Filters








1,121 Hits in 3.8 sec

A MAC Mode for Lightweight Block Ciphers [chapter]

Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda
2016 Lecture Notes in Computer Science  
However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits.  ...  Such low block sizes lead to impractical limits on how much data a mode of operation can process per key.  ...  Atul Luykx is supported by a Ph.D. Fellowship from the Institute for the Promotion of Innovation through Science and Technology in Flanders (IWT-Vlaanderen).  ... 
doi:10.1007/978-3-662-52993-5_3 fatcat:tvtoldxhovfkdnprmy25du3m3m

Authenticated Encryption using Lightweight Cryptographic Primitives for Wireless Sensor Networks

2019 International Journal of Engineering and Advanced Technology  
Block cipher modes of operations provide different cipher text for identical plain text which further enhances the security.  ...  In this paper novel architecture of authenticated encryption of lightweight symmetric cipher PRESENT and lightweight hash function SPONGENT in OFB mode is proposed.  ...  A lightweight symmetric block cipher PRESENT of ISO/IEC standard is best suited for data confidentiality and integrity.  ... 
doi:10.35940/ijeat.a1079.1291s319 fatcat:sbuq6q4kxjbvhpnxheiiembdpi

Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN

Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval
2018 Security and Communication Networks  
Two symmetric ciphers, AES and PRESENT, and two hash functions, SHA and SPONGENT, are used as the underlying primitives for the generic compositions.  ...  From the experimental results obtained, it is shown how lightweight ciphers significantly contribute to reduce implementation area and energy consumption overheads, extending the lifetime of the sensor  ...  The underlying symmetric encryption function can be implemented as a lightweight block cipher in a convenient confidentiality mode, and the underlying MAC function can also make use of lightweight algorithms  ... 
doi:10.1155/2018/5087065 fatcat:hukeem4m5fhijfecdtdrg46rmu

ULCL - An Ultra-lightweight Cryptographic Library for Embedded Systems
english

George Hatzivasilis, Apostolos Theodoridis, Elias Gasparis, Charalampos Manifavas
2014 Proceedings of the 4th International Conference on Pervasive and Embedded Computing and Communication Systems  
We implement a common lightweight API for utilizing all primitives and a user-friendly API for users that aren't familiar with cryptographic applications.  ...  The library is a collection of open source ciphers (27 overall primitives).  ...  Lightweight APIs For every crypto-primitive type (block cipher, stream cipher, MAC), we implement a common API for utilizing all the different primitives with their parameters.  ... 
doi:10.5220/0004900602470254 dblp:conf/peccs/HatzivasilisTGM14 fatcat:aznuz5cqrvgy5cnsmlxlc5hibu

Lightweight Crypto Stack for TPMS Using Lesamnta-LW

Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
2020 Security and Communication Networks  
In our case, we generate five PRFs this way and then use one PRF for MAC generation and four for key derivation. We use the internal AES-based block cipher of Lesamnta-LW for encryption.  ...  To address this problem, previous works have proposed countermeasures employing lightweight block ciphers such as PRESENT, SPECK, or KATAN.  ...  In [6] , a lightweight protocol has been proposed using lightweight block ciphers such as SPECK and PRESENT, and CBC-MAC to be used as the underlying ciphers and mode of operation, respectively. e applicability  ... 
doi:10.1155/2020/5738215 fatcat:ugyo27hfjnafjae6dws6yhehtq

NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks [chapter]

Pardeep Kumar, Hoon-Jae Lee
2012 Applied Cryptography and Network Security  
In this mode, the entire packet is authenticated with a MAC, but the whole data packet is not encrypted. Author has tested two 64-bit block ciphers, i.e.  ...  RC5 is also suitable for ATmega platform because of memory constraints. A hash function is used with block cipher.  ...  NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/35999 fatcat:vsgis7qp5vg4derktbqju3o2nq

ALE: AES-Based Lightweight Authenticated Encryption [chapter]

Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser
2014 Lecture Notes in Computer Science  
for longer messages.  ...  We provide an optimized low-area implementation of ALE in ASIC hardware and demonstrate that its area is about 2.5 kGE which is almost two times smaller than that of the lightweight implementations for  ...  The authors thank Axel Poschmann for providing the reference implementation of the AES algorithm. Part of this work was done while Andrey Bogdanov and Florian Mendel were with KU Leuven.  ... 
doi:10.1007/978-3-662-43933-3_23 fatcat:mo3lgrsaejchzhbjaxuqwxwqnu

Energy efficiency of encryption schemes applied to wireless sensor networks

Xueying Zhang, Howard M. Heys, Cheng Li
2011 Security and Communication Networks  
For example, while a cryptographic system may use the block cipher Advanced Encryption Standard (AES [17]) as its cryptographic algorithm, the mode of operation applied (e.g. cipher block chaining (CBC  ...  In conclusion, we recommend using a block cipher instead of a stream cipher to encrypt data for wireless sensor network applications and using a cipher feedback scheme for the cipher operation, thereby  ...  For example, a lightweight block cipher may use a smaller block size and key size than AES.  ... 
doi:10.1002/sec.375 fatcat:nvzn7ci3bjgshezjmqmfne4n7y

Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks

Xueying Zhang, Howard M. Heys, Cheng Li
2010 2010 25th Biennial Symposium on Communications  
For example, while a cryptographic system may use the block cipher Advanced Encryption Standard (AES [17]) as its cryptographic algorithm, the mode of operation applied (e.g. cipher block chaining (CBC  ...  In conclusion, we recommend using a block cipher instead of a stream cipher to encrypt data for wireless sensor network applications and using a cipher feedback scheme for the cipher operation, thereby  ...  For example, a lightweight block cipher may use a smaller block size and key size than AES.  ... 
doi:10.1109/bsc.2010.5472979 fatcat:gk2ppucfpjeuvavu5226t23y4u

Towards Secure and Practical MACs for Body Sensor Networks [chapter]

Zheng Gong, Pieter Hartel, Svetla Nikova, Bo Zhu
2009 Lecture Notes in Computer Science  
Considering the hardware limitations of BSN, we propose a tunable lightweight MAC based on the PRESENT block cipher, which is named TuLP.  ...  A 128-bit variant TuLP-128 is proposed for a higher resistance against internal collisions.  ...  We would like to thank Vicent Rijmen, Xuejia Lai for their advice on the design of TuLP and TuLP-128.  ... 
doi:10.1007/978-3-642-10628-6_13 fatcat:d4w5uo2bm5enblxioltw53ltxy

FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks [article]

Devesh Jinwala, Dhiren Patel, Kankar Dasgupta
2012 arXiv   pre-print
We also experimentally evaluate various aspects related to our scheme viz. configurable block ciphers, configurable block cipher modes of operations, configurable MAC sizes and configurable replay protection  ...  Therefore, we believe that there is a need for investigating the feasibility of a configurable software-based link layer security architecture wherein an application can be compiled flexibly, with respect  ...  These operation mode provide either (a) no security support or (b) support for message authentication only based on Cipher Block Chaining Message Authentication Code (CBC-MAC) [24] viz.  ... 
arXiv:1203.4697v1 fatcat:mphgtvimrrgyvfbwveumnc6yh4

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives [chapter]

Aleksandra Mileva, Vesna Dimitrova, Orhun Kara, Miodrag J. Mihaljević
2021 Security of Ubiquitous Computing Systems  
In particular, the reason behind why modern lightweight block cipher designs have in the last decade overwhelmingly dominated stream cipher design is analyzed in terms of security against tradeoff attacks  ...  AbstractThe main objective of this chapter is to offer to practitioners, researchers and all interested parties a brief categorized catalog of existing lightweight symmetric primitives with their main  ...  Block Ciphers Block ciphers encrypt one block of plaintext bits at a time, to a block of ciphertext bits, through multiple rounds, and using a secret key.  ... 
doi:10.1007/978-3-030-10591-4_2 fatcat:d2gtrxu225asnmubp5ezfloz3m

RETRACTED: The Application of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

Lingling Si, Zhigang Ji, Zhihui Wang
2012 Physics Procedia  
Finally, we conclude from the analysis results that the lightweight block cipher, BSPN, achieves good performance, providing energy efficiency as well as suitable security for sensor nodes in a WSN.  ...  We evaluate the energy efficiency by comparing the number of CPU cycles per byte for different symmetric key ciphers, including both stream ciphers and block ciphers.  ...  In our analysis, we assume that for each block cipher case, the block cipher is used in CBC mode to generate the MAC. For stream cipher cases, the MAC is generated by AES used in CBC mode.  ... 
doi:10.1016/j.phpro.2012.03.125 fatcat:okwzgdcyarbmrpgjp4gomlladi

Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers

YoungBeom Kim, Hyeokdong Kwon, SangWoo An, Hwajeong Seo, and Seog Chung Seo
2020 Mathematics  
In this paper, we present efficient implementations of ARX-based Korean Block Ciphers (HIGHT and LEA) with CounTeR (CTR) mode of operation, and CTR_DRBG, one of the most widely used DRBGs (Deterministic  ...  Our proposed table generation way can reduce the cost for building a precomputation table by around 6.7% and 9.1% in the case of LEA and HIGHT, respectively.  ...  Recently, several lightweight block ciphers have been developed for efficient performance on IoT devices. Lightweight block ciphers ensure low-cost and simple computations.  ... 
doi:10.3390/math8101837 fatcat:vfgqkoqwzbarrhipbh6eaxegde

Security performance evaluation of biometric lightweight encryption for fingerprint template protection

Taqiyah Khadijah Ghazali, Nur Haryani Zakaria
2019 International Journal of Advanced Computer Research  
for administration of this study."  ...  Acknowledgment The "authors wish to thank Awang Had Salleh Graduate School of Arts and Sciences, Universiti "Utara Malaysia for funding this study under the Postgraduate Grant, S/O code: 16042.  ...  "RBF is a mode for the block ciphers which use an unknown random block as a feedback.  ... 
doi:10.19101/ijacr.pid49 fatcat:whsfjo3tt5gy3cq2fg2huciy2q
« Previous Showing results 1 — 15 out of 1,121 results