Modified Key Derivation Function for Enhanced Security of Speck in Resource-Constrained Internet of Things
نویسندگان
چکیده
Randomness is an imperative component in every cryptographic algorithm to guarantee secret keys are unpredictable and secured against all forms of attacks. Speck generated sequence non-random, a clear sign that it falls beyond the acceptable success rate when tested statistical analysis. Thus, this study resolves non-randomness by integrating novel key derivation function uses elementary operators designed for lightweight application. This design aims not compromise performance implemented on software hardware. As result, modified successfully passed NIST SP 800 - 22 Dieharder v3.31.0 Statistical Test Analysis as no p-value flagged failed during testing. Hence, making cryptographically secured. Nevertheless, 1.06% decrease figure merit still makes worthier resource-constrained Internet Things application contrasted because proven be
منابع مشابه
interpersonal function of language in subtitling
translation as a comunicative process is always said to be associated with various aspects of meaning loss or gain. subtitling as a mode of translating, due to special discoursal and textual conditions imposed upon it, is believed to be an obvious case of this loss or gain. presenting the spoken sound track of a film in writing and synchronizing the perception of this text by the viewers with...
15 صفحه اولSIMON and SPECK: Block Ciphers for the Internet of Things
The U.S. National Security Agency (NSA) developed the Simon and Speck families of lightweight block ciphers as an aid for securing applications in very constrained environments where AES may not be suitable. This paper sum marizes the algorithms, their design rationale, along with current cryptanalysis and implemen tation results.
متن کاملSecurity-enhanced Search Engine Design in Internet of Things
This paper elaborates the challenges in searching imposed by the burgeoning field of Internet of Things (IoT). Firstly it overviews the evolution of the new field to its predecessors: searching in the mobile computing, ubiquitous computing and information retrieve. Then, it identifies five research thrusts: architecture design, search locality, real-time, scalability and divulging information. ...
متن کاملapplication and construction of carbon paste modified electrodes developed for determination of metal ions in some real samples
ساخت الکترودهاِی اصلاح شده ِیکِی از چالشهاِی همِیشگِی در دانش شیمِی بوِیژه شیمِی تجزیه مِی باشد ،که با در نظر گرفتن سادگِی ساخت، کاربردی بودن و ارزان بودن روش مِی توان به باارزش بودن چنِین سنسورهاِی پِی برد.آنچه که در ادامه آورده شده به ساخت و کاربرد الکترودهاِی اصلاح شده با استفاده از نانو ذرات در اندازه گِیرِی ولتامترِی آهن وکادمِیم اشاره دارد. کار اول اختصاص دارد به ساخت الکترود خمِیر کربن اصلاح شده با لِیگاند داِ...
15 صفحه اولRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Network and Information Security
سال: 2021
ISSN: ['2074-9090', '2074-9104']
DOI: https://doi.org/10.5815/ijcnis.2021.04.02