Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Lightweight Encryption Algorithm.

Artykuły w czasopismach na temat „Lightweight Encryption Algorithm”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Lightweight Encryption Algorithm”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Nyssanbayeva, Saule, Nursulu Kapalova, Armiyanbek Haumen, and Olzhas Suleimenov. "The LBC-3 lightweight encryption algorithm." Open Engineering 12, no. 1 (2022): 570–77. http://dx.doi.org/10.1515/eng-2022-0372.

Pełny tekst źródła
Streszczenie:
Abstract This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys. The main characteristics of this lightweight algorithm and all the transformations used in the encryption and decryption processes are described. The process of generating the round keys of the algorithm is also considered. The results of the study of the cryptographic properties of the algorithm using the “avalanche effect” and statistical tests are presented. The avalanche property was
Style APA, Harvard, Vancouver, ISO itp.
2

Abdul Hussien, Farah Tawfiq, Abdul Monem S. Rahma, and Hala Bahjat Abdul Wahab. "A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites." Security and Communication Networks 2021 (December 24, 2021): 1–15. http://dx.doi.org/10.1155/2021/9961172.

Pełny tekst źródła
Streszczenie:
Providing security for transmitted data through the e-commerce environment requires using a fast and high secure encryption algorithm. Balancing between the speed and the security degree is a problem that many of the encryption algorithms suffer from. Increasing the security degree requires increasing the level of complexity which results in increasing encryption time. On the other hand, increasing the algorithm speed may reduce the complexity degree which affects the security level. This paper aims to design an encryption algorithm that balances time and complexity (speed and security). This
Style APA, Harvard, Vancouver, ISO itp.
3

Dunmore, Aeryn, Juliet Samandari, and Julian Jang-Jaccard. "Matrix Encryption Walks for Lightweight Cryptography." Cryptography 7, no. 3 (2023): 41. http://dx.doi.org/10.3390/cryptography7030041.

Pełny tekst źródła
Streszczenie:
In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer example Key Matrices and show the efficiency of the proposed method, which operates in linear complexity with an extremely large key space and low-resource requirements. We also provide the Proof of Concept code for the encryption algorithm and a detailed analysis of the security of our proposed MEW. The MEW algorithm is designed for low-resource environments such as IoT or smart devices and is therefore intended to be simp
Style APA, Harvard, Vancouver, ISO itp.
4

Cherckesova, Larissa, Olga Safaryan, Pavel Razumov, Dmitry Medvedev, Veronica Kravchenko, and Yuriy Ivanov. "Analysis of block encryption algorithms being used in devices with restricted amount of technological possibilities." E3S Web of Conferences 224 (2020): 01043. http://dx.doi.org/10.1051/e3sconf/202022401043.

Pełny tekst źródła
Streszczenie:
This report is devoted to the comparative analysis of the lightweight NASH block encryption algorithm and the algorithm presented by USA National Security Agency in 2013 – SPECK. Their detailed description is given, the analysis is made. The task of the study is to investigate and analyze cryptographic encryption algorithms used in devices with limited capabilities such as microcontrollers. The study of lightweight encryption algorithms and their application for cybersecurity tasks is necessary to create the latest cryptographic systems aimed at preventing various types of attacks. The study r
Style APA, Harvard, Vancouver, ISO itp.
5

Zhang, Xing, Jian Chen, Tianning Li, Gang Dai, and Changda Wang. "LILP: A Lightweight Enciphering Algorithm to Encrypt Arbitrary-Length Messages." Symmetry 15, no. 1 (2023): 177. http://dx.doi.org/10.3390/sym15010177.

Pełny tekst źródła
Streszczenie:
The advancement of the Internet of Things (IoT) has promoted the development of embedded devices. It is important to ensure data transmission security on embedded devices with limited computing power and storage space. However, the traditional block encryption algorithm cannot run efficiently on embedded devices because of the large amount of computation. In this paper, a lightweight length-preserving-encryption algorithm (LILP) is proposed to convert an n-bit block cipher into a special block cipher that supports an arbitrary length of no less than 2n bits as input. LILP adopts the involution
Style APA, Harvard, Vancouver, ISO itp.
6

Kapalova, Nursulu, Kunbolat Algazy, and Armanbek Haumen. "Development of a new lightweight encryption algorithm." Eastern-European Journal of Enterprise Technologies 3, no. 9 (123) (2023): 6–19. http://dx.doi.org/10.15587/1729-4061.2023.280055.

Pełny tekst źródła
Streszczenie:
Lightweight encryption algorithms are considered a relatively new direction in the development of private key cryptography. This need arose as a result of the emergence of a large number of devices with little computing power and memory. Therefore, it became necessary to develop algorithms that can provide a sufficient level of security, with minimal use of resources. The paper presents a new lightweight LBC encryption algorithm. LBC is a 64–bit symmetric block algorithm. It supports 80 bit secret key. The number of rounds is 20. The algorithm has a Feistel network structure. The developed lig
Style APA, Harvard, Vancouver, ISO itp.
7

Bahrami, Saeed, and Majid Naderi. "Image Encryption Using a Lightweight Stream Encryption Algorithm." Advances in Multimedia 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/767364.

Pełny tekst źródła
Streszczenie:
Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. These tests include visual test, histogram analysis, information entropy, encryption quality, correlation analysis, differential analysis, and performance analysis. Based on this analysis, it can be concluded that the present algorithm in comparison to A5/1 a
Style APA, Harvard, Vancouver, ISO itp.
8

Fadhil, Heba Mohammed, Mohamed Elhoseny, and Baydaa M. Mushgil. "Protecting Medical Data on the Internet of Things with an Integrated Chaotic-GIFT Lightweight Encryption Algorithm." Journal of Cybersecurity and Information Management 12, no. 1 (2023): 50–66. http://dx.doi.org/10.54216/jcim.120105.

Pełny tekst źródła
Streszczenie:
The secure transmission of medical data is crucial for the protection of patients' privacy and confidentiality. With the advent of IoT in healthcare, medical data is being transmitted over networks that are vulnerable to cyberattacks. Therefore, there is an urgent need for lightweight yet secure encryption algorithms that can protect medical data in transit. In this paper, we propose an integrated Chaotic-GIFT algorithm for lightweight and robust encryption of medical data transmitted over IoT networks. The proposed algorithm combines the chaos theory with a lightweight block cipher to provide
Style APA, Harvard, Vancouver, ISO itp.
9

Tong, Xiaojun, Xudong Liu, Jing Liu, Miao Zhang, and Zhu Wang. "A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box." International Journal of Bifurcation and Chaos 31, no. 10 (2021): 2150152. http://dx.doi.org/10.1142/s0218127421501522.

Pełny tekst źródła
Streszczenie:
Due to high computational cost, traditional encryption algorithms are not suitable for the environments in which resources are limited. In view of the above problem, we first propose a combined chaotic map to increase the chaotic interval and Lyapunov exponent of the existing one-dimensional chaotic maps. Then, an S-box based on the proposed combined chaotic map is constructed. The performances of the designed S-box, such as bijection, nonlinearity, strict avalanche criteria, differential uniformity, the bits independence criterion, and the linear approximation probability, are tested to show
Style APA, Harvard, Vancouver, ISO itp.
10

Abdalrazzaq, Alaa, and Salah Alabady. "Design and Implementation of a Lightweight and Fast Tiny Advanced Encryption Standard Algorithm." Jordan Journal of Electrical Engineering 8, no. 4 (2022): 339. http://dx.doi.org/10.5455/jjee.204-1658696772.

Pełny tekst źródła
Streszczenie:
Cryptographic algorithms are gaining importance due to their relevance and importance in the areas of privacy and security experienced by the Internet of Things (IoT) devices. They improve data privacy and confidentiality by limiting who can decrypt the data to the person who has the key. Advanced encryption standard (AES) is one of the most important encryption algorithms in use. This algorithm uses 10 rounds for each encryption and decryption process and encrypts data starting with 16 bytes, which increases the time needed for encryption and decryption. In order to speed up encryption and de
Style APA, Harvard, Vancouver, ISO itp.
11

Yun, Junhyeok, and Mihui Kim. "JLVEA: Lightweight Real-Time Video Stream Encryption Algorithm for Internet of Things." Sensors 20, no. 13 (2020): 3627. http://dx.doi.org/10.3390/s20133627.

Pełny tekst źródła
Streszczenie:
Along with the recent growth of Internet of Things (IoT) security camera market, there have been a number of personal information leakage incidents from security attacks targeting such cameras. Therefore, a permutation-based video encryption algorithm was proposed to secure video streams in low-performance processors such as IoT security cameras. However, existing permutation-based video encryption algorithms are vulnerable to known-plaintext attacks since they use the same permutation list for every frame. Moreover, situation deduction based on the color composition is possible. In this paper
Style APA, Harvard, Vancouver, ISO itp.
12

Ferdush, Jannatul, Mahbuba Begum, and Mohammad Shorif Uddin. "Chaotic Lightweight Cryptosystem for Image Encryption." Advances in Multimedia 2021 (May 22, 2021): 1–16. http://dx.doi.org/10.1155/2021/5527295.

Pełny tekst źródła
Streszczenie:
Data transmission over the Internet and the personal network has been risen day by day due to the advancement of multimedia technology. Hence, it is today’s prime concern to protect the data from unauthorized access and encrypt the multimedia element as they are stored on the web servers and transmitted over the networks. Therefore, multimedia data encryption is essential. But, the multimedia encryption algorithm is complex to implement as it requires more time and memory space. For this reason, the lightweight image encryption algorithm gains popularity that requires less memory and less time
Style APA, Harvard, Vancouver, ISO itp.
13

Peng, Chunyan, Xiujuan Du, Keqin Li, and Meiju Li. "An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks." Journal of Sensors 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/8763528.

Pełny tekst źródła
Streszczenie:
We tackle a fundamental security problem in underwater acoustic networks (UANs). The S-box in the existing block encryption algorithm is more energy consuming and unsuitable for resources-constrained UANs. In this paper, instead of S-box, we present a lightweight, 8-round iteration block cipher algorithm for UANs communication based on chaotic theory and increase the key space by changing the number of iteration round. We further propose secure network architecture of UANs. By analysis, our algorithm can resist brute-force searches and adversarial attacks. Simulation results show that, compare
Style APA, Harvard, Vancouver, ISO itp.
14

A. Baker, Shatha, and Ahmed S. Nori. "Comparison of the Randomness Analysis of the Modified Rectangle Block Cipher and Original algorithm." NTU Journal of Pure Sciences 1, no. 2 (2022): 10–21. http://dx.doi.org/10.56286/ntujps.v1i2.185.

Pełny tekst źródła
Streszczenie:
In recent years, different encryption lightweight algorithms have been suggested to protect the security of data transferred across the IoT network. The symmetric key ciphers play a significant role in the security of devices, in particular block ciphers. the RECTANGLE algorithm amongst the current lightweight algorithms. Rectangle algorithm does have good encryption efficacy but the characteristics of confusion and diffusion that a cipher needed are lacking from this algorithm. Therefore, by improving the algorithm confusion and diffusion properties, we expanded Rectangle utilizing a 3D ciphe
Style APA, Harvard, Vancouver, ISO itp.
15

VULPE, Alexandru, Raluca ANDREI, Alexandru BRUMARU, and Octavian FRATU. "LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHM IMPLEMENTATION IN A MICROCONTROLLER SYSTEM." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 260–64. http://dx.doi.org/10.53477/2668-2028-21-33.

Pełny tekst źródła
Streszczenie:
Abstract: With the development of mobile devices and the advent of smartphones, the Internet has become part of everyday life. Any category of information about weather, flight schedule, etc. it is just a click away from the keyboard. This availability of data has led to a continuous increase in connectivity between devices, from any corner of the world. Combining device connectivity with systems automation allows the collection of information, its analysis and implicitly decision-making on the basis of information. Their introduction and continued expansion of devices that communicate in netw
Style APA, Harvard, Vancouver, ISO itp.
16

Imad Mhaibes, Hakeem, May Hattim Abood, and Alaa Farhan. "Simple Lightweight Cryptographic Algorithm to Secure Imbedded IoT Devices." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 20 (2022): 98–113. http://dx.doi.org/10.3991/ijim.v16i20.34505.

Pełny tekst źródła
Streszczenie:
The internet of things (IoT) revolution has been sparked by the exponential increase in connected devices caused by recent advances in wireless technology. These embedded devices gather, analyze, and send vast data via the network. Data transmission security is a primary problem in IoT networks. Several lightweight encryption/decryption algorithms have been developed for such resource-constraint devices. One of most effective and fast lightweight encryption algorithms for IoT applications is the Tiny Encryption Algorithm (TEA). TEA has few lines source of codes to implement and based on Feiste
Style APA, Harvard, Vancouver, ISO itp.
17

Rajesh, Sreeja, Varghese Paul, Varun Menon, and Mohammad Khosravi. "A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices." Symmetry 11, no. 2 (2019): 293. http://dx.doi.org/10.3390/sym11020293.

Pełny tekst źródła
Streszczenie:
Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT) revolution. Large amounts of data are captured, processed and transmitted through the network by these embedded devices. Security of the transmitted data is a major area of concern in IoT networks. Numerous encryption algorithms have been proposed in these years to ensure security of transmitted data through the IoT network. Tiny encryption algorithm (TEA) is the most attractive among all, with its lower memory utilization and ease of implementa
Style APA, Harvard, Vancouver, ISO itp.
18

Samir, Nagham, Abdelrahman Sobeih Hussein, Mohaned Khaled, et al. "ASIC and FPGA Comparative Study for IoT Lightweight Hardware Security Algorithms." Journal of Circuits, Systems and Computers 28, no. 12 (2019): 1930009. http://dx.doi.org/10.1142/s0218126619300095.

Pełny tekst źródła
Streszczenie:
Data security, privacy and authenticity are crucial in wireless data transmission. Low power consumption is the main requirement for any chip design targeting the Internet of Things (IoT) applications. In this research paper, a comparative study of eight authenticated encryption and decryption algorithms, selected from the “Competition for Authenticated Encryption: Security, Applicability and Robustness” (CAESAR), namely, ACORN, ASCON, CLOC, JOLTIK, MORUS, PRIMATEs, SCREAM and SILC, is presented. The FPGA and ASIC implementations of these eight algorithms are synthesized, placed and routed. Po
Style APA, Harvard, Vancouver, ISO itp.
19

Jeon, Il-Soo, Myung-Sik Kim, and Eun-Jun Yoon. "A lightweight authenticated encryption algorithm for RFID systems." Applied Mathematical Sciences 8 (2014): 6257–66. http://dx.doi.org/10.12988/ams.2014.48665.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Taresh, Hiba. "LT10 A LIGHTWEIGHT PROPOSED ENCRYPTION ALGORITHM FOR IOT." Iraqi Journal for Computers and Informatics 44, no. 1 (2018): 1–5. http://dx.doi.org/10.25195/ijci.v44i1.64.

Pełny tekst źródła
Streszczenie:
In this paper, algorithm (LT10) which is originally consist of four kasumi elements is proposed as a lightweight encryption algorithm, the proposed algorithm take into account that the IOT devices have a limit computation abilities and the sensitivity of smart homes and IOT network information that need to be exchanged the key length is 128 bit and the block length is 128 bit
Style APA, Harvard, Vancouver, ISO itp.
21

Al-Mejibli, Intisar, and Sura F. Ismail. "Innovative lightweight encryption algorithm for real-time video." Journal of Intelligent & Fuzzy Systems 36, no. 3 (2019): 2817–27. http://dx.doi.org/10.3233/jifs-171966.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Abd Ulkadhim, Ahmed Abd Ali. "Chaos-Modified Lightweight Present Algorithm for Image Encryption." International Journal of Engineering Research and Advanced Technology 06, no. 02 (2020): 26–30. http://dx.doi.org/10.31695/ijerat.2020.3601.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Vennela, Vasireddy. "Lightweight Cryptography Algorithms for IOT Devices." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 1678–83. http://dx.doi.org/10.22214/ijraset.2021.35358.

Pełny tekst źródła
Streszczenie:
Lightweight cryptography is a new concept for securing data more effectively while using fewer resources and providing greater throughput, conservatism, and low battery consumption. Every fraction second, the Internet of Things (IoT), which connects billions of objects, generates massive amounts of data. As the number of devices grows, so does the amount of data generated, and the security of that data becomes a concern. In IoT architecture, gadgets are essentially smaller and low-powered. Because of their complexity, traditional encryption methods are computationally expensive and take many r
Style APA, Harvard, Vancouver, ISO itp.
24

Qaid, Gamil R. S., and Nadhem Sultan Ebrahim. "A Lightweight Cryptographic Algorithm Based on DNA Computing for IoT Devices." Security and Communication Networks 2023 (May 8, 2023): 1–12. http://dx.doi.org/10.1155/2023/9967129.

Pełny tekst źródła
Streszczenie:
Internet of Things (IoT) applications are used in almost every part of our life, so it is important to protect the sensitive data and information that is transmitted over wireless networks such as images and documents. The IoT devices have limited computational resources; they are called limited devices due to their limited processors and memory size. Traditional encryption methods require a lot of computing power; therefore, it is difficult to implement traditional cryptographic algorithm on IoT processor. Finally, a new, lightweight encryption method based on the DNA sequence is proposed to
Style APA, Harvard, Vancouver, ISO itp.
25

Hasan, Mohammad Kamrul, Muhammad Shafiq, Shayla Islam, et al. "Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications." Complexity 2021 (April 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/5540296.

Pełny tekst źródła
Streszczenie:
As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been introduced that revolves around smart devicesʼ conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables and control their behavior accordingly. As evident, these
Style APA, Harvard, Vancouver, ISO itp.
26

Kanda, Guard, and Kwangki Ryoo. "Vedic Multiplier-based International Data Encryption Algorithm Crypto-Core for Efficient Hardware Multiphase Encryption Design." Webology 19, no. 1 (2022): 4581–96. http://dx.doi.org/10.14704/web/v19i1/web19304.

Pełny tekst źródła
Streszczenie:
At present, there are several pieces of research on designing and implementing new cryptographic algorithms that are lightweight and resistant to several, if not major forms of security attacks. However, some algorithms such as the International Data Encryption Algorithm (IDEA), which has been around for some time is yet to record any real threat against its functionality. To ensure its continued usage, current implementations rely on multiphase encryption where it is combined with other algorithms such as ROTation (ROT) and Data Encryption Standard (DES) for maximum security strength. Multiph
Style APA, Harvard, Vancouver, ISO itp.
27

Alghamdi, Yousef, Arslan Munir, and Jawad Ahmad. "A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution." Entropy 24, no. 10 (2022): 1344. http://dx.doi.org/10.3390/e24101344.

Pełny tekst źródła
Streszczenie:
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. However, most of the proposed methods suffer from slow encryption time or compromise on the security of the encryption to achieve faster encryption. This paper proposes a lightweight, secure, and efficient image encryption algorithm based on logistic map, permutations, and AES S-box. In the proposed algorithm, SHA-2 based on the plaintext image, a pre-shared key, and an initialization vector (IV) are used to generate the initial parameters for the logistic map. The logistic map chaotically generate
Style APA, Harvard, Vancouver, ISO itp.
28

Muhammad, Nurhidayah, and Jasni Mohamad Zain. "CONCEPTUAL FRAMEWORK FOR LIGHTWEIGHT CIPHERTEXT POLICY-ATTRIBUTE BASED ENCRYPTION SCHEME FOR INTERNET OF THINGS DEVICES." MALAYSIAN JOURNAL OF COMPUTING 4, no. 1 (2019): 237. http://dx.doi.org/10.24191/mjoc.v4i1.6107.

Pełny tekst źródła
Streszczenie:
The purpose of this paper is to propose a conceptual model for data security in the Internet of thing devices. Estimated by Jumoki in early 2018 to 2022, there will be about 18 billion connected IoT devices. Therefore many issue related to IoT devices were discussed especially data security. Cryptography with lightweight features is one of the focus area by researchers to develop a powerful cryptography scheme for IoT devices. Lightweight cryptography scheme has been discussed and proposed widely recently. There are AES, PRESENT, Hash algorithm declared as a lightweight algorithm under conside
Style APA, Harvard, Vancouver, ISO itp.
29

Al-Omari, A. H. "Lightweight Dynamic Crypto Algorithm for Next Internet Generation." Engineering, Technology & Applied Science Research 9, no. 3 (2019): 4203–8. http://dx.doi.org/10.48084/etasr.2743.

Pełny tekst źródła
Streszczenie:
Modern applications, especially real time applications, are hungry for high-speed end-to-end transmission which usually conflicts with the necessary requirements of confidential and secure transmission. In this work, a relatively fast, lightweight and attack-resistant crypto algorithm is proposed. The algorithm is a symmetric block cipher that uses a secure pre-shared secret as the first step. Then, a dynamic length key is generated and inserted inside the cipher text. Upon receiving the cipher text, the receiver extracts the key from the received cipher text to decrypt the message. In this al
Style APA, Harvard, Vancouver, ISO itp.
30

Fang, Lei, Xue Rao, Ling Li, and Huan Li. "A RFID-Based Security Authentication System Model for Electric Vehicle Charging Station." Applied Mechanics and Materials 741 (March 2015): 623–28. http://dx.doi.org/10.4028/www.scientific.net/amm.741.623.

Pełny tekst źródła
Streszczenie:
Improving the efficiency of RFID data storage and ensuring communication security is an effective way to improve the efficiency and safety of the identifying and authenticating process between charging stations and electric vehicles. Considering structure of electric vehicle charging station (EVCS) and the components of RFID system, this paper presents a charging station security authentication system model based on lightweight RFID security protocol using hybrid encryption technology. This protocol participates in the computation and storage through a reader-writer, so that it can store more
Style APA, Harvard, Vancouver, ISO itp.
31

Ghorashi, Seyed, Tanveer Zia, Yinhao Jiang, and Michael Bewong. "Software Optimisation of Lightweight Klein Encryption in the Internet of Things." Journal of Information Security and Cybercrimes Research 4, no. 2 (2021): 159–72. http://dx.doi.org/10.26735/pxae9280.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) and Wireless Sensor Network (WSN) devices are prone to security vulnerabilities, especially when they are resource constrained. Lightweight cryptography is a promising encryption concept for IoT and WSN devices, that can mitigate these vulnerabilities. For example, Klein encryption is a lightweight block cipher, which has achieved popularity for the trade-off between performance and security. In this paper, we propose one novel method to enhance the efficiency of the Klein block cipher and the effects on the Central Processing Unit (CPU), memory usage, and processi
Style APA, Harvard, Vancouver, ISO itp.
32

H. Amaran, M., M. S. Rohmad, L. H. Adnan, N. N. Mohamed, and H. Hashim. "Lightweight Security for MQTT-SN." International Journal of Engineering & Technology 7, no. 4.11 (2018): 223. http://dx.doi.org/10.14419/ijet.v7i4.11.20811.

Pełny tekst źródła
Streszczenie:
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applications and can be secured by augmenting it with a security scheme. In this work, several lightweight encryption schemes to be used in tandem with MQTT-SN were tested and analysed. The best algorithm is identified based on the speed of encryption and overall power consumption when implemented in IoT environment. It was found that L-BLOCK is the overall performer in securing MQTT-SN and should be highly considered when
Style APA, Harvard, Vancouver, ISO itp.
33

H. Amaran, M., M. S. Rohmad, L. H. Adnan, N. N. Mohamed, and H. Hashim. "Lightweight Security for MQTT-SN." International Journal of Engineering & Technology 7, no. 4.11 (2018): 262. http://dx.doi.org/10.14419/ijet.v7i4.11.21389.

Pełny tekst źródła
Streszczenie:
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applications and can be secured by augmenting it with a security scheme. In this work, several lightweight encryption schemes to be used in tandem with MQTT-SN were tested and analysed. The best algorithm is identified based on the speed of encryption and overall power consumption when implemented in IoT environment. It was found that L-BLOCK is the overall performer in securing MQTT-SN and should be highly considered when
Style APA, Harvard, Vancouver, ISO itp.
34

Maolood, Abeer Tariq, Ekhlas Khalaf Gbashi, and Eman Shakir Mahmood. "Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 4988. http://dx.doi.org/10.11591/ijece.v12i5.pp4988-5000.

Pełny tekst źródła
Streszczenie:
<span lang="EN-US">In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower power for computation such as wireless sensors, internet protocol (IP) camera and smart cards. Consequently, to support and preserve the video privacy in video surveillance system, lightweight security methods are required instead of the existing traditional encryption methods. In this paper, a new light weight stream ciph
Style APA, Harvard, Vancouver, ISO itp.
35

Muhalhal, Lamia A., and Imad S. Alshawi. "A hybrid modified lightweight algorithm for achieving data integrity and confidentiality." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 833. http://dx.doi.org/10.11591/ijece.v13i1.pp833-841.

Pełny tekst źródła
Streszczenie:
<span lang="EN-US">Encryption algorithms aim to make data secure enough to be decrypted by an attacker. This paper combines the Speck and the Salsa20 to make it difficult for an attacker to exploit any weaknesses in these two algorithms and create a new lightweight hybrid algorithm called Speck-Salsa20 algorithm for data integrity and confidentiality (SSDIC). SSDIC uses less energy and has an efficient throughput. It works well in both hardware and software and can handle a variety of explicit plaintext and key sizes. SSDIC solves the difficulties of the Speck algorithm. The sequence gen
Style APA, Harvard, Vancouver, ISO itp.
36

Park, Gi-Tae, Hyo-Joon Han, and Jae-Hwoon Lee. "Design and Implementation of Lightweight Encryption Algorithm on OpenSSL." Journal of Korean Institute of Communications and Information Sciences 39B, no. 12 (2014): 822–30. http://dx.doi.org/10.7840/kics.2014.39b.12.822.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Khompysh, A., N. A. Kapalova, and O. A. Lizunov. "CONDUCTING STATISTICAL ANALYSIS ON THE LIGHTWEIGHT ENCRYPTION ALGORITHM ISL_LWS." Вестник Алматинского университета энергетики и связи, no. 1 (2023): 150–62. http://dx.doi.org/10.51775/2790-0886_2023_60_1_150.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Gupta, Nishant, and Ankit Kumar Jain. "RSA Based Consensus Algorithm for Lightweight Private Blockchain Network." ITM Web of Conferences 54 (2023): 03003. http://dx.doi.org/10.1051/itmconf/20235403003.

Pełny tekst źródła
Streszczenie:
Consensus algorithms are essential for achieving agreement among nodes in blockchain systems. However, traditional consensus algorithms such as Proof of Work (PoW) and Proof of Stake (PoS) can be resource-intensive and unsuitable for lightweight private blockchain applications. This paper proposes using the RSA (Rivest–Shamir–Adleman) encryption algorithm as a consensus algorithm for a lightweight private blockchain in the context of a college placement system. RSA offers several advantages over traditional consensus algorithms, including simplicity, efficiency, and security. Moreover, RSA can
Style APA, Harvard, Vancouver, ISO itp.
39

Ayachi, Riadh, Ayoub Mhaouch, and Abdessalem Ben Abdelali. "Lightweight Cryptography for Network-on-Chip Data Encryption." Security and Communication Networks 2021 (May 19, 2021): 1–10. http://dx.doi.org/10.1155/2021/9943713.

Pełny tekst źródła
Streszczenie:
System-on-chip (SoC) is the main processor for most recent applications such as the Internet of things (IoT). SoCs are composed of multiple blocks that communicate with each other through an integrated router. Data routing from a block to another poses many challenges. The network-on-chip (NoC) was used for the transmission of data from a source to a destination with high reliability, high speed, low power consumption, and low hardware occupation. An NoC is composed of a router, network links (NL), and network interface (NI). The main component of the NoC, the NI, is composed of an input/outpu
Style APA, Harvard, Vancouver, ISO itp.
40

M. Abd Zaid, Mustafa, and Dr Soukaena Hassan. "Lightweight Rsa Algorithm Using Three Prime Numbers." International Journal of Engineering & Technology 7, no. 4.36 (2018): 293. http://dx.doi.org/10.14419/ijet.v7i4.36.23790.

Pełny tekst źródła
Streszczenie:
The computing devices utilized as a part of an extensive class of remote correspondence systems, for example, cell phones, remote sensor systems (WSNs), vehicular ad hoc networks (VANETs), mobile ad hoc networks (MANETs), Internet of Things (IoT), body area networks (BANs) and so on, are little and asset compelled. In the current developments of the resource constraint environments, the trend is shifted towards lightweight cryptographic algorithm. Many lightweight cryptographic algorithms have been developed and also existed algorithms are modified in terms of resource constraint environments.
Style APA, Harvard, Vancouver, ISO itp.
41

Pandey, Rajeev. "Lightweight Symmetric Encryption and Attribute Based Encryption Method to Increase Information Safety in Wireless Sensor Network." Journal of Cybersecurity and Information Management 10, no. 2 (2023): 47–56. http://dx.doi.org/10.54216/jcim.100205.

Pełny tekst źródła
Streszczenie:
Direct data transmission in a wireless sensor network raises the data transfer cost. In addition, the lifetime of sensor networks is shortened because of the rise in energy required for data exchange. As a result, data aggregation is utilized in WSN to lessen the burden of transmission costs and lengthen the useful life of the sensor networks. The sensor nodes and their collected data are vulnerable to destruction because they are broadcasting in a hostile environment. Therefore, data security is a major topic of study for WSN. Due to the limited resources of the sensor network, conventional w
Style APA, Harvard, Vancouver, ISO itp.
42

Jin, Jungha, Yewon Oh, and Keecheon Kim. "A Lightweight Block Cipher Algorithm for Secure SDN Environment." International Journal of Advanced Research in Engineering 4, no. 4 (2018): 1. http://dx.doi.org/10.24178/ijare.2018.4.4.01.

Pełny tekst źródła
Streszczenie:
Software Defined Network is a next-generation networking technology that transforms a closed network environment based on existing network vendors into a flexible, software-based, centralized management environment that can be simplified by abstracting and programming. Although these advantages can be applied to some security problems rather than existing networks, most of the security problems and vulnerabilities of existing networks are present and various attacks are taking place. In this paper, we propose a structure to enhance the security function of SDN by checking how to implement the
Style APA, Harvard, Vancouver, ISO itp.
43

Salankar, Pritam, Vinay Avasthi, and Ashutosh Pasricha. "Analysis and Validation of Lightweight Authentication Algorithm." Ingénierie des systèmes d information 27, no. 4 (2022): 637–43. http://dx.doi.org/10.18280/isi.270414.

Pełny tekst źródła
Streszczenie:
The Constrained Application Protocol (CoAP) is extensively used in several industrial Internet of Things (IoT) applications. Using heavy-weight algorithms is not feasible in resource-constrained IoT environments, and lightweight solutions are vulnerable to security attacks. The trade-off between computing cost and security strength plays a significant role in deciding the right solution. Therefore, developing a lightweight security mechanism with a higher security level is paramount. Therefore, a lightweight authentication with Two-way Encryption for Secure Transmission in CoAP Protocol (LATES
Style APA, Harvard, Vancouver, ISO itp.
44

Babulal, Choudhary Leeladevi, and Anand Sharma. "AL-TEA: Alternative Tea Algorithm for Healthcare Image in IoT." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 6 (2022): 24–30. http://dx.doi.org/10.17762/ijritcc.v10i6.5620.

Pełny tekst źródła
Streszczenie:
Millions of devices are predicted to be connected via the Internet of Things (IoT), which is a promising technology for the future. In numerous industries, interest in leveraging the Internet of Things is predicted to expand. Various IoT applications in the healthcare industry are being studied, and the potential for IoT to improve healthcare will be huge. The rise in communications is likely to result in mountains of data, posing a danger to data security. The architecture's gadgets are substantially smaller and less powerful. Due to their complexity, traditional encryption algorithms are com
Style APA, Harvard, Vancouver, ISO itp.
45

Prathiba, A., Suyash Vardhan Srivathshav, Ramkumar P. E., Rajkamal E., and Kanchana Bhaaskaran V. S. "Lightweight VLSI Architectures for Image Encryption Applications." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–23. http://dx.doi.org/10.4018/ijisp.291700.

Pełny tekst źródła
Streszczenie:
Lightweight cryptography offers significant security service in constrained environments such as wireless sensor networks and Internet of Things. The focus of this article is to construct lightweight SPN block cipher architectures with substitution box based on finite fields. The paper also details the FPGA implementation of the lightweight symmetric block cipher algorithm of SPN type with combinational S-box. Restructuring of traditional look-up-table Substitution Box (S-Box) sub-structure with a combinational logic S-box is attempted. Elementary architectures namely the basic round architect
Style APA, Harvard, Vancouver, ISO itp.
46

Lee, Sung-Won, and Kwee-Bo Sim. "Design and Hardware Implementation of a Simplified DAG-Based Blockchain and New AES-CBC Algorithm for IoT Security." Electronics 10, no. 9 (2021): 1127. http://dx.doi.org/10.3390/electronics10091127.

Pełny tekst źródła
Streszczenie:
Recently, to enhance the security of the Internet of Things (IoT), research on blockchain-based encryption algorithms has been actively conducted. However, because blockchains have complex structures and process large amounts of data, there are still many difficulties in using the conventional blockchain-based encryption algorithms in an IoT system that must have low power consumption and be ultra-lightweight. In this study, to address these problems (1) we simplified the conventional Directed Acyclic Graph (DAG)-based blockchain structure, and (2) we proposed a new Advanced Encryption Standar
Style APA, Harvard, Vancouver, ISO itp.
47

Jerusha, D., and T. Jaya. "Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing." Computer Systems Science and Engineering 42, no. 3 (2022): 1121–32. http://dx.doi.org/10.32604/csse.2022.022997.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Lee, Donggeon, Dong-Chan Kim, Daesung Kwon, and Howon Kim. "Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA." Sensors 14, no. 1 (2014): 975–94. http://dx.doi.org/10.3390/s140100975.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Singh, Pulkit, K. Abhimanyu Kumar Patro, Bibhudendra Acharya, and Rahul Kumar Chaurasiya. "Efficient hardware architectures of Lilliput lightweight algorithm for image encryption." International Journal of Ad Hoc and Ubiquitous Computing 41, no. 4 (2022): 205. http://dx.doi.org/10.1504/ijahuc.2022.126779.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Feng, YeJi, XiaoDong Liu, Shuai Jing, et al. "Optimization and Design of Key Expansion of SM4 Algorithm Based on ZYNQ." Journal of Physics: Conference Series 2296, no. 1 (2022): 012014. http://dx.doi.org/10.1088/1742-6596/2296/1/012014.

Pełny tekst źródła
Streszczenie:
Abstract As the application of "China Intelligent Manufacturing" in the field of production becomes more and more extensive, it becomes crucial to ensure the security of information interaction between production equipment. China's domestic encryption algorithm - SM4 block encryption algorithm came into being. The algorithm consists of a key expansion function and an encryption and decryption function. The key expansion function collects 128-bit keys at a time, and generates thirty-two 32-bit encryption keys after XOR operation, nonlinear permutation operation (S-box) and linear shift operatio
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!