6,640 Hits in 3.7 sec

Lightweight Cryptographic for Securing Constrained Resource IoT Devices

2020 International journal of recent technology and engineering  
For that, lightweight cryptographic primitives (LWC) have been introduced.  ...  With the evolution of IoT, the volume of data interchanged among connecting IoT devices is increasing at a remarkable scale due to the increase in number of the connected objects.  ...  The recent model serves to enhance the quality of investigation in the field of lightweight cryptography.  ... 
doi:10.35940/ijitee.d9060.029420 fatcat:fne4gzufcnfslpsua4jw2ifpzm

Lightweight cryptography methods

William J. Buchanan, Shancang Li, Rameez Asif
2017 Journal of Cyber Security Technology  
This paper outlines many of the techniques that are defined as replacements for conventional cryptography within an Internet of Things (IoT) space and discuss some trends in the design of lightweight algorithms  ...  Thus lightweight cryptography methods are proposed to overcome many of the problems of conventional cryptography.  ...  Lightweight Cryptography Design Trends Based on metrics discussed both in hardware case and software case, most lightweight algorithms are designed to use smaller internal states, short block and key sizes  ... 
doi:10.1080/23742917.2017.1384917 fatcat:tx2s4hmkzbegffkns3mw26rloe

A lightweight cryptographic solution to secure digital transmissions on resource-constrained environments

Saiida Lazaar
2021 General Letters in Mathematics  
The great revolution of technology and its fast growth have led to a cyber space increasingly vulnerable to cyber-attacks.  ...  The purpose of this paper is to give recent advances of lightweight cryptographic solutions that meet the requirements of constrained systems, and to present a study, in terms of security, energy-consuming  ...  Acknowledgments The author gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 
doi:10.31559/glm2021.10.2.4 fatcat:bmicopcwkjaktpj65ejbrc2uze

Comparative Analysis of Impact of Cryptography Algorithms on Wireless Sensor Networks [article]

Bilwasiva Basu Mallick, Ashutosh Bhatia
2021 arXiv   pre-print
Cryptography techniques are essential for a robust and stable security design of a system to mitigate the risk of external attacks and thus improve its efficiency.  ...  Based on these findings this paper will illustrate the best possible cryptography algorithms which will be most suited to implement the security aspects of the WSN and protect it from any threat and reduce  ...  LIGHTWEIGHT CRYPTOGRAPHY The main crux of the word 'lightweight' cryptography reflects the adaptation of a simplified version of the standard techniques of cryptography by compressing the input sizes and  ... 
arXiv:2107.01810v1 fatcat:ziqggxqzlbdzbmhcumgtlnkxpe

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

Vishal A. Thakor, Mohammad Abdur Razzaque, Muhammad R. A. Khandaker
2021 IEEE Access  
The communication from such devices can be secured by a mean of lightweight cryptography, a lighter version of cryptography.  ...  Also, we have discussed the demand and a direction for new research in the area of lightweight cryptography to optimize balance amongst cost, performance and security.  ...  The designed and developed by the government of the Soviet Union (1989), the lightweight version of GOST executes on 64-bit input with a 256-bit key for 32 times.  ... 
doi:10.1109/access.2021.3052867 fatcat:lidatyjdtrh4jirpxnnvgwsupi

Towards Lightweight Error Detection Schemes for Implementations of MixColumns in Lightweight Cryptography [article]

Anita Aghaie, Mehran Mozaffari Kermani, Reza Azarderakhsh
2018 arXiv   pre-print
In this paper, through considering lightweight cryptography, we present a comparative realization of MDS matrices used in the VLSI implementations of lightweight cryptography.  ...  We note that one other contribution of this work is to consider not only linear error detecting codes but also recomputation mechanisms as well as fault space transformation (FST) adoption for lightweight  ...  lightweight cryptography, we present a comparative realization of MDS matrices used in the VLSI implementations of lightweight cryptography.  ... 
arXiv:1804.06480v1 fatcat:36r3vfcbrzcpxa5bps6zp366kq

ASIC Implementation of Present Cipher for IoT Application

Anitha Kumari S, Mahalinga V Mandi
2019 Zenodo  
Nowadays, Lightweight Cryptography is gaining importance in the field of data or information security as the number of smart devices are increasing and the information shared between them are being subjected  ...  In this paper ASIC implementation of PRESENT Cipher and its methodology is discussed. The simulation, synthesis and physical design of PRESENT cipher is performed using Cadence.  ...  The small devices having constrained environment uses lightweight cryptography in prior [1, 2] . An example of Lightweight cryptographic algorithm is PRESENT Cipher.  ... 
doi:10.5281/zenodo.3406945 fatcat:dnpulmeixrem7f6rd5yfx7eo3u

Lightweight Cryptography for Embedded Systems – A Comparative Analysis [chapter]

Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Konstantinos Rantos
2014 Lecture Notes in Computer Science  
Therefore, the confidentiality and integrity of the resources and services of said devices constitutes a prominent issue that must be considered during their design.  ...  This paper provides a comparative analysis of lightweight cryptographic algorithms applicable to such devices, presenting recent advances in the field for symmetric and asymmetric algorithms as well as  ...  The absence of decryption is another factor that can reduce the requirements of such ciphers, especially for ultra-lightweight cryptography.  ... 
doi:10.1007/978-3-642-54568-9_21 fatcat:parncxw2ynhfzpxnx22iwo52ga

A New Lightweight Stream Cipher Based on Chaos

Lina Ding, Chunyuan Liu, Yanpeng Zhang, Qun Ding
2019 Symmetry  
Many analyses are made from the angle of entropy in order to verify the cryptographic characteristics of the stream cipher, and National Institute of Standards and Technology (NIST) statistical test is  ...  This design can be used for efficient encryption in resource-constrained devices or environments.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym11070853 fatcat:gw6filhqqzdptgx3fki2mqcnw4

ULCL - An Ultra-lightweight Cryptographic Library for Embedded Systems

George Hatzivasilis, Apostolos Theodoridis, Elias Gasparis, Charalampos Manifavas
2014 Proceedings of the 4th International Conference on Pervasive and Embedded Computing and Communication Systems  
The evolution of embedded systems and their applications in every daily activity, derive the development of lightweight cryptography.  ...  One of the main novelties is the configurable compilation process. A user can compile the exact set of crypto-primitives that are required to implement a lightweight application.  ...  DES, 3DES and Clefia are designed for lightweight cryptography on embedded systems and support high and moderate level of security, lower throughput and consume less computational resources.  ... 
doi:10.5220/0004900602470254 dblp:conf/peccs/HatzivasilisTGM14 fatcat:aznuz5cqrvgy5cnsmlxlc5hibu


S.B. Thorat
2017 International Journal of Advanced Research in Computer Science  
There are several ways for designing a lightweight authentication protocol, researchers are competing to find the best ways that fit with the features of the Internet of Things.  ...  Finally, we provide a comparative study of using symmetric and asymmetric cryptography techniques for designing lightweight authentication protocols for IoT.  ...  SECURITY FEATURES FOR A LIGHTWEIGHT AUTHENTICATION PROTOCOL A. security requirements when designing an authentication protocol certain security requirements must be considered, the design goal of a lightweight  ... 
doi:10.26483/ijarcs.v8i7.4050 fatcat:elsoltly65awjfhfwbck7v7zjy

A Survey on Various Lightweight Cryptographic Algorithms on FPGA

Chaitra B, Kiran Kumar. V, Shatharama Rai C
2017 IOSR Journal of Electronics and Communication Engineering  
The focus in this paper would be on Lightweight symmetric crytography.  ...  Lightweight cryptography is used for resource-limited devices such as radio frequency identification (RFID) tags, contactless smart cards and wireless sensor network.  ...  Present Every design of the lightweight cryptography must suit better security, efficiency and minimum cost.  ... 
doi:10.9790/2834-1201025459 fatcat:becbxotwqfewtd5mocnu25aqrq

Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey [article]

Muhammad Rana, Quazi Mamun, Rafiqul Islam
2020 arXiv   pre-print
Furthermore, various research challenges of lightweight cryptography have been addressed.  ...  In this paper, we discuss the state of the art lightweight cryptographic protocols for IoT networks and present a comparative analysis of the existing protocols.  ...  Lightweight cryptography needs to consider those limitations while designing and implementing an IoT network.  ... 
arXiv:2010.00852v1 fatcat:mzz2bxhwcvdhbl3nlf5zbvrcgy

Life-logging in smart environments: Challenges and security threats

Nikolaos E. Petroulakis, Ioannis G. Askoxylakis, Theo Tryfonas
2012 2012 IEEE International Conference on Communications (ICC)  
As the need for secure and trustworthy life-logging in smart environments is vital, a lightweight approach has to be considered to overcome the constraints of smart objects.  ...  The purpose of this paper is to detail current topics of life-logging in smart environments while describing interconnection issues, security threats and suggesting a lightweight framework for ensuring  ...  We describe the basic pillars of this framework including the use of lightweight IP protocols, lightweight privacy by design and the use of lightweight cryptography. A.  ... 
doi:10.1109/icc.2012.6364934 dblp:conf/icc/PetroulakisAT12 fatcat:lb3qfopyczcpvaiquihjp2uqoy

Types of Lightweight Cryptographies in Current Developments for Resource Constrained Machine Type Communication Devices: Challenges and Opportunities

Shafi Ullah, Raja Zahilah, Ilyas Khan, A. Alshehri, T.M. Yazdani
2022 IEEE Access  
This paper offers in-depth studies on different types and techniques of hardware and software-based lightweight cryptographies for machine-type communication devices in machine-to-machine communication  ...  Machine-type communication devices have become a vital part of the autonomous industrial internet of things and industry 4.0.  ...  ACKNOWLEDGMENT Tulha Moaiz Yazdani would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project R-2022-84.  ... 
doi:10.1109/access.2022.3160000 fatcat:fub6ilfhhrhndfwtsrfugwp5nm
« Previous Showing results 1 — 15 out of 6,640 results