SlideShare a Scribd company logo
Proposed Lightweight
Block Cipher Algorithm for
Securing Internet of Things
By:
Seddiq Q. Abd Al-Rahman
Prof. Dr. Ali Makki Sagheer
Dr. Omar A. Dawood
The 3rd International Conference
on Computing, Communications,
and Information Technology
24-25 April 2019
Outline
 Internet of Things
 Lightweight cryptographic Cipher
 The Proposed Algorithm
 The Encryption Process
 Shifting Layer
 MixColumn Layer
 Key Scheduling
 The Decryption Process
 The Analysis of Algorithm
 Expermental Results
 Conclusion & Future Works
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The of Internet of Things (IoT) is a copy of
possibility for the computer applications
everywhere.
• It has become an inevitable fact and widely
applied to life style applications such as
smart grid, intelligent transportation, smart
security, and smart home.
• In addition to these applications, Access
cards, bus cards, and some other small
applications are applied.
Internet of Things
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
Internet of Things
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The aim of applied lightweight cryptography is to
use it in equipment with limited requirements
(memory, power, size).
• Lightweight cipher compensate and make
tradeoffs among security, cost, and performance
metrics.
• There are some design conditions, that should
taken into account such as low cost of hardware,
low power consumption, and small amount of
memory and etc .
• This is represents the main challenge in our
design to provide security margin in such a low-
end device with restricted environment.
Lightweight Cryptographic
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
Lightweight Cryptographic
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• Block Data: 64-bit
• Length of Secret Key: 64-bit
• Structure: balance Feistel network.
• Round Key: 32-bit
• No. Rounds: 24 rounds.
The Proposed Algorithm (1-2)
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
The Proposed Algorithm (2-2)
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
New
bit
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Old
Bit
31 30 29 28 23 22 21 20 7 6 5 4 27 26 25 24
New
bit
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Old
bit
15 14 13 12 3 2 1 0 11 10 9 8 19 18 17 16
Shifting Layer
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
1. The state is collected as a matrix in (4×2)
half bytes.
2. The columns of MDS are consider as
polynomials over GF(24) and multiply modulo of
(x4+x3+x2+1) with a fixed polynomial.
3. The result matrix (4×2) by multiply
polynomial matrix (4×4) with the text matrix
(4×2).
4. Return the text one-
Dimensional bitwise
matrix.
MixColumn Layer
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
The key schedule takes a 64-bit key as input.
The round key Rki at every round is derived
from three steps to be generated: left cyclic
shift, S-box and bitwise NOT.
K = k0 … k63
for i = 0 to 23 do
<<<12
S-Box(K)
NOT (K)
Rki  K
end for
Key Scheduling
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The Decryption Process are performed on the
left side of the algorithm, unlike the encryption
process.
• The main operations lie in the (F) function with
made the same order and the same values as in
the encryption process but with different
processes in each operation.
• The same S-box is used in the Subbyte
operation because with self-inverse.
• The bits in shifting operation must be returned
with the actions used in the encryption operation.
The Decryption Process
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The proposed algorithm is designed in regarding to the
restricted hardware resources that fit to the IoT
applications.
• The 64-bit key that makes a powerful analytical process that
scheduling with a little time (high key agility).
• This cipher utilizes an elegant structure, in the form of key
dependent S-box, that make an unusual dependency
among the structure and the key scheduling for subkeys.
• An efficient combination of S-box and MixColumn
operations was proposed with the same structure to reduce
the resources.
• The proposal model adopts the Feistel structure with high
speed implementation in encryption and decryption
structure.
Expremintal Analysis
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• NIST statistical tests are used to test the strength of the
proposed cipher. All the tests have been applied to the
algorithm and give a reasonable results .
Results
Test Name Proposed Algorithm
Frequency (monobit) test 0.073100
Frequency test within a block 0.815961
Runs test 0.134389
Cumulative sums
(Cusum) test
REVERSE 0.137790
FORWARD 0.196863
Test for the longest run of ones in a block 1.000000
Serial test P-v1 0.113246
P-v2 0.419500
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The algorithm is implemented by PC
computer of Intel Core i7-4600u at 2.10 GHz
processor using Visual Studio .NET C#
language with a total execution time of
0.002003 ms for 64-bits.
• The proposed algorithm is worked with 64-bit,
that meaning the probability of (264) is equal
to 18446744073709551616. So, the
attackers will need much time and will face
high complexity to break the ciphertext.
Results
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The internal round transformation encrypts and
decrypts data with the same invertible operations.
• The proposed structure works to balance among the
triples constraints of the lightweight design Cost,
Performance and Security factors.
• The proposed cipher submitted a reasonable security
level and high-speed implementation with low amount
of memory requirement.
• It is highly recommended to Implement the proposed
lightweight cipher on embedded devices like FPGA,
ASIC, and others.
• Recommended to Compute the required number of GE
and the power consumption, regarding to the proposed
cipher operations on FPGA and ASIC.
Conclusion & Future Works
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
Ad

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
Alfred Ouyang
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
Marcelo Martins
 
Ike
IkeIke
Ike
shashi712
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
Mohd Arif
 
Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based Encryption
UT, San Antonio
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
DR RICHMOND ADEBIAYE
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
Eng. Mohammed Ahmed Siddiqui
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
Pavithra renu
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
Dr. Himanshu Gupta
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Feistel cipher
Feistel cipherFeistel cipher
Feistel cipher
MDKAWSARAHMEDSAGAR
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Janani S
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
Roshan Chaudhary
 
IP Security
IP SecurityIP Security
IP Security
Keshab Nath
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
Alfred Ouyang
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
Mohd Arif
 
Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based Encryption
UT, San Antonio
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
Eng. Mohammed Ahmed Siddiqui
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
Pavithra renu
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
Dr. Himanshu Gupta
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Janani S
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 

Similar to Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things (20)

Unit 2_DES Algorithm_Encryption_Decryption.pdf
Unit 2_DES Algorithm_Encryption_Decryption.pdfUnit 2_DES Algorithm_Encryption_Decryption.pdf
Unit 2_DES Algorithm_Encryption_Decryption.pdf
KanchanPatil34
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
 
A04660105
A04660105A04660105
A04660105
IOSR-JEN
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
Association of Scientists, Developers and Faculties
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISHARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
ijcisjournal
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
jpstudcorner
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
Iaetsd Iaetsd
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
Siri Murthy
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate  arrayLightweight ANU-II block cipher on field programmable gate  array
Lightweight ANU-II block cipher on field programmable gate array
IJECEIAES
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field
AJAL A J
 
59
5959
59
ieeeprojectsvadapalani
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
Nikhil Jain
 
Information and network security 19 feistel cipher
Information and network security 19 feistel cipherInformation and network security 19 feistel cipher
Information and network security 19 feistel cipher
Vaibhav Khanna
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
Unit 2_DES Algorithm_Encryption_Decryption.pdf
Unit 2_DES Algorithm_Encryption_Decryption.pdfUnit 2_DES Algorithm_Encryption_Decryption.pdf
Unit 2_DES Algorithm_Encryption_Decryption.pdf
KanchanPatil34
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISHARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
ijcisjournal
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
jpstudcorner
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
Iaetsd Iaetsd
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
Siri Murthy
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
 
Lightweight ANU-II block cipher on field programmable gate array
Lightweight ANU-II block cipher on field programmable gate  arrayLightweight ANU-II block cipher on field programmable gate  array
Lightweight ANU-II block cipher on field programmable gate array
IJECEIAES
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field
AJAL A J
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
Nikhil Jain
 
Information and network security 19 feistel cipher
Information and network security 19 feistel cipherInformation and network security 19 feistel cipher
Information and network security 19 feistel cipher
Vaibhav Khanna
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
Ad

Recently uploaded (20)

Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...
Sérgio Sacani
 
AT-03992-BRO-Aspen Plus.pdf se re quiere
AT-03992-BRO-Aspen Plus.pdf se re quiereAT-03992-BRO-Aspen Plus.pdf se re quiere
AT-03992-BRO-Aspen Plus.pdf se re quiere
LiangChenXu1
 
ICAI OpenGov Lab: A Quick Introduction | AI for Open Government
ICAI OpenGov Lab: A Quick Introduction | AI for Open GovernmentICAI OpenGov Lab: A Quick Introduction | AI for Open Government
ICAI OpenGov Lab: A Quick Introduction | AI for Open Government
David Graus
 
Lower_Limb_mcqs_copy.pdfkrrrrkrkeoeleenekspeke
Lower_Limb_mcqs_copy.pdfkrrrrkrkeoeleenekspekeLower_Limb_mcqs_copy.pdfkrrrrkrkeoeleenekspeke
Lower_Limb_mcqs_copy.pdfkrrrrkrkeoeleenekspeke
ParamiVihanga
 
Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025
Shiva Nejati
 
Preclinical Advances in Nuclear Neurology.pptx
Preclinical Advances in Nuclear Neurology.pptxPreclinical Advances in Nuclear Neurology.pptx
Preclinical Advances in Nuclear Neurology.pptx
MahitaLaveti
 
Adamson, Walter L. - Avant-Garde Florence. From Modernism to Fascism [ocr] [...
Adamson, Walter L.  - Avant-Garde Florence. From Modernism to Fascism [ocr] [...Adamson, Walter L.  - Avant-Garde Florence. From Modernism to Fascism [ocr] [...
Adamson, Walter L. - Avant-Garde Florence. From Modernism to Fascism [ocr] [...
Francisco Sandoval Martínez
 
What Are Dendritic Cells and Their Role in Immunobiology?
What Are Dendritic Cells and Their Role in Immunobiology?What Are Dendritic Cells and Their Role in Immunobiology?
What Are Dendritic Cells and Their Role in Immunobiology?
Kosheeka : Primary Cells for Research
 
SEXUAL REPRODUCTION IN FLOWERING PLANTS.pptx
SEXUAL REPRODUCTION IN FLOWERING PLANTS.pptxSEXUAL REPRODUCTION IN FLOWERING PLANTS.pptx
SEXUAL REPRODUCTION IN FLOWERING PLANTS.pptx
dhruti94
 
Eric Schott- Environment, Animal and Human Health (3).pptx
Eric Schott- Environment, Animal and Human Health (3).pptxEric Schott- Environment, Animal and Human Health (3).pptx
Eric Schott- Environment, Animal and Human Health (3).pptx
ttalbert1
 
Unit I Introduction to psychology.pptx AP
Unit I Introduction to psychology.pptx APUnit I Introduction to psychology.pptx AP
Unit I Introduction to psychology.pptx AP
kavipriya921924
 
Hardy_Weinbergs_law_and[1]. A simple Explanation
Hardy_Weinbergs_law_and[1]. A simple ExplanationHardy_Weinbergs_law_and[1]. A simple Explanation
Hardy_Weinbergs_law_and[1]. A simple Explanation
Dr Showkat Ahmad Wani
 
Artificial Intelligence_in_Chemistry_Presentation.pptx
Artificial Intelligence_in_Chemistry_Presentation.pptxArtificial Intelligence_in_Chemistry_Presentation.pptx
Artificial Intelligence_in_Chemistry_Presentation.pptx
sridevimotupalli
 
Subject name: Introduction to psychology
Subject name: Introduction to psychologySubject name: Introduction to psychology
Subject name: Introduction to psychology
beebussy155
 
Seminary Administration - Class Roll - Report.pdf
Seminary Administration - Class Roll - Report.pdfSeminary Administration - Class Roll - Report.pdf
Seminary Administration - Class Roll - Report.pdf
CludioGomesdaSilva
 
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Yasasi Abeysinghe
 
Sb- and Sn-based materials in Na-ion batteries
Sb- and Sn-based materials in Na-ion batteriesSb- and Sn-based materials in Na-ion batteries
Sb- and Sn-based materials in Na-ion batteries
MichouRatisou
 
Applications of Radioisotopes in Cancer Research.pptx
Applications of Radioisotopes in Cancer Research.pptxApplications of Radioisotopes in Cancer Research.pptx
Applications of Radioisotopes in Cancer Research.pptx
MahitaLaveti
 
FLOWER class 9 ICSE Class9 detailed.pptx
FLOWER class 9 ICSE Class9 detailed.pptxFLOWER class 9 ICSE Class9 detailed.pptx
FLOWER class 9 ICSE Class9 detailed.pptx
priyagaffoor
 
UT BIO ANS 12 SE...........................T-1.pdf
UT BIO ANS 12 SE...........................T-1.pdfUT BIO ANS 12 SE...........................T-1.pdf
UT BIO ANS 12 SE...........................T-1.pdf
srijansardar210308
 
Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...
Sérgio Sacani
 
AT-03992-BRO-Aspen Plus.pdf se re quiere
AT-03992-BRO-Aspen Plus.pdf se re quiereAT-03992-BRO-Aspen Plus.pdf se re quiere
AT-03992-BRO-Aspen Plus.pdf se re quiere
LiangChenXu1
 
ICAI OpenGov Lab: A Quick Introduction | AI for Open Government
ICAI OpenGov Lab: A Quick Introduction | AI for Open GovernmentICAI OpenGov Lab: A Quick Introduction | AI for Open Government
ICAI OpenGov Lab: A Quick Introduction | AI for Open Government
David Graus
 
Lower_Limb_mcqs_copy.pdfkrrrrkrkeoeleenekspeke
Lower_Limb_mcqs_copy.pdfkrrrrkrkeoeleenekspekeLower_Limb_mcqs_copy.pdfkrrrrkrkeoeleenekspeke
Lower_Limb_mcqs_copy.pdfkrrrrkrkeoeleenekspeke
ParamiVihanga
 
Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025
Shiva Nejati
 
Preclinical Advances in Nuclear Neurology.pptx
Preclinical Advances in Nuclear Neurology.pptxPreclinical Advances in Nuclear Neurology.pptx
Preclinical Advances in Nuclear Neurology.pptx
MahitaLaveti
 
Adamson, Walter L. - Avant-Garde Florence. From Modernism to Fascism [ocr] [...
Adamson, Walter L.  - Avant-Garde Florence. From Modernism to Fascism [ocr] [...Adamson, Walter L.  - Avant-Garde Florence. From Modernism to Fascism [ocr] [...
Adamson, Walter L. - Avant-Garde Florence. From Modernism to Fascism [ocr] [...
Francisco Sandoval Martínez
 
SEXUAL REPRODUCTION IN FLOWERING PLANTS.pptx
SEXUAL REPRODUCTION IN FLOWERING PLANTS.pptxSEXUAL REPRODUCTION IN FLOWERING PLANTS.pptx
SEXUAL REPRODUCTION IN FLOWERING PLANTS.pptx
dhruti94
 
Eric Schott- Environment, Animal and Human Health (3).pptx
Eric Schott- Environment, Animal and Human Health (3).pptxEric Schott- Environment, Animal and Human Health (3).pptx
Eric Schott- Environment, Animal and Human Health (3).pptx
ttalbert1
 
Unit I Introduction to psychology.pptx AP
Unit I Introduction to psychology.pptx APUnit I Introduction to psychology.pptx AP
Unit I Introduction to psychology.pptx AP
kavipriya921924
 
Hardy_Weinbergs_law_and[1]. A simple Explanation
Hardy_Weinbergs_law_and[1]. A simple ExplanationHardy_Weinbergs_law_and[1]. A simple Explanation
Hardy_Weinbergs_law_and[1]. A simple Explanation
Dr Showkat Ahmad Wani
 
Artificial Intelligence_in_Chemistry_Presentation.pptx
Artificial Intelligence_in_Chemistry_Presentation.pptxArtificial Intelligence_in_Chemistry_Presentation.pptx
Artificial Intelligence_in_Chemistry_Presentation.pptx
sridevimotupalli
 
Subject name: Introduction to psychology
Subject name: Introduction to psychologySubject name: Introduction to psychology
Subject name: Introduction to psychology
beebussy155
 
Seminary Administration - Class Roll - Report.pdf
Seminary Administration - Class Roll - Report.pdfSeminary Administration - Class Roll - Report.pdf
Seminary Administration - Class Roll - Report.pdf
CludioGomesdaSilva
 
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Yasasi Abeysinghe
 
Sb- and Sn-based materials in Na-ion batteries
Sb- and Sn-based materials in Na-ion batteriesSb- and Sn-based materials in Na-ion batteries
Sb- and Sn-based materials in Na-ion batteries
MichouRatisou
 
Applications of Radioisotopes in Cancer Research.pptx
Applications of Radioisotopes in Cancer Research.pptxApplications of Radioisotopes in Cancer Research.pptx
Applications of Radioisotopes in Cancer Research.pptx
MahitaLaveti
 
FLOWER class 9 ICSE Class9 detailed.pptx
FLOWER class 9 ICSE Class9 detailed.pptxFLOWER class 9 ICSE Class9 detailed.pptx
FLOWER class 9 ICSE Class9 detailed.pptx
priyagaffoor
 
UT BIO ANS 12 SE...........................T-1.pdf
UT BIO ANS 12 SE...........................T-1.pdfUT BIO ANS 12 SE...........................T-1.pdf
UT BIO ANS 12 SE...........................T-1.pdf
srijansardar210308
 
Ad

Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things

  • 1. Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things By: Seddiq Q. Abd Al-Rahman Prof. Dr. Ali Makki Sagheer Dr. Omar A. Dawood The 3rd International Conference on Computing, Communications, and Information Technology 24-25 April 2019
  • 2. Outline  Internet of Things  Lightweight cryptographic Cipher  The Proposed Algorithm  The Encryption Process  Shifting Layer  MixColumn Layer  Key Scheduling  The Decryption Process  The Analysis of Algorithm  Expermental Results  Conclusion & Future Works Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 3. • The of Internet of Things (IoT) is a copy of possibility for the computer applications everywhere. • It has become an inevitable fact and widely applied to life style applications such as smart grid, intelligent transportation, smart security, and smart home. • In addition to these applications, Access cards, bus cards, and some other small applications are applied. Internet of Things Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 4. Internet of Things Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 5. • The aim of applied lightweight cryptography is to use it in equipment with limited requirements (memory, power, size). • Lightweight cipher compensate and make tradeoffs among security, cost, and performance metrics. • There are some design conditions, that should taken into account such as low cost of hardware, low power consumption, and small amount of memory and etc . • This is represents the main challenge in our design to provide security margin in such a low- end device with restricted environment. Lightweight Cryptographic Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 6. Lightweight Cryptographic Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 7. • Block Data: 64-bit • Length of Secret Key: 64-bit • Structure: balance Feistel network. • Round Key: 32-bit • No. Rounds: 24 rounds. The Proposed Algorithm (1-2) Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 8. The Proposed Algorithm (2-2) Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 9. New bit 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Old Bit 31 30 29 28 23 22 21 20 7 6 5 4 27 26 25 24 New bit 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Old bit 15 14 13 12 3 2 1 0 11 10 9 8 19 18 17 16 Shifting Layer Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 10. 1. The state is collected as a matrix in (4×2) half bytes. 2. The columns of MDS are consider as polynomials over GF(24) and multiply modulo of (x4+x3+x2+1) with a fixed polynomial. 3. The result matrix (4×2) by multiply polynomial matrix (4×4) with the text matrix (4×2). 4. Return the text one- Dimensional bitwise matrix. MixColumn Layer Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 11. The key schedule takes a 64-bit key as input. The round key Rki at every round is derived from three steps to be generated: left cyclic shift, S-box and bitwise NOT. K = k0 … k63 for i = 0 to 23 do <<<12 S-Box(K) NOT (K) Rki  K end for Key Scheduling Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 12. • The Decryption Process are performed on the left side of the algorithm, unlike the encryption process. • The main operations lie in the (F) function with made the same order and the same values as in the encryption process but with different processes in each operation. • The same S-box is used in the Subbyte operation because with self-inverse. • The bits in shifting operation must be returned with the actions used in the encryption operation. The Decryption Process Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 13. • The proposed algorithm is designed in regarding to the restricted hardware resources that fit to the IoT applications. • The 64-bit key that makes a powerful analytical process that scheduling with a little time (high key agility). • This cipher utilizes an elegant structure, in the form of key dependent S-box, that make an unusual dependency among the structure and the key scheduling for subkeys. • An efficient combination of S-box and MixColumn operations was proposed with the same structure to reduce the resources. • The proposal model adopts the Feistel structure with high speed implementation in encryption and decryption structure. Expremintal Analysis Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 14. • NIST statistical tests are used to test the strength of the proposed cipher. All the tests have been applied to the algorithm and give a reasonable results . Results Test Name Proposed Algorithm Frequency (monobit) test 0.073100 Frequency test within a block 0.815961 Runs test 0.134389 Cumulative sums (Cusum) test REVERSE 0.137790 FORWARD 0.196863 Test for the longest run of ones in a block 1.000000 Serial test P-v1 0.113246 P-v2 0.419500 Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 15. • The algorithm is implemented by PC computer of Intel Core i7-4600u at 2.10 GHz processor using Visual Studio .NET C# language with a total execution time of 0.002003 ms for 64-bits. • The proposed algorithm is worked with 64-bit, that meaning the probability of (264) is equal to 18446744073709551616. So, the attackers will need much time and will face high complexity to break the ciphertext. Results Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 16. • The internal round transformation encrypts and decrypts data with the same invertible operations. • The proposed structure works to balance among the triples constraints of the lightweight design Cost, Performance and Security factors. • The proposed cipher submitted a reasonable security level and high-speed implementation with low amount of memory requirement. • It is highly recommended to Implement the proposed lightweight cipher on embedded devices like FPGA, ASIC, and others. • Recommended to Compute the required number of GE and the power consumption, regarding to the proposed cipher operations on FPGA and ASIC. Conclusion & Future Works Proposed Lightweight Block Cipher for Securing Internet of Things Title search