SlideShare a Scribd company logo
1 of 17
Proposed Lightweight
Block Cipher Algorithm for
Securing Internet of Things
By:
Seddiq Q. Abd Al-Rahman
Prof. Dr. Ali Makki Sagheer
Dr. Omar A. Dawood
The 3rd International Conference
on Computing, Communications,
and Information Technology
24-25 April 2019
Outline
 Internet of Things
 Lightweight cryptographic Cipher
 The Proposed Algorithm
 The Encryption Process
 Shifting Layer
 MixColumn Layer
 Key Scheduling
 The Decryption Process
 The Analysis of Algorithm
 Expermental Results
 Conclusion & Future Works
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The of Internet of Things (IoT) is a copy of
possibility for the computer applications
everywhere.
• It has become an inevitable fact and widely
applied to life style applications such as
smart grid, intelligent transportation, smart
security, and smart home.
• In addition to these applications, Access
cards, bus cards, and some other small
applications are applied.
Internet of Things
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
Internet of Things
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The aim of applied lightweight cryptography is to
use it in equipment with limited requirements
(memory, power, size).
• Lightweight cipher compensate and make
tradeoffs among security, cost, and performance
metrics.
• There are some design conditions, that should
taken into account such as low cost of hardware,
low power consumption, and small amount of
memory and etc .
• This is represents the main challenge in our
design to provide security margin in such a low-
end device with restricted environment.
Lightweight Cryptographic
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
Lightweight Cryptographic
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• Block Data: 64-bit
• Length of Secret Key: 64-bit
• Structure: balance Feistel network.
• Round Key: 32-bit
• No. Rounds: 24 rounds.
The Proposed Algorithm (1-2)
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
The Proposed Algorithm (2-2)
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
New
bit
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Old
Bit
31 30 29 28 23 22 21 20 7 6 5 4 27 26 25 24
New
bit
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Old
bit
15 14 13 12 3 2 1 0 11 10 9 8 19 18 17 16
Shifting Layer
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
1. The state is collected as a matrix in (4×2)
half bytes.
2. The columns of MDS are consider as
polynomials over GF(24) and multiply modulo of
(x4+x3+x2+1) with a fixed polynomial.
3. The result matrix (4×2) by multiply
polynomial matrix (4×4) with the text matrix
(4×2).
4. Return the text one-
Dimensional bitwise
matrix.
MixColumn Layer
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
The key schedule takes a 64-bit key as input.
The round key Rki at every round is derived
from three steps to be generated: left cyclic
shift, S-box and bitwise NOT.
K = k0 … k63
for i = 0 to 23 do
<<<12
S-Box(K)
NOT (K)
Rki  K
end for
Key Scheduling
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The Decryption Process are performed on the
left side of the algorithm, unlike the encryption
process.
• The main operations lie in the (F) function with
made the same order and the same values as in
the encryption process but with different
processes in each operation.
• The same S-box is used in the Subbyte
operation because with self-inverse.
• The bits in shifting operation must be returned
with the actions used in the encryption operation.
The Decryption Process
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The proposed algorithm is designed in regarding to the
restricted hardware resources that fit to the IoT
applications.
• The 64-bit key that makes a powerful analytical process that
scheduling with a little time (high key agility).
• This cipher utilizes an elegant structure, in the form of key
dependent S-box, that make an unusual dependency
among the structure and the key scheduling for subkeys.
• An efficient combination of S-box and MixColumn
operations was proposed with the same structure to reduce
the resources.
• The proposal model adopts the Feistel structure with high
speed implementation in encryption and decryption
structure.
Expremintal Analysis
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• NIST statistical tests are used to test the strength of the
proposed cipher. All the tests have been applied to the
algorithm and give a reasonable results .
Results
Test Name Proposed Algorithm
Frequency (monobit) test 0.073100
Frequency test within a block 0.815961
Runs test 0.134389
Cumulative sums
(Cusum) test
REVERSE 0.137790
FORWARD 0.196863
Test for the longest run of ones in a block 1.000000
Serial test P-v1 0.113246
P-v2 0.419500
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The algorithm is implemented by PC
computer of Intel Core i7-4600u at 2.10 GHz
processor using Visual Studio .NET C#
language with a total execution time of
0.002003 ms for 64-bits.
• The proposed algorithm is worked with 64-bit,
that meaning the probability of (264) is equal
to 18446744073709551616. So, the
attackers will need much time and will face
high complexity to break the ciphertext.
Results
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The internal round transformation encrypts and
decrypts data with the same invertible operations.
• The proposed structure works to balance among the
triples constraints of the lightweight design Cost,
Performance and Security factors.
• The proposed cipher submitted a reasonable security
level and high-speed implementation with low amount
of memory requirement.
• It is highly recommended to Implement the proposed
lightweight cipher on embedded devices like FPGA,
ASIC, and others.
• Recommended to Compute the required number of GE
and the power consumption, regarding to the proposed
cipher operations on FPGA and ASIC.
Conclusion & Future Works
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search

More Related Content

What's hot

What's hot (20)

DES.ppt
DES.pptDES.ppt
DES.ppt
 
Graph coloring using backtracking
Graph coloring using backtrackingGraph coloring using backtracking
Graph coloring using backtracking
 
Lecture 2 more about parallel computing
Lecture 2   more about parallel computingLecture 2   more about parallel computing
Lecture 2 more about parallel computing
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
Dataflow Analysis
Dataflow AnalysisDataflow Analysis
Dataflow Analysis
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Block ciphers &amp; public key cryptography
Block ciphers &amp; public key cryptographyBlock ciphers &amp; public key cryptography
Block ciphers &amp; public key cryptography
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Feistel cipher
Feistel cipherFeistel cipher
Feistel cipher
 
Crypto With OpenSSL
Crypto With OpenSSLCrypto With OpenSSL
Crypto With OpenSSL
 
Blow fish final ppt
Blow fish final pptBlow fish final ppt
Blow fish final ppt
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Encryption
EncryptionEncryption
Encryption
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Tsp branch and bound
Tsp branch and boundTsp branch and bound
Tsp branch and bound
 

Similar to Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things

Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISHARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISijcisjournal
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map andjpstudcorner
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd Iaetsd
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...Kumar Goud
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldSiri Murthy
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsIRJET Journal
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate  arrayLightweight ANU-II block cipher on field programmable gate  array
Lightweight ANU-II block cipher on field programmable gate arrayIJECEIAES
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field AJAL A J
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...Nikhil Jain
 
Information and network security 19 feistel cipher
Information and network security 19 feistel cipherInformation and network security 19 feistel cipher
Information and network security 19 feistel cipherVaibhav Khanna
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 

Similar to Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things (20)

Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
 
A04660105
A04660105A04660105
A04660105
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISHARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate  arrayLightweight ANU-II block cipher on field programmable gate  array
Lightweight ANU-II block cipher on field programmable gate array
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field
 
59
5959
59
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
 
Information and network security 19 feistel cipher
Information and network security 19 feistel cipherInformation and network security 19 feistel cipher
Information and network security 19 feistel cipher
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 

Recently uploaded

Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptMAESTRELLAMesa2
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Types of different blotting techniques.pptx
Types of different blotting techniques.pptxTypes of different blotting techniques.pptx
Types of different blotting techniques.pptxkhadijarafiq2012
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Caco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorptionCaco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorptionPriyansha Singh
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 

Recently uploaded (20)

CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.ppt
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Types of different blotting techniques.pptx
Types of different blotting techniques.pptxTypes of different blotting techniques.pptx
Types of different blotting techniques.pptx
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Caco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorptionCaco-2 cell permeability assay for drug absorption
Caco-2 cell permeability assay for drug absorption
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 

Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things

  • 1. Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things By: Seddiq Q. Abd Al-Rahman Prof. Dr. Ali Makki Sagheer Dr. Omar A. Dawood The 3rd International Conference on Computing, Communications, and Information Technology 24-25 April 2019
  • 2. Outline  Internet of Things  Lightweight cryptographic Cipher  The Proposed Algorithm  The Encryption Process  Shifting Layer  MixColumn Layer  Key Scheduling  The Decryption Process  The Analysis of Algorithm  Expermental Results  Conclusion & Future Works Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 3. • The of Internet of Things (IoT) is a copy of possibility for the computer applications everywhere. • It has become an inevitable fact and widely applied to life style applications such as smart grid, intelligent transportation, smart security, and smart home. • In addition to these applications, Access cards, bus cards, and some other small applications are applied. Internet of Things Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 4. Internet of Things Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 5. • The aim of applied lightweight cryptography is to use it in equipment with limited requirements (memory, power, size). • Lightweight cipher compensate and make tradeoffs among security, cost, and performance metrics. • There are some design conditions, that should taken into account such as low cost of hardware, low power consumption, and small amount of memory and etc . • This is represents the main challenge in our design to provide security margin in such a low- end device with restricted environment. Lightweight Cryptographic Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 6. Lightweight Cryptographic Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 7. • Block Data: 64-bit • Length of Secret Key: 64-bit • Structure: balance Feistel network. • Round Key: 32-bit • No. Rounds: 24 rounds. The Proposed Algorithm (1-2) Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 8. The Proposed Algorithm (2-2) Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 9. New bit 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Old Bit 31 30 29 28 23 22 21 20 7 6 5 4 27 26 25 24 New bit 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Old bit 15 14 13 12 3 2 1 0 11 10 9 8 19 18 17 16 Shifting Layer Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 10. 1. The state is collected as a matrix in (4×2) half bytes. 2. The columns of MDS are consider as polynomials over GF(24) and multiply modulo of (x4+x3+x2+1) with a fixed polynomial. 3. The result matrix (4×2) by multiply polynomial matrix (4×4) with the text matrix (4×2). 4. Return the text one- Dimensional bitwise matrix. MixColumn Layer Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 11. The key schedule takes a 64-bit key as input. The round key Rki at every round is derived from three steps to be generated: left cyclic shift, S-box and bitwise NOT. K = k0 … k63 for i = 0 to 23 do <<<12 S-Box(K) NOT (K) Rki  K end for Key Scheduling Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 12. • The Decryption Process are performed on the left side of the algorithm, unlike the encryption process. • The main operations lie in the (F) function with made the same order and the same values as in the encryption process but with different processes in each operation. • The same S-box is used in the Subbyte operation because with self-inverse. • The bits in shifting operation must be returned with the actions used in the encryption operation. The Decryption Process Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 13. • The proposed algorithm is designed in regarding to the restricted hardware resources that fit to the IoT applications. • The 64-bit key that makes a powerful analytical process that scheduling with a little time (high key agility). • This cipher utilizes an elegant structure, in the form of key dependent S-box, that make an unusual dependency among the structure and the key scheduling for subkeys. • An efficient combination of S-box and MixColumn operations was proposed with the same structure to reduce the resources. • The proposal model adopts the Feistel structure with high speed implementation in encryption and decryption structure. Expremintal Analysis Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 14. • NIST statistical tests are used to test the strength of the proposed cipher. All the tests have been applied to the algorithm and give a reasonable results . Results Test Name Proposed Algorithm Frequency (monobit) test 0.073100 Frequency test within a block 0.815961 Runs test 0.134389 Cumulative sums (Cusum) test REVERSE 0.137790 FORWARD 0.196863 Test for the longest run of ones in a block 1.000000 Serial test P-v1 0.113246 P-v2 0.419500 Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 15. • The algorithm is implemented by PC computer of Intel Core i7-4600u at 2.10 GHz processor using Visual Studio .NET C# language with a total execution time of 0.002003 ms for 64-bits. • The proposed algorithm is worked with 64-bit, that meaning the probability of (264) is equal to 18446744073709551616. So, the attackers will need much time and will face high complexity to break the ciphertext. Results Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 16. • The internal round transformation encrypts and decrypts data with the same invertible operations. • The proposed structure works to balance among the triples constraints of the lightweight design Cost, Performance and Security factors. • The proposed cipher submitted a reasonable security level and high-speed implementation with low amount of memory requirement. • It is highly recommended to Implement the proposed lightweight cipher on embedded devices like FPGA, ASIC, and others. • Recommended to Compute the required number of GE and the power consumption, regarding to the proposed cipher operations on FPGA and ASIC. Conclusion & Future Works Proposed Lightweight Block Cipher for Securing Internet of Things Title search