Modified Key Derivation Function for Enhanced Security of Speck in Resource-Constrained Internet of Things

نویسندگان

چکیده

Randomness is an imperative component in every cryptographic algorithm to guarantee secret keys are unpredictable and secured against all forms of attacks. Speck generated sequence non-random, a clear sign that it falls beyond the acceptable success rate when tested statistical analysis. Thus, this study resolves non-randomness by integrating novel key derivation function uses elementary operators designed for lightweight application. This design aims not compromise performance implemented on software hardware. As result, modified successfully passed NIST SP 800 - 22 Dieharder v3.31.0 Statistical Test Analysis as no p-value flagged failed during testing. Hence, making cryptographically secured. Nevertheless, 1.06% decrease figure merit still makes worthier resource-constrained Internet Things application contrasted because proven be

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

‏‎interpersonal function of language in subtitling

‏‎translation as a comunicative process is always said to be associated with various aspects of meaning loss or gain. subtitling as a mode of translating, due to special discoursal and textual conditions imposed upon it, is believed to be an obvious case of this loss or gain. presenting the spoken sound track of a film in writing and synchronizing the perception of this text by the viewers with...

15 صفحه اول

SIMON and SPECK: Block Ciphers for the Internet of Things

The U.S. National Security Agency (NSA) developed the Simon and Speck families of lightweight block ciphers as an aid for securing applications in very constrained environments where AES may not be suitable. This paper sum­ marizes the algorithms, their design rationale, along with current cryptanalysis and implemen­ tation results.

متن کامل

Security-enhanced Search Engine Design in Internet of Things

This paper elaborates the challenges in searching imposed by the burgeoning field of Internet of Things (IoT). Firstly it overviews the evolution of the new field to its predecessors: searching in the mobile computing, ubiquitous computing and information retrieve. Then, it identifies five research thrusts: architecture design, search locality, real-time, scalability and divulging information. ...

متن کامل

application and construction of carbon paste modified electrodes developed for determination of metal ions in some real samples

ساخت الکترودهاِی اصلاح شده ِیکِی از چالشهاِی همِیشگِی در دانش شیمِی بوِیژه شیمِی تجزیه مِی باشد ،که با در نظر گرفتن سادگِی ساخت، کاربردی بودن و ارزان بودن روش مِی توان به باارزش بودن چنِین سنسورهاِی پِی برد.آنچه که در ادامه آورده شده به ساخت و کاربرد الکترودهاِی اصلاح شده با استفاده از نانو ذرات در اندازه گِیرِی ولتامترِی آهن وکادمِیم اشاره دارد. کار اول اختصاص دارد به ساخت الکترود خمِیر کربن اصلاح شده با لِیگاند داِ...

15 صفحه اول

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Network and Information Security

سال: 2021

ISSN: ['2074-9090', '2074-9104']

DOI: https://doi.org/10.5815/ijcnis.2021.04.02