically found in other environments and necessitate the adoption of lightweight alternatives. This paper provides a survey of lightweight cryptographic algorithms, presenting recent advances in the field and identifying opportunities for future research. More specifically, we examine lightweight implementations of symmetric-key block ciphers in hardware and software architectures. We evaluate 52 block ciphers and 360 implementations based on their security, performance and cost, classifying them with regard to their applicability to different types of embedded devices and referring to the most important cryptanalysis pertaining to these ciphers.
A hardware-based performance comparison of lightweight block ciphers is conducted in this paper. The DESL, DESXL, CURUPIRA-1, CURUPIRA-2, HIGHT, PUFFIN, PRESENT and XTEA block ciphers have been employed in this comparison. Our objective is to survey what ciphers are suitable for security in Radio Frequency Identification (RFID) and other security applications with demanding area restrictions. A general architecture option has been followed for the implementation of all ciphers. Specifically, a loop architecture has been used, where one basic round is used iteratively. The basic performance metrics are the area, power consumption and hardware resource cost associated with the implementation resulting throughput of each cipher. The most compact cipher is the 80-bit PRESENT block cipher with a count of 1704 GEs and 206.4 Kbps, while the largest in area cipher is the CURUPIRA-1. The CURUPIRA-1 cipher consumes the highest power of 118.1 μW, while the PRESENT cipher consumes the lowest power of 20 μW. All measurements have been taken at a 100 KHz clock frequency.
Although the AES is an excellent and preferred choice for almost all block cipher applications, it is not suitable for extremely constrained environments such as RFID (Radio-Frequency IDentification) tags and sensor networks. Therefore lightweight cryptography has become very vital and a strong demand. This paper meant to be a reference (for the cryptographic designers) on the lightweight block ciphers. It starts by doing a survey to collect the latest proposed ciphers, then to study them in terms of their algorithms specifications, hardware implementation and attacks. Finally, after the explanation and comparison, this research can be the basement for starting point to improve the lightweight block cipher in many directions like number of clock cycle, size of memory, number of Chosen Plaintext, Gate equivalence ( GE), throughput and attacks.
Journal of Network and Computer Applications, 2015
This paper investigates the lightweight block ciphers' implementations, which have received a fair amount of research for their essential security role in low-resource devices. Our objective is to present a comprehensive review of state-of-the-art research progress in lightweight block ciphers' implementation and highlight future research directions. At first, we present taxonomy of the cipher design space and accurately define the scope of lightweight ciphers for low-resource devices. Moreover, this paper discusses the performance metrics that are commonly reported in the literature when comparing cipher implementations. The sources of inaccuracies and deviations are carefully examined. In order to mitigate the confusion in the composite metrics, we developed a general metric which includes the basic metrics. Our analysis designated the energy/bit metric as the most appropriate metric for energy-constrained low-resource designs. Afterwards, the software and hardware implementations of the block cipher algorithms are surveyed, investigated, and compared. The paper selects the top performing ciphers in various metrics and suggests the Present cipher as a good reference for hardware implementations. What transpires from this survey is that unresolved research questions and issues are yet to be addressed by future research projects.
2006
In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag. HIGHT does not only consist of simple operations to be ultra-light but also has enough security as a good encryption algorithm. Our hardware implementation of HIGHT requires 3048 gates on 0.25 μm technology.
International Journal of Scientific & Technology Research, 2020
IoT provides a virtual view of real-life things in a smart environment where security and privacy are of prime concern. Lightweight cryptography is aimed to provide security solutions in IoT based applications. Various algorithms have been presented in this area which are either software-based implementation or hardware-based implementation of lightweight ciphers. In this paper, a software-oriented 32-bit ultra-lightweight block cipher, named UBRIGHT, is proposed for a resource-constrained smart environment. The performance of the proposed cipher, UBRIGHT is assessed in this paper and it fulfills SAC, key sensitivity test, and randomness test. The results of the performance evaluation of the proposed cipher ’s show that it requires low memory and has good speed.
The International Conference on Electrical Engineering
In this paper we present a new block cipher algorithm that can be used for data security over devices with limited resources ,e.g. smart cards, wireless sensors etc .The algorithm is 128-bit balanced Feistel structure cipher algorithm working in cipher block chaining mode of operation. The building components of the algorithm have good cryptographic properties in comparison with other standard cipher algorithms and it has passed the NIST statistical test with very good results. The algorithm has been implemented on Microblaze microprocessor (as an emulator) to evaluate its efficiency and suitability to work on constrained devices.
IEEE Access, 2020
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers. RFID systems are commonly used in high-security applications such as access control systems, transaction banking systems, and payment systems. The attacker attempts to mislead RFIDs for unauthorized access to services without payment or to circumvent security mechanisms by detecting a secret password. The biggest challenge in RFID systems is how to ensure successful protection against such infringements. Lightweight cryptography can provide security assurance for protecting RFID systems. This article presents a new ultra-lightweight cryptography algorithm for RFID systems called SLIM. SLIM is a 32-bit block cipher based on the Feistel structure since block ciphers are the most used cryptographic and provide very tight protection for IoT devices. The key challenge in designing a lightweight block cipher is to cope with performance, cost, and security. SLIM, like all symmetric block cipher, uses the same key for encryption and decryption. The proposed algorithm has an excellent performance in both hardware and software environments, with a limited implementation area, an acceptable cost/security for RFID systems, and an energy-efficient behaviour. SLIM has demonstrated high immunity against the most effective linear and differential cryptanalysis attacks and has a sufficient margin of defence against these attacks. INDEX TERMS RFID, block ciphers, lightweight cryptography, feistel ciphers, cryptanalysis.
IEEE access, 2024
The AES (Advance Encryption Standard) has made the development of new block ciphers unnecessary; it is now the de facto standard for most uses of block ciphers. However, the AES is still not well-suited for very limited contexts like RFID (Radio-Frequency Identification) tags and WSN(Wireless Sensor Networks), despite recent implementation advancements. In this study, we present SHC (Simple Hybrid Cipher), a new block cipher that uses a 64-bit block length and a 128-bit key length. It offers a hardware implementation that efficiently uses limited resources, making it ideal for use as a sensor in a WSN or an RFID tag. The core function of SHC depends on S-Box-based, composite field arithmetic technology, as it consumes relatively low cost on hardware implementation while still providing sufficient security as a solid encryption algorithm. The hardware implementation of SHC-64 requires 949 LUTs; it generates a maximum operating frequency of 515.995 MHz on the Xilinx-powered Artix-7 Field Programmable Gate Array (FPGA) development board. At the same time, the National Institute of Standards and Technology (NIST) recommended standard algorithm AES consumes 3645 LUTs and generates a maximum operating frequency of 277.369 MHz. The SHC-64 cipher also shows resistance against known cryptanalytics attacks.
Journal of Ambient Intelligence and Humanized Computing, 2020
The internet of things (IoT) is now an in-demand technology that has been adopted in various applications and includes various embedded devices, sensors and other objects connected to the Internet. Due to the rapid development of this technology, it covers a significant portion of the research interests nowadays. IoT devices are typically designed for collecting different types of data from various sources and transmitting them in digitized form. However, data security is the burning issue in the IoT technology, which can broadly impact the privacy of crucial data. In this regard, a new lightweight encryption method called LRBC has been proposed in this work for resource constraint IoT devices which can provide data security at the sensing level. The LRBC has used the structural advantages of both substitution-permutation network (SPN) and Feistel structure together to achieve better security. Furthermore, the proposed method has been tested on NEXYS 4 DDR FPGA (Artix-7) trainer kit and implemented for application specific integrated circuit (ASIC) chip on TSMC 65 nm technology. The proposed algorithm consumes very less power of 11.40 μW and occupies a 258.9 GE (Gate Equivalent) area. Besides, a thorough security analysis shows that the proposed scheme ensures high security against various attacks with robustness. Moreover, the average avalanche effect of LRBC is found to be 58% and 55.75% concerning plaintext and key, respectively.
International Journal of Recent Technology and Engineering (IJRTE), 2019
In the 21st century, Internet of Things (IoT) has become pivotal technology and has attracted worldwide attention in the smart computing environment. In order to enjoy the benefits of this new environment, security is considered as the main aspect in constrained end nodes. Ordinary cryptographic solutions are not sufficient for resource constraint devices. To fulfill this gap, a relatively new field of cryptography called lightweight cryptography came into existence. Furthermore, designing lightweight ciphers especially software oriented poses some significant limits and inherent conditions. Some design considerations of a lightweight encryption algorithm and tradeoffs for minimizing resource requirements are presented in this paper. Also, for a cipher, it is necessary to provide strong resistance against attacks. In this paper different countermeasures to prevent from attacks is also presented. By considering the performance-enhancing ideas presented in this paper, a new GFN based ...
2007
With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such as RFID tags and sensor networks. In this paper we describe an ultra-lightweight block cipher, present. Both security and hardware efficiency have been equally important during the design of the cipher and at 1570 GE, the hardware requirements for present are competitive with today's leading compact stream ciphers. 1
M.tech scholar (VLSI),
Journal of Hardware and Systems Security
In March 2017, NIST (National Institute of Standards and Technology) has announced to create a portfolio of lightweight algorithms through an open process. The report emphasizes that with emerging applications like automotive systems, sensor networks, healthcare, distributed control systems, the Internet of Things (IoT), cyber-physical systems, and the smart grid, a detailed evaluation of the so called lightweight ciphers helps to recommend algorithms in the context of profiles, which describe physical, performance, and security characteristics. In recent years, a number of lightweight block ciphers have been proposed for encryption/decryption of data which makes such choices complex. Each such cipher offers a unique combination of Rajat Sadhukhan
International Journal of High Performance Systems Architecture, 2019
Information security for low-resource devices has received a fair amount of attention in recent years. These devices have physical constraint in terms of area, power, and memory. Therefore, lightweight cryptographic algorithms are providing sufficient security to such devices. In this paper, many lightweight block ciphers have been comprehensively discussed with their characteristics. These ciphers are broadly categorised based on structural design of round function. In addition, the analysis indicates that few lightweight ciphers are well-suited for hardware implementation. Few are healthy compatible with software implementation. However, some of the block ciphers are designed well for both hardware and software implementations. Moreover, there are various performance metrics used for comparison in resource constrained environments (RCEs). More specifically, the objective of this survey is to compare various modern symmetric cryptographic solutions employed to secure small-scale communication devices.
Future Generation Computer Systems, 2017
h i g h l i g h t s • Study the structure of lightweight ciphers and select a candidate representative cipher. • Design and optimize the hardware implementation of the representative cipher. • Test various design options like block sizes and number of implemented rounds.
International Journal of Information and Computer Security, 2020
The exploration of interconnected devices, embedded devices, sensors, and various network-connected devices helps to communicate each other and exchange communications. These devices overcome with security threats related to privacy and data exchange over billions of devices are interconnected. Lightweight block ciphers aim to provide a feasible solution for power-constrained devices which includes Radio-frequency identification (RFID) tags, ubiquitous computing, wireless sensor network, aggregation network and IoT. In this paper, we have implemented a lightweight block cipher compact, secure, and lightweight (CSL). It operates on 64-bit block size, and key size varies from 64-bit to 128-bit key for encryption and decryption. The hardware implementation of CSL algorithm was thrived using field programmable gate array (FPGA) architecture. A pipelined design of compact S-boxes implemented on Digilent Nexys 4 DDR Artix™-7 board. Our experimental results of CSL consumes 1145 LUTs (Lookup Tables) and has fewer memory requirements. CSL shows resistant against various cryptanalytic attacks.
2018
Now-a-days Internet of Things is a novel paradigm shift in Information Technology arena. It is playing a vital role in everyone's life by bringing physical objects and living things into the sphere of the cyber world. Different tagging technologies make it possible to identify physical objects and connect everything to communicate and share information. The communication must be secured in IoT with confidentiality, integrity and authentication services. A number of new factors like limited computational power, RAM size, ROM size, register width, different operating environment and etc. constrained IoT to use traditional security measures. These constraints on IOT enabled devices results in the emergence of a new field, Lightweight Cryptography. Recently a number of software and hardware implementation of lightweight ciphers are designed for IoT applications. These are broadly classified as Hash functions, Stream ciphers, and block ciphers. Software implementations have lower cos...
2013
In this paper we propose two families of block ciphers, Simon and Speck, each of which comes in a variety of widths and key sizes. While many lightweight block ciphers exist, most were designed to perform well on a single platform and were not meant to provide high performance across a range of devices. The aim of Simon and Speck is to fill the need for secure, flexible, and analyzable lightweight block ciphers. Each offers excellent performance on hardware and software platforms, is flexible enough to admit a variety of implementations on a given platform, and is amenable to analysis using existing techniques. Both perform exceptionally well across the full spectrum of lightweight applications, but Simon is tuned for optimal performance in hardware, and Speck for optimal performance in software. This paper is a product of the NSA Research Directorate, and the algorithms presented are free from any intellectual property restrictions. This release does not constitute an endorsement o...
Low-resource devices like wireless sensor networks have some limitations on memory, power and energy. Using common encryption algorithms are not appropriate for these devices due to their hard limitations and leads to a waste of energy and power. Here, lightweight symmetric ciphers have been evaluated in hardware and software implementations. Comprehensive Evaluation of lightweight ciphers in this work is performed based on cost, speed, efficiency and balance criterion. In each of the criteria, evaluation is done based on a specific measure and the best ciphers have been introduced in each. Evaluation in terms of hardware and software implementation indicates the superiority of SPECK and SIMON ciphers. Evaluation in terms of speed in hardware implementation indicates the superiority of Trivium and Grain, and it shows the superiority of MASHA and SPECK in software implementation. Results of the Evaluation in terms of efficiency express the superiority of SIMON and SPECK. The results of these evaluations helps finding ciphers appropriate to the user based on requirements and restrictions. The user sets his desired system and then obtains the system needs; at the final step, based on the type of requirements, the results of our work help the system to select the appropriate cipher.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.