A Lightweight Block Cipher Algorithm for Secure SDN Environment
نویسندگان
چکیده
منابع مشابه
LBlock: A Lightweight Block Cipher
In this paper, we propose a new lightweight block cipher called LBlock. Similar to many other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit. Our security evaluation shows that LBlock can achieve enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis and related-key a...
متن کاملFeW: A Lightweight Block Cipher
In this paper, we propose a new lightweight block cipher called FeW 1 which encrypts 64-bit plaintext using key size 80/128 bits and produces 64-bit ciphertext. FeW is a software oriented design with the aim of achieving high efficiency in software based environments. We use a mix of Feistel and generalised Feistel structures (referred as Feistel-M structure hereinafter) to enhance the security...
متن کاملSurvey on Lightweight Block Cipher
183 Abstract— With the rapid advances in wireless networks low-end devices, such as RFID tags, wireless sensor nodes are deployed in increasing numbers each and every day. Such devices are used in many applications and environments, leading to an ever increasing need to provide security. When choosing security algorithms for resource-limited devices the implementation cost should be taken int...
متن کاملDesign 32-bit Lightweight Block Cipher Algorithm (DLBCA)
1. Panasenko, S., & Smagin, S., “Lightweight Cryptography: Underlying Principles and Approaches”, International Journal of Computer Theory and Engineering, Vol 3 No.4, (2011). 2. S. Salim and I. Taha, "Lightweight block ciphers: comparative study," Journal of Advanced Computer Science and Technology Research (JACSTR), vol. 2, pp. 159-165, 2012. 3. J. Borghoff, et al., "PRINCE – A Low-Latency Bl...
متن کاملA Novel Architecture for Lightweight Block Cipher, Piccolo
Security and privacy are going to be the key factors for the deployment of new applications, since people will only accept these deployments if these are based on secure, trustworthy and privacy-preserving infra-structures. Cryptography plays a major role in the security of data transmission and the development of computing technology imposes stronger requirements on the cryptography schemes. L...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Research in Engineering
سال: 2018
ISSN: 2412-4362
DOI: 10.24178/ijare.2018.4.4.01