PriPresent: an embedded prime LightWeight block cipher for smart devices
- PDF / 2,635,373 Bytes
- 11 Pages / 595.276 x 790.866 pts Page_size
- 79 Downloads / 279 Views
PriPresent: an embedded prime LightWeight block cipher for smart devices M. Girija 1 & P. Manickam 2
&
M. Ramaswami 3
Received: 26 June 2020 / Accepted: 21 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Lightweight cryptography (LWC) is a compact and advancing cryptography protocol. Internet of Things (IoT) is a cutting edge technology which is developed for resource constrained devices for communicating and sharing of information among fellow devices over internet. IoT smart objects are smallest tiny devices and it has limited processing and storage capacities and that often runs on small, low power, battery. IoT devices have many issues and challenges due to inherent properties of IoT and one of the major challenges is security. Success of IoT depends on how smart devices countermeasure the different security attacks. There are many cryptographic algorithms with different services are exist. Each one has some unique properties as well as limitations or constraints. After studying these cryptographic algorithms, the authors decided to propose a new lightweight block cipher, PriPresent. Also, this paper depicts the comparison results of proposed cipher with existing cipher over different metrics. Keywords LWC . PriPresent . Integrity . Prime number . Attacks
Abbreviations h1e hash value of text at encryption h2e hash value of credentials at encryption h hash function H Hash value of h1e and h2e h1d hash value of text at decryption h2d hash value of credentials at decryption IRt Identity of tag IRr Identity of reader St Tag sequence number This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications Guest Editor: Ching-Hsien Hsu * M. Girija [email protected]
Sr Ct CK M E D Au ⨁ Rt Rr DBS II Id CH1, CHn Rrt D T
Reader sequence number Cipher text Cipher key message Encryption Decryption Authentication Exclusive-OR Operation Registration of RFID Tag Registration of RFID Reader Data Base Server Concatenation operation Identity of device Confidentiality tied with authentication Registration of Tag and Reader Date Time
P. Manickam [email protected] M. Ramaswami [email protected]
1 Introduction
1
Department of Computer Science, The American College, Madurai, India
2
Department of Computer Science, Thiagarajar College, Madurai, India
3
Department of Computer Applications, Madurai Kamaraj University, Madurai, India
Due to the rapid development of semiconductor and communication devices, new technologies are emerging day by day. Internet of Things (IoT) is a state-of-the-art technology that has recently become familiar with its abundant applications as shown in Fig.1. IoT [1–8] is a technology which assists the smart objects to communicate with one another. These objects
Peer-to-Peer Netw. Appl.
Fig. 1. IoT Applications
are heterogeneous type smart objects such as electronic gadgets, embedded systems and sensors. IoT makes objects into smart by technology which in turn sends data periodically to ot
Data Loading...