SlideShare a Scribd company logo
1 of 16
1ST Annual
International
Conference on
Information and
Sciences
NOV. 20TH - 21TH ,
2018
FALLUJAH / IRAQ
IEEE Record # 46152
NVLC: New Variant Lightweight
Cryptography Algorithm for
Internet of Things
Seddiq Q. Abd Al-Rahman
University Of Anbar
Ali Makki Sagheer
Al-Qalam University College
Omar A. Dawood
University Of Anbar
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
Outline
Introduction
Friday, November 23, 2018 all rights are save University of Fallujah @2018 2
The Proposed Algorithm
The Encryption Algorithm
MixCol & Shifting Layers
The Decryption Algorithm
Analysis Algorithm
Results & Conclusion
References
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
Introduction (1-2)
The design of Internet of Things (IoT) is a copy of the
computer everywhere possible. The spread of RFID,
sensors and embedded systems is increasing in cars,
smartphones, and others. It has become an inevitable
fact that IoT is widely applied to social life applications
such as smart grid, intelligent transportation, smart
security, and smart home “as shown in fig. below”. In
addition to these applications, Access cards, bus cards,
and some other small applications are applied.
Friday, November 23, 2018 all rights are save University of Fallujah @2018 3
IoT
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
Introduction (2-2)
Lightweight cryptographic model was an algorithm tailored
for implementation in limited environments devices.
However, the aim of applied lightweight cryptography is to
use it in equipment with limited requirements (memory,
power, size). Also, lightweight cipher must cope with the
tradeoffs among security, cost, and performance as shown
in fig below. Moreover, there is a real problem to provide
security in such a low-end device. There are some design
conditions, such as constrained environment must have a
small footprint, low power, and energy consumption, and
satisfactory speed.
Friday, November 23, 2018 all rights are save University of Fallujah @2018 4
PerformanceCost
Security
Architecture
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
The Proposed Algorithm
The proposed cipher inherited most of its main
characteristics from the previous developed cipher
likewise. These structures specify the general form of the
work of the algorithm.
Friday, November 23, 2018 all rights are save University of Fallujah @2018 5
Type: Symmetric block cipher
Structure: Substitution Permutation Network
Data size: 64-bit
Key length: 80-bit or 128-bit
No. of rounds: 6 rounds is enough to maintain the
security of data, and to increase the data security we can
applying 20 rounds.
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
The Encryption Algorithm
Friday, November 23, 2018 all rights are save University of Fallujah @2018 6
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
MixCol & Shifting Layers
1. The text is collected as a matrix in (4×2) bytes.
2. The columns of MDS are consider as polynomials over
GF(28) and multiply modulo of (x4+1) with a fixed
polynomial.
3. The result matrix (4×2) by multiply polynomial matrix
(4×4) with the text matrix (4×2).
4. Return the text one-dimension bitwise matrix.
Friday, November 23, 2018 all rights are save University of Fallujah @2018 7
Shifting Layer
MixCol Layers
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
The Decryption Algorithm
Friday, November 23, 2018 all rights are save University of Fallujah @2018 8
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
Analysis Algorithm
• While keeping the dimensions of the
lightweight cryptography, proposed
algorithm designs aim to offer a high level
of security.
• The cipher is designed adopting the theory
of provable security against differential and
linear cryptanalysis.
• The suggested cipher presents a full
diffusion feature to prevent shortcut attack
accumulation.
• The power was consumed in NVLC
algorithm is 1.83 µW with the frequency of
100 KHz
Friday, November 23, 2018 all rights are save University of Fallujah @2018 9
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
Results & Conclusion (1-2)
Friday, November 23, 2018 all rights are save University of Fallujah @2018 10
Algorithm Key
Block
size
S-Box
Area in
GE
Power
Consumption
AES-128 128 128 256 3600 0.35 µm
DESL 56 64 8×16 2310 0.18 µm
Hummingbird 128 16 4×16 2159 0.13 µm
PRESENT-80 80 64 16 (4 group) 1570 0.18 µm
SFN 64 64 16 1877 0.18 µm
NVLC 80 64 16 1134 1.13 µm
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
Results & Conclusion (2-2)
Friday, November 23, 2018 all rights are save University of Fallujah @2018 11
1. The goal of NVLC has been a lightweight cipher that
applied with a high level of security in the low-
resource device.
2. The proposed is described the new block cipher
called NVLC, uses round function can be repeated as
many times as necessary for more security.
3. The algorithm worked with block symmetric cipher
64-bit and 80-bit/128-bit of the key used SPN
structure.
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
References (1 - 5)
• X. Yao, Z. Chen, and Y. Tian, “A lightweight attribute-
based encryption scheme for the Internet of Things,”
Futur. Gener. Comput. Syst., vol. 49, pp. 104–112, 2015.
• M. favas, C. Fysarakis, K. Papanikolaou,“ a survey of EU
research efforts. Security and Communication
Networks,” A. Papaefstathiou Embedded systems
security, Vol. 8, Iss 11, pp2016-2036, 2015.
• S. N. Swamy, D. Jadhav, and N. Kulkarni, “Security
threats in the application layer in IOT applications,” Proc.
Int. Conf. IoT Soc. Mobile, Anal. Cloud, I-SMAC 2017,
pp. 477–480, 2017.
• O. Oualha, N .Nuha, K. Nguyen, "Light-weight Attribute-
Based Encryption for the Internet of Things," In
Computer Communication and Networks (ICCCN), 25th
International Conference IEEE, USA, pp. 1-6, 2016.
• Cryptrec, “CRYPTREC Cryptographic Technology
Guideline (Lightweight Cryptography),” CRYPTREC
Light. Cryptogr. Work. Gr., no. March, pp. 3–7, 2017.
Friday, November 23, 2018 all rights are save University of Fallujah @2018 12
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
References (2 - 5)
• Y. Bin Zikria, M. K. Afzal, F. Ishmanov, S. W. Kim, and H.
Yu, “A survey on routing protocols supported by the
Contiki Internet of things operating system,” Futur.
Gener. Comput. Syst., vol. 82, pp. 200–219, 2018.
• Dunkelman, O., Keller, N., Shamir, A. “A Practical-Time
Related-Key Attack on the KASUMI Cryptosystem Used
in GSM and 3G Telephony. In: Rabin”, T. (ed.)
International Association for Cryptologic Research 2013,
Springer, Heidelberg, International conference on I-
SMAC, p477, 2013.
• Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C.,
Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.,
“PRESENT: an ultra-lightweight block cipher”. In: Paillier,
P., Verbauwhede, I. (eds.) CHES 2007. LNCS, Springer,
vol. 4727, pp450–466, 2007.
• H. Cheng, H. M. Heys, and C. Wang, “PUFFIN: A novel
compact block cipher targeted to embedded digital
systems,” Proc. - 11th EUROMICRO Conf. Digit. Syst.
Des. Archit. Methods Tools, DSD 2008, pp. 383–390,
2008.Friday, November 23, 2018 all rights are save University of Fallujah @2018 13
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
References (3 - 5)
• D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M.
Smith, “The hummingbird-2 lightweight authenticated
encryption algorithm,” Lect. Notes Comput. Sci.
(including Subser. Lect. Notes Artif. Intell. Lect. Notes
Bioinformatics), vol. 7055 LNCS, pp. 19–31, 2012.
• Daemen, J., Rijmen, V.: The Design of Rijndael. “AES -
The Advanced Encryption Standard”. Springer,
Heidelberg (2002), pp XVII, 238.
• Omar A. Dawood, A. M. Sagheer, and S. S. Al-Rawi,
“Design Large Symmetric Algorithm for Securing Big
Data”, 1th International Conference on the
Developments in eSystems Engineering, 2nd –5th
September 2018 Cambridge, England, UK, 978-1-5386-
6712-5/18/$31.00 ©2018 IEEE.
• A. M. Sagheer, S. S. Al-Rawi, and O. A. Dawood,
“Proposing of Developed Advanced in Encryption
Standard AES”, IEEE Computer Society DOI
10.1109/DESE, Page No. 197, 2011, The Fourth
International Conference in Developments in E System
Engineering DESE, Dubai, 2011.Friday, November 23, 2018 all rights are save University of Fallujah @2018 14
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
References (4 - 5)
• G. Leander, C. Paar, A. Poschmann, and K. Schramm,
“New Lightweight DES Variants,” Fast Softw. Encryption,
FSE 2007, Springer, LNCS, vol. 4593, pp. 196–210,
2007.
• C. De Cannière, O. Dunkelman, and M. Knežević,
“KATAN and KTANTAN - A family of small and efficient
hardware-oriented block ciphers,” Lect. Notes Comput.
Sci. (including Subser. Lect. Notes Artif. Intell. Lect.
Notes Bioinformatics), vol. 5747 LNCS, pp. 272–288,
2009.
• L. Li, B. Liu, Y. Zhou, and Y. Zou, “SFN: A new
lightweight block cipher,” Microprocess. Microsyst., vol.
60, no. December 2017, pp. 138–150, 2018.
• Omar A. Dawood, Abdul Monem S. Rahma and Abdul
Mohsen J. Abdul Hossen: The Euphrates Cipher. IJCSI
International Journal of Computer Science Issues,
Volume 12, Issue 2, March 2015, ISSN (Print): 1694-
0814 | ISSN (Online): 1694-0784.
Friday, November 23, 2018 all rights are save University of Fallujah @2018 15
05
06
07
08
04
03
02
01
NVLC: New Variant
Lightweight Cryptography
Algorithm for Internet of
Things
Title search
InternationalConference
1ST Annual International
Conference on
Information and Sciences
NOV. 20ST - 21ST , 2018
FALLUJAH / IRAQ
References (5 - 5)
• Omar A. Dawood, Abdul Monem S. Rahma and Abdul
Mohsen J. Abdul Hossen: The Euphrates Cipher. IJCSI
International Journal of Computer Science Issues,
Volume 12, Issue 2, March 2015, ISSN (Print): 1694-
0814 | ISSN (Online): 1694-0784.
• M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A.
Shah, “SIT: A Lightweight Encryption Algorithm for
Secure Internet of Things,” vol. 8, no. 1, pp. 1–10, 2017.
• Omar A. Dawood, Abdul Monem S. Rahma, Abdul
Mohssen J. Abdul Hossen: New Symmetric Cipher Fast
Algorithm of Revertible Operations' Queen (FAROQ)
Cipher. International Journal of Computer Network and
Information Security (IJCNIS), Vol.9, No.4, pp. 29-36,
2017.DOI: 10.5815/ijcnis.2017.04.04.
• Banik S., Bogdanov A., Isobe T., Shibutani K., Hiwatari
H., Akishita T., and F., “Midori: A Block Cipher for Low
Energy”, IACR-ASIACRYPT-2015, Nov 2015.
• Z. Gong, S. Nikova, and Y. Law, "KLEIN: A New Family
of Lightweight Block Ciphers RFID. Security and
Privacy." Vol. 7055, Springer Berlin / Heidelberg, 2012,
pp. 1-18.
Friday, November 23, 2018 all rights are save University of Fallujah @2018 16

More Related Content

What's hot

Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2Amélie Gyrard
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation ofcaijjournal
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...S3 Infotech IEEE Projects
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSJournal For Research
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Amélie Gyrard
 
An Open Framework for Deploying Experimental SCADA Testbed Networks
An Open Framework for Deploying Experimental SCADA Testbed NetworksAn Open Framework for Deploying Experimental SCADA Testbed Networks
An Open Framework for Deploying Experimental SCADA Testbed Networkspgmaynard
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...WilliamY3
 
7. manuscript edit sat
7. manuscript edit sat7. manuscript edit sat
7. manuscript edit satIAESIJEECS
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs IJECEIAES
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different HardwareIRJET Journal
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
 
Advanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityAdvanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityNeel Chakraborty
 

What's hot (20)

Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
An Open Framework for Deploying Experimental SCADA Testbed Networks
An Open Framework for Deploying Experimental SCADA Testbed NetworksAn Open Framework for Deploying Experimental SCADA Testbed Networks
An Open Framework for Deploying Experimental SCADA Testbed Networks
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
 
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
 
7. manuscript edit sat
7. manuscript edit sat7. manuscript edit sat
7. manuscript edit sat
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
becan
becanbecan
becan
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
 
Final report
Final reportFinal report
Final report
 
Advanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityAdvanced Cryptography for Cloud Security
Advanced Cryptography for Cloud Security
 

Similar to 1ST Annual International Conference on Information and Sciences presents "NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things

Network security ppt
Network security pptNetwork security ppt
Network security pptvidyapol01
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...IRJET Journal
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyPetar Radanliev
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)JIEMS Akkalkuwa
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyPetar Radanliev
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
 
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...IRJET Journal
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...IJECEIAES
 
apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes ...
apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes ...apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes ...
apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes ...apidays
 
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...IRJET Journal
 
10th International Conference on Networks & Communications (NetCom-2018)
10th International Conference on Networks & Communications (NetCom-2018)10th International Conference on Networks & Communications (NetCom-2018)
10th International Conference on Networks & Communications (NetCom-2018)IJNSA Journal
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp usRISC-V International
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloeSAT Journals
 
IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of...
IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of...IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of...
IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of...YuningJiang4
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
Network Security Project Ideas
Network Security Project IdeasNetwork Security Project Ideas
Network Security Project IdeasPhdtopiccom
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 

Similar to 1ST Annual International Conference on Information and Sciences presents "NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things (20)

Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum Cryptography
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum Cryptography
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
 
apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes ...
apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes ...apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes ...
apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes ...
 
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
 
10th International Conference on Networks & Communications (NetCom-2018)
10th International Conference on Networks & Communications (NetCom-2018)10th International Conference on Networks & Communications (NetCom-2018)
10th International Conference on Networks & Communications (NetCom-2018)
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
 
IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of...
IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of...IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of...
IEEE_EDOC_2018 Presentation | A Language and Repository for Cyber Security of...
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Network Security Project Ideas
Network Security Project IdeasNetwork Security Project Ideas
Network Security Project Ideas
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

1ST Annual International Conference on Information and Sciences presents "NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things

  • 1. 1ST Annual International Conference on Information and Sciences NOV. 20TH - 21TH , 2018 FALLUJAH / IRAQ IEEE Record # 46152 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Seddiq Q. Abd Al-Rahman University Of Anbar Ali Makki Sagheer Al-Qalam University College Omar A. Dawood University Of Anbar
  • 2. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ Outline Introduction Friday, November 23, 2018 all rights are save University of Fallujah @2018 2 The Proposed Algorithm The Encryption Algorithm MixCol & Shifting Layers The Decryption Algorithm Analysis Algorithm Results & Conclusion References
  • 3. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ Introduction (1-2) The design of Internet of Things (IoT) is a copy of the computer everywhere possible. The spread of RFID, sensors and embedded systems is increasing in cars, smartphones, and others. It has become an inevitable fact that IoT is widely applied to social life applications such as smart grid, intelligent transportation, smart security, and smart home “as shown in fig. below”. In addition to these applications, Access cards, bus cards, and some other small applications are applied. Friday, November 23, 2018 all rights are save University of Fallujah @2018 3 IoT
  • 4. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ Introduction (2-2) Lightweight cryptographic model was an algorithm tailored for implementation in limited environments devices. However, the aim of applied lightweight cryptography is to use it in equipment with limited requirements (memory, power, size). Also, lightweight cipher must cope with the tradeoffs among security, cost, and performance as shown in fig below. Moreover, there is a real problem to provide security in such a low-end device. There are some design conditions, such as constrained environment must have a small footprint, low power, and energy consumption, and satisfactory speed. Friday, November 23, 2018 all rights are save University of Fallujah @2018 4 PerformanceCost Security Architecture
  • 5. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ The Proposed Algorithm The proposed cipher inherited most of its main characteristics from the previous developed cipher likewise. These structures specify the general form of the work of the algorithm. Friday, November 23, 2018 all rights are save University of Fallujah @2018 5 Type: Symmetric block cipher Structure: Substitution Permutation Network Data size: 64-bit Key length: 80-bit or 128-bit No. of rounds: 6 rounds is enough to maintain the security of data, and to increase the data security we can applying 20 rounds.
  • 6. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ The Encryption Algorithm Friday, November 23, 2018 all rights are save University of Fallujah @2018 6
  • 7. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ MixCol & Shifting Layers 1. The text is collected as a matrix in (4×2) bytes. 2. The columns of MDS are consider as polynomials over GF(28) and multiply modulo of (x4+1) with a fixed polynomial. 3. The result matrix (4×2) by multiply polynomial matrix (4×4) with the text matrix (4×2). 4. Return the text one-dimension bitwise matrix. Friday, November 23, 2018 all rights are save University of Fallujah @2018 7 Shifting Layer MixCol Layers
  • 8. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ The Decryption Algorithm Friday, November 23, 2018 all rights are save University of Fallujah @2018 8
  • 9. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ Analysis Algorithm • While keeping the dimensions of the lightweight cryptography, proposed algorithm designs aim to offer a high level of security. • The cipher is designed adopting the theory of provable security against differential and linear cryptanalysis. • The suggested cipher presents a full diffusion feature to prevent shortcut attack accumulation. • The power was consumed in NVLC algorithm is 1.83 µW with the frequency of 100 KHz Friday, November 23, 2018 all rights are save University of Fallujah @2018 9
  • 10. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ Results & Conclusion (1-2) Friday, November 23, 2018 all rights are save University of Fallujah @2018 10 Algorithm Key Block size S-Box Area in GE Power Consumption AES-128 128 128 256 3600 0.35 µm DESL 56 64 8×16 2310 0.18 µm Hummingbird 128 16 4×16 2159 0.13 µm PRESENT-80 80 64 16 (4 group) 1570 0.18 µm SFN 64 64 16 1877 0.18 µm NVLC 80 64 16 1134 1.13 µm
  • 11. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ Results & Conclusion (2-2) Friday, November 23, 2018 all rights are save University of Fallujah @2018 11 1. The goal of NVLC has been a lightweight cipher that applied with a high level of security in the low- resource device. 2. The proposed is described the new block cipher called NVLC, uses round function can be repeated as many times as necessary for more security. 3. The algorithm worked with block symmetric cipher 64-bit and 80-bit/128-bit of the key used SPN structure.
  • 12. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ References (1 - 5) • X. Yao, Z. Chen, and Y. Tian, “A lightweight attribute- based encryption scheme for the Internet of Things,” Futur. Gener. Comput. Syst., vol. 49, pp. 104–112, 2015. • M. favas, C. Fysarakis, K. Papanikolaou,“ a survey of EU research efforts. Security and Communication Networks,” A. Papaefstathiou Embedded systems security, Vol. 8, Iss 11, pp2016-2036, 2015. • S. N. Swamy, D. Jadhav, and N. Kulkarni, “Security threats in the application layer in IOT applications,” Proc. Int. Conf. IoT Soc. Mobile, Anal. Cloud, I-SMAC 2017, pp. 477–480, 2017. • O. Oualha, N .Nuha, K. Nguyen, "Light-weight Attribute- Based Encryption for the Internet of Things," In Computer Communication and Networks (ICCCN), 25th International Conference IEEE, USA, pp. 1-6, 2016. • Cryptrec, “CRYPTREC Cryptographic Technology Guideline (Lightweight Cryptography),” CRYPTREC Light. Cryptogr. Work. Gr., no. March, pp. 3–7, 2017. Friday, November 23, 2018 all rights are save University of Fallujah @2018 12
  • 13. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ References (2 - 5) • Y. Bin Zikria, M. K. Afzal, F. Ishmanov, S. W. Kim, and H. Yu, “A survey on routing protocols supported by the Contiki Internet of things operating system,” Futur. Gener. Comput. Syst., vol. 82, pp. 200–219, 2018. • Dunkelman, O., Keller, N., Shamir, A. “A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. In: Rabin”, T. (ed.) International Association for Cryptologic Research 2013, Springer, Heidelberg, International conference on I- SMAC, p477, 2013. • Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C., “PRESENT: an ultra-lightweight block cipher”. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, Springer, vol. 4727, pp450–466, 2007. • H. Cheng, H. M. Heys, and C. Wang, “PUFFIN: A novel compact block cipher targeted to embedded digital systems,” Proc. - 11th EUROMICRO Conf. Digit. Syst. Des. Archit. Methods Tools, DSD 2008, pp. 383–390, 2008.Friday, November 23, 2018 all rights are save University of Fallujah @2018 13
  • 14. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ References (3 - 5) • D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, “The hummingbird-2 lightweight authenticated encryption algorithm,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 7055 LNCS, pp. 19–31, 2012. • Daemen, J., Rijmen, V.: The Design of Rijndael. “AES - The Advanced Encryption Standard”. Springer, Heidelberg (2002), pp XVII, 238. • Omar A. Dawood, A. M. Sagheer, and S. S. Al-Rawi, “Design Large Symmetric Algorithm for Securing Big Data”, 1th International Conference on the Developments in eSystems Engineering, 2nd –5th September 2018 Cambridge, England, UK, 978-1-5386- 6712-5/18/$31.00 ©2018 IEEE. • A. M. Sagheer, S. S. Al-Rawi, and O. A. Dawood, “Proposing of Developed Advanced in Encryption Standard AES”, IEEE Computer Society DOI 10.1109/DESE, Page No. 197, 2011, The Fourth International Conference in Developments in E System Engineering DESE, Dubai, 2011.Friday, November 23, 2018 all rights are save University of Fallujah @2018 14
  • 15. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ References (4 - 5) • G. Leander, C. Paar, A. Poschmann, and K. Schramm, “New Lightweight DES Variants,” Fast Softw. Encryption, FSE 2007, Springer, LNCS, vol. 4593, pp. 196–210, 2007. • C. De Cannière, O. Dunkelman, and M. Knežević, “KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5747 LNCS, pp. 272–288, 2009. • L. Li, B. Liu, Y. Zhou, and Y. Zou, “SFN: A new lightweight block cipher,” Microprocess. Microsyst., vol. 60, no. December 2017, pp. 138–150, 2018. • Omar A. Dawood, Abdul Monem S. Rahma and Abdul Mohsen J. Abdul Hossen: The Euphrates Cipher. IJCSI International Journal of Computer Science Issues, Volume 12, Issue 2, March 2015, ISSN (Print): 1694- 0814 | ISSN (Online): 1694-0784. Friday, November 23, 2018 all rights are save University of Fallujah @2018 15
  • 16. 05 06 07 08 04 03 02 01 NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things Title search InternationalConference 1ST Annual International Conference on Information and Sciences NOV. 20ST - 21ST , 2018 FALLUJAH / IRAQ References (5 - 5) • Omar A. Dawood, Abdul Monem S. Rahma and Abdul Mohsen J. Abdul Hossen: The Euphrates Cipher. IJCSI International Journal of Computer Science Issues, Volume 12, Issue 2, March 2015, ISSN (Print): 1694- 0814 | ISSN (Online): 1694-0784. • M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. Shah, “SIT: A Lightweight Encryption Algorithm for Secure Internet of Things,” vol. 8, no. 1, pp. 1–10, 2017. • Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen: New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher. International Journal of Computer Network and Information Security (IJCNIS), Vol.9, No.4, pp. 29-36, 2017.DOI: 10.5815/ijcnis.2017.04.04. • Banik S., Bogdanov A., Isobe T., Shibutani K., Hiwatari H., Akishita T., and F., “Midori: A Block Cipher for Low Energy”, IACR-ASIACRYPT-2015, Nov 2015. • Z. Gong, S. Nikova, and Y. Law, "KLEIN: A New Family of Lightweight Block Ciphers RFID. Security and Privacy." Vol. 7055, Springer Berlin / Heidelberg, 2012, pp. 1-18. Friday, November 23, 2018 all rights are save University of Fallujah @2018 16

Editor's Notes

  1. http://pixabay.com/en/man-elderly-drawing-senior-old-505353/