IoT Edge Device Security: An Efficient Lightweight Authenticated Encryption Scheme Based on LED and PHOTON
نویسندگان
چکیده
IoT devices and embedded systems are deployed in critical environments, emphasizing attributes like power efficiency computational capabilities. However, these constraints stress the paramount importance of device security, stimulating exploration lightweight cryptographic mechanisms. This study introduces a architecture for authenticated encryption tailored to requirements. The combines LED block cipher with authentication PHOTON hash function. Leveraging shared internal operations, integration bases optimizes area–performance tradeoffs, resulting reduced consumption logic footprint. is synthesized simulated using Verilog HDL, Quartus II, ModelSim, implemented on Cyclone FPGA devices. results demonstrate substantial 14% reduction area up 46.04% decrease contrast individual designs PHOTON. work highlights potential efficient solutions resource-constrained environments.
منابع مشابه
Toward an Inverse-free Lightweight Encryption Scheme for IoT
The current IoT (Internet of Things) systems cannot provide the overhead caused by existing encryption scheme for confidentiality. Thus, the development of lightweight encryption schemes is necessary without degrading the system performance. In this paper, we introduce a well-known lightweight encryption scheme, PRINCE, and a method to enrich the message space of PRINCE by introducing XLS (eXte...
متن کاملHybrid Lightweight and Robust Encryption Design for Security in IoT
Pervasive computing is the emerging field that needs ultra lightweight secure designs. In this paper, we have proposed a robust hybrid structure by fusion of RECTANGLE, LED and SPECK. With the help of a hybrid design, we have improved the key scheduling aspect of LED and related key attacks which were neglected in the LED cipher. In this paper, we also aimed at providing robust architecture by ...
متن کاملALE: AES-Based Lightweight Authenticated Encryption
In this paper, we propose a new Authenticated Lightweight Encryption algorithm coined ALE. The basic operation of ALE is the AES round transformation and the AES-128 key schedule. ALE is an online single-pass authenticated encryption algorithm that supports optional associated data. Its security relies on using nonces. We provide an optimized low-area implementation of ALE in ASIC hardware and ...
متن کاملComments on the security of Chen's authenticated encryption scheme
Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.’s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these flaws. In this paper, we show that the modified schemes proposed by Chen are not secure. In parti...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app131810345