The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Simon Cipher is a low complexity, symmetric cipher that was designed for pervasive computing applications, such as radio-frequency identification (RFID) and Internet of Things; however, there has not been a hardware implementation of the Simon Cipher that addresses the unique low-power and low-device count demands for RFID. We present a bit-serial hardware implementation guide and the simontool...
In order to figure out the security problem in block cipher algorithm, the principle and the key steps of the reconstruction design are studied and analyzed, including the common models and research methods. After analysis and comparison, an S-box of the encryption algorithm based scheme is proposed and demonstrated, it combines the idea of reconstruction and the mathematical function. The simulation...
LBlock is a lightweight block cipher designed for tiny computing devices, such as RFID tags and sensor network nodes. The cipher algorithm iterates a Feistel structure with SP type round function by 32 rounds. Its block size is 64 bits and key size is 80 bits. The designers show that LBlock is resistant against most classical attacks, such as differential and linear cryptanalysis. This paper proposed...
Nowadays, the trend of cryptography has focused on designing algorithms with specific features for the growing demand for privacy and security in portable communication systems with limited memory and power resources, these types of algorithms "light weight" are characterized by high performance, low cost and low power consumption which allows them to be implemented in ultralight applications...
In the past decade, we observed the trend of technological advancement towards the field of portable electronics. As electronic devices shrink in size, constraints emerge in the form of limited power supply and area for the implementation of information security mechanisms. In this work, our goal is to produce a complete AES block cipher for data encryption and perform optimization in terms of power...
This paper presents a hardware implementation of the PRINCE block cipher in Field Programmable Gate Array (FPGA). In many security applications, the software implementations of cryptographic algorithms are slow and inefficient. In order to solve the problems, a new FPGA architecture was proposed to speed up the performance and flexibility of PRINCE algorithm. The concurrent computing design allows...
Hummingbird-1 is a lightweight cryptographic algorithm appropriated for use within resource-constrained environments, which has 256-bit key and encrypt a 16-bitdata in one operation. In this paper, a cryptanalysis ofHummingbird-1 is given which shows a shortcut attack on the internal 16-bit block length, 64-bit key block cipher. The results indicate that Hummingbird-1 may not achieve the security...
The reconfigurable processors like FPGA are extensively used for cryptographic applications which have reduced the time to market of the hardware logic. This paper describes the high performance pipelined hardware implementation of RC5 algorithm in Xilinx Vertex II Pro FPGA with a 12-stage pipeline scheme that has achieved an encryption rate of 6.9 Gbps. The proposed design operates on 12 input data...
Hardware implementations of block cipher algorithms are vulnerable to differential fault attack (DFA). Traditionally, linear error detection codes are used to detect faults in protective measures. Nevertheless, we present a method using nonlinear error detection codes; architectures based on these codes have fewer undetectable errors than linear codes with the same (n, k) code. Error detecting capability...
SMS4 is the first national standard of cryptographic algorithm in China. It is a block cipher with 128 bits key. Because SMS4 is a relatively new algorithm, there are no hardware accelerators specific to it and no proposal to implement it on smart cards until now. In this paper, SMS4 was designed and implemented on smart cards. At first, the optimized implementation algorithm of SMS4 was given so...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.