A Study of Implementing Efficient Rotation for ARX Lightweight Block Cipher on Low-level Microcontrollers
نویسندگان
چکیده
منابع مشابه
Survey on Lightweight Block Cipher
183 Abstract— With the rapid advances in wireless networks low-end devices, such as RFID tags, wireless sensor nodes are deployed in increasing numbers each and every day. Such devices are used in many applications and environments, leading to an ever increasing need to provide security. When choosing security algorithms for resource-limited devices the implementation cost should be taken int...
متن کاملLBlock: A Lightweight Block Cipher
In this paper, we propose a new lightweight block cipher called LBlock. Similar to many other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit. Our security evaluation shows that LBlock can achieve enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis and related-key a...
متن کاملFeW: A Lightweight Block Cipher
In this paper, we propose a new lightweight block cipher called FeW 1 which encrypts 64-bit plaintext using key size 80/128 bits and produces 64-bit ciphertext. FeW is a software oriented design with the aim of achieving high efficiency in software based environments. We use a mix of Feistel and generalised Feistel structures (referred as Feistel-M structure hereinafter) to enhance the security...
متن کاملa study on the effectiveness of task types (noticing-reformulation) on iranian low intermediate efl learners’ retention of collocations
چکیده پژوهش شبه تجربی حاضر به بررسی بکارگیری تمارین کلاسی که برانگیزنده آگاهی و توجه آگاهانه به همایندها بعنوان بخشی از یک دوره ی مکالمه زبان خارجی در یکی از آموزشگاه های زبان انگلیسی ایران است می پردازد.
Secure and efficient design of software block cipher implementations on microcontrollers
The vast diffusion of microcontrollers has led to their employment in security sensitive contexts, where the need for trusted implementations of cryptographic algorithms is paramount. These architectures are usually endowed with software and occasionally hardware implementation of ciphers, but in both cases, the price envelope is the first figure to be optimized. The vast diffusion and the tigh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2016
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2016.26.3.623