Micro Rotor Enhanced Block Cipher Designed for Eight Bits Micro-controllers (mrebc)

نویسنده

  • Ahmed ElShafee
چکیده

The sensor network is a wireless network environment that consists of the many sensors of lightweight and low-power. Authentication between nodes is very vital for network reliability and the integrity of information collected by these nodes. Therefore, encryption algorithm for the implementation of reliable sensor network environments is required to the applicable sensor network. This paper gives a new proposed cryptosystem (MREBC) that is designed for 8 bits microcontroller systems. MREBC uses the concept of rotor enhanced block cipher which was initially proposed by the author in [NRSC 2002] on the first version of REBC. MREBC uses rotors to achieve two basic cryptographic operations; permutation, and substitution. Round key is generated using rotor too, which is used to achieve ciphertext key dependency. Rotors implemented using 8 bits successive affine transformation, which achieves memoryless, normalized ciphertext statistics, and small processing speed trend. The strength of this system is compared with the RIJNDAEL (AES) cipher. MREBC cipher gives excellent results from security characteristics and statistical point of view of. communication efficiency of MREBC is compared with AES through measuring performance by plaintext size, and cost of operation per hop according to the network scale. Arduino microcontroller board is used to implement both MREBC, and AES in order to compare the performance of algorithms. Authors suggests to use MREBC to implement a reliable sensor network environments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

متن کامل

TWINE: A Lightweight Block Cipher for Multiple Platforms

This paper presents a 64-bit lightweight block cipher TWINE supporting 80 and 128bit keys. TWINE realizes quite small hardware implementation similar to the previous lightweight block cipher proposals, yet enables efficient software implementations on various platforms, from micro-controller to high-end CPU. This characteristic is obtained by the use of generalized Feistel structure combined wi...

متن کامل

New Fixed Point Attacks on GOST2 Block Cipher

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

متن کامل

Modeling and Design Adaptive Double Neural Network Controller for Eight-Rotor Micro Aircraft Vehicle

In this article, a dynamic model of a six degrees of freedom (6 DOF) Eight-Rotor MAV (micro aerial vehicles) is derived on the basis of the Newton-Euler formalism. The derivation comprises determining equations of the motion of the Eight-Rotor MAV in three dimensions and approximating the actuation forces through the modelling of aerodynamic coefficients and electric motor dynamics. For Eight-R...

متن کامل

Differential Cryptanalysis of 18-Round PRIDE

The rapid growth of the Internet of Things together with the increasing popularity of connected objects have created a need for secure, efficient and lightweight ciphers. Among the multitude of candidates, the block cipher PRIDE is, to this day, one of the most efficient solutions for 8-bit micro-controllers. In this paper, we provide new insights and a better understanding of differential atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013