![]() The proposed system deals with an efficient implementation of Piccolo block cipher architecture that will fulfill mandatory requirements such as throughput and speed for low-resource devices like RFID tags and wireless sensors. Piccolo achieves both high security and extremely compact implementation unlike the other Feistel-type structure based lightweight block ciphers. Piccolo supports 64-bit block with 80 or 128-bit keys, and has an iterative structure which is a variant of a generalized Feistel network. Piccolo is a new lightweight block cipher which is optimized for extremely constrained devices. ![]() Symmetric-key algorithms, especially lightweight block ciphers, play an important role to provide security in these applications. In order to satisfy these needs, secure and efficient encryption and authentication schemes have to be developed. ![]() These devices are leading to an ever increasing need to provide security. Lightweight cryptography is a cryptographic algorithm or protocol tailored for implementation in constrained environments including RFID tags, sensors, contactless smart cards, health-care devices and so on. Cryptography plays a major role in the security of data transmission and the development of computing technology imposes stronger requirements on the cryptography schemes. Security and privacy are going to be the key factors for the deployment of new applications, since people will only accept these deployments if these are based on secure, trustworthy and privacy-preserving infra-structures. The work can be considered significant in the field of encrypting databases because the repetition of encrypted data inside databases is considered an important vulnerability that helps to guess the plaintext from the encrypted text. The proposed technique is robust against disclosing the repetition encrypted data based on the result of Avalanche Effect in an accepted ratio (62%) and the results of the output of the proposed encryption method have acceptable randomness based on the results of the p-values (0.629515) of the National Institute of Standards and Technology (NIST) randomness tests. Where, all elements that uses were polynomial numbers of a finite field of degree Galois Fields GF (2 8). ![]() In the hiding stage, the ciphertext was hidden into a 16×16 matrix that includes 16 sub-magic squares to eliminate the duplicates in the ciphertext. Two techniques of encrypted and hiding were executed in the encryption stage by using a magic square size 3×3 and Latin square size 3x3 to providing more permutation and also to ensure an inverse matrix of decryption operation be available. Therefore, the proposed method was established to prevent the attackers from exploiting the vulnerabilities of the redundancy in the ciphertext and enhances the substitution and permutation operations of the encryption process the solution was performed by eliminates these duplicates by hiding the ciphertext into a submatrix 4x4 that chooses randomly from magic square 16x16 in each ciphering process. Hackers should be prevented from disclosing sensitive data when sent from one device to another over the network. NVLC has an advantage in the term used low cost of gate equivalents (GE), used only 1134GE. The proposed cipher was shown the security evaluation, software, and hardware experiments to it, and results show that compares to other lightweight block ciphers. NVLC has been designed and implemented using a combination of mathematical and logical and methods considering the requirement of IoT lightweight devices and infrastructure. This paper uses a substitution-permutation network within NVLC as a uniform architecture of cryptography. Although 6 rounds of NVLC is enough to maintain data security, however, we are applying 20 rounds to increase data security and complexity of decryption. NVLC is a symmetric block cipher with a 64-bit block size data and 80-bit/128-bit for the secret key. This study aims to propose a low-cost encryption algorithm (NVLC) to handle a low-cost Radio-frequency Identification (RFID) tags and sensors within IoT environment. Considering security aspects of such a huge data, with limited resources including bandwidth and energy, requires an innovative way of securing such as data driven environment. Due to its nature, there are a huge amount of data been transmitted over IoT in every minute. The rapid industrial and technological development along with the continues need to improve lifestyle have led to the emergence of the Internet of Things (IoT) as a service.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |