The presentation of paper is published in The 3rd International Conference on Computing, Communications, and Information Technology 24-25 April 2019, Organized by College of Computer Science and IT, University of Anbar, Ramadi, Iraq
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
1. Proposed Lightweight
Block Cipher Algorithm for
Securing Internet of Things
By:
Seddiq Q. Abd Al-Rahman
Prof. Dr. Ali Makki Sagheer
Dr. Omar A. Dawood
The 3rd International Conference
on Computing, Communications,
and Information Technology
24-25 April 2019
2. Outline
Internet of Things
Lightweight cryptographic Cipher
The Proposed Algorithm
The Encryption Process
Shifting Layer
MixColumn Layer
Key Scheduling
The Decryption Process
The Analysis of Algorithm
Expermental Results
Conclusion & Future Works
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
3. • The of Internet of Things (IoT) is a copy of
possibility for the computer applications
everywhere.
• It has become an inevitable fact and widely
applied to life style applications such as
smart grid, intelligent transportation, smart
security, and smart home.
• In addition to these applications, Access
cards, bus cards, and some other small
applications are applied.
Internet of Things
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
5. • The aim of applied lightweight cryptography is to
use it in equipment with limited requirements
(memory, power, size).
• Lightweight cipher compensate and make
tradeoffs among security, cost, and performance
metrics.
• There are some design conditions, that should
taken into account such as low cost of hardware,
low power consumption, and small amount of
memory and etc .
• This is represents the main challenge in our
design to provide security margin in such a low-
end device with restricted environment.
Lightweight Cryptographic
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
7. • Block Data: 64-bit
• Length of Secret Key: 64-bit
• Structure: balance Feistel network.
• Round Key: 32-bit
• No. Rounds: 24 rounds.
The Proposed Algorithm (1-2)
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
8. The Proposed Algorithm (2-2)
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
9. New
bit
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Old
Bit
31 30 29 28 23 22 21 20 7 6 5 4 27 26 25 24
New
bit
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Old
bit
15 14 13 12 3 2 1 0 11 10 9 8 19 18 17 16
Shifting Layer
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
10. 1. The state is collected as a matrix in (4×2)
half bytes.
2. The columns of MDS are consider as
polynomials over GF(24) and multiply modulo of
(x4+x3+x2+1) with a fixed polynomial.
3. The result matrix (4×2) by multiply
polynomial matrix (4×4) with the text matrix
(4×2).
4. Return the text one-
Dimensional bitwise
matrix.
MixColumn Layer
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
11. The key schedule takes a 64-bit key as input.
The round key Rki at every round is derived
from three steps to be generated: left cyclic
shift, S-box and bitwise NOT.
K = k0 … k63
for i = 0 to 23 do
<<<12
S-Box(K)
NOT (K)
Rki K
end for
Key Scheduling
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
12. • The Decryption Process are performed on the
left side of the algorithm, unlike the encryption
process.
• The main operations lie in the (F) function with
made the same order and the same values as in
the encryption process but with different
processes in each operation.
• The same S-box is used in the Subbyte
operation because with self-inverse.
• The bits in shifting operation must be returned
with the actions used in the encryption operation.
The Decryption Process
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
13. • The proposed algorithm is designed in regarding to the
restricted hardware resources that fit to the IoT
applications.
• The 64-bit key that makes a powerful analytical process that
scheduling with a little time (high key agility).
• This cipher utilizes an elegant structure, in the form of key
dependent S-box, that make an unusual dependency
among the structure and the key scheduling for subkeys.
• An efficient combination of S-box and MixColumn
operations was proposed with the same structure to reduce
the resources.
• The proposal model adopts the Feistel structure with high
speed implementation in encryption and decryption
structure.
Expremintal Analysis
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
14. • NIST statistical tests are used to test the strength of the
proposed cipher. All the tests have been applied to the
algorithm and give a reasonable results .
Results
Test Name Proposed Algorithm
Frequency (monobit) test 0.073100
Frequency test within a block 0.815961
Runs test 0.134389
Cumulative sums
(Cusum) test
REVERSE 0.137790
FORWARD 0.196863
Test for the longest run of ones in a block 1.000000
Serial test P-v1 0.113246
P-v2 0.419500
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
15. • The algorithm is implemented by PC
computer of Intel Core i7-4600u at 2.10 GHz
processor using Visual Studio .NET C#
language with a total execution time of
0.002003 ms for 64-bits.
• The proposed algorithm is worked with 64-bit,
that meaning the probability of (264) is equal
to 18446744073709551616. So, the
attackers will need much time and will face
high complexity to break the ciphertext.
Results
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
16. • The internal round transformation encrypts and
decrypts data with the same invertible operations.
• The proposed structure works to balance among the
triples constraints of the lightweight design Cost,
Performance and Security factors.
• The proposed cipher submitted a reasonable security
level and high-speed implementation with low amount
of memory requirement.
• It is highly recommended to Implement the proposed
lightweight cipher on embedded devices like FPGA,
ASIC, and others.
• Recommended to Compute the required number of GE
and the power consumption, regarding to the proposed
cipher operations on FPGA and ASIC.
Conclusion & Future Works
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search