IoT Edge Device Security: An Efficient Lightweight Authenticated Encryption Scheme Based on LED and PHOTON

نویسندگان

چکیده

IoT devices and embedded systems are deployed in critical environments, emphasizing attributes like power efficiency computational capabilities. However, these constraints stress the paramount importance of device security, stimulating exploration lightweight cryptographic mechanisms. This study introduces a architecture for authenticated encryption tailored to requirements. The combines LED block cipher with authentication PHOTON hash function. Leveraging shared internal operations, integration bases optimizes area–performance tradeoffs, resulting reduced consumption logic footprint. is synthesized simulated using Verilog HDL, Quartus II, ModelSim, implemented on Cyclone FPGA devices. results demonstrate substantial 14% reduction area up 46.04% decrease contrast individual designs PHOTON. work highlights potential efficient solutions resource-constrained environments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward an Inverse-free Lightweight Encryption Scheme for IoT

The current IoT (Internet of Things) systems cannot provide the overhead caused by existing encryption scheme for confidentiality. Thus, the development of lightweight encryption schemes is necessary without degrading the system performance. In this paper, we introduce a well-known lightweight encryption scheme, PRINCE, and a method to enrich the message space of PRINCE by introducing XLS (eXte...

متن کامل

Hybrid Lightweight and Robust Encryption Design for Security in IoT

Pervasive computing is the emerging field that needs ultra lightweight secure designs. In this paper, we have proposed a robust hybrid structure by fusion of RECTANGLE, LED and SPECK. With the help of a hybrid design, we have improved the key scheduling aspect of LED and related key attacks which were neglected in the LED cipher. In this paper, we also aimed at providing robust architecture by ...

متن کامل

ALE: AES-Based Lightweight Authenticated Encryption

In this paper, we propose a new Authenticated Lightweight Encryption algorithm coined ALE. The basic operation of ALE is the AES round transformation and the AES-128 key schedule. ALE is an online single-pass authenticated encryption algorithm that supports optional associated data. Its security relies on using nonces. We provide an optimized low-area implementation of ALE in ASIC hardware and ...

متن کامل

Comments on the security of Chen's authenticated encryption scheme

Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.’s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these flaws. In this paper, we show that the modified schemes proposed by Chen are not secure. In parti...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app131810345