Documente Academic
Documente Profesional
Documente Cultură
Presented by
NAME:
D. Aakash
CONTENTS
Objective
Introduction
Literature Survey
Related works
Proposed scheme
Block Diagram
Design Flow Diagram
Hardware Output
Conclusion
OBJECTIVE
To determine a Lightweight Security Encryption algorithm
Introduction
Wireless Sensor Network is a wide field that only rely on the
sensor data.
IoT (Internet of thing) is an extension of WSN ,where we use
Internet Of Things
Kevin Ashton coined "Internet of Things" phrase to
Lightweight Cryptography
Symmetric Cryptography Vs Asymmetric Cryptography
Block and Stream Cipher
Why Block Cipher?
Security
Higher Throughput
Low power Consumption
Compactness
Less Gate Equivalents
Literature Survey
S.NO
1.
PAPER TITLE
PUBLICATION
A comprehensive
Journal of Network and
survey of modern
Computer Applications
symmetric
cryptographic solutions
for resource
constrained
environments
DESCRIPTION
Survey of various LWC algorithms.
2.
Lightweight
Cryptography for
FPGAs
3.
Design &
Implementation of an
Encryption Algorithm
for use in RFID
System
International Journal of
RFID Security and
Cryptography (IJRFIDSC),
March/June 2012
4.
5.
Springer, 2007
vol. 4727
6.
The 128
bit block cipher CLEFIA
in Fast Software
Encryption
Springer, 2007
vol. 4593
7.
Springer, 1994
vol. 1008
Simplest algorithm
Few lines of code
Easily breakable
Related Works
Method
Description
Limitation
PRESENT
LED
CLEFIA
TEA
Simplest algorithm
Few lines of code
Easily breakable
SEA
Latency is less
Fiestal Structure
PROPOSED SCHEME:
GRP :A BIT PERMUTATION INSTRUSTION
Permutation
GRP
Merit
Uses lesser memory and
less GE Count
Better cryptographic
properties
Demerit
Number of stages varies
with number of bits
Latency increase with
bits size increases
OMFLIP
(Omega-Flip)
Easily reversible
DDR
(Data-Dependent
rotation)
PPERM3R
Latency is more
Initialization process
takes time
2n permutation is harder
from n permutation
Table Lookup
It consumes more
memory, latency is more
and require more number
of instructions
TRANSPOSITION CIPHER
GRP bit level permutation uses less memory
Therefore power consumption is also less
property
Lesser Gate equivalent
Block Diagram
Security Analysis
Differential Cryptanalysis
It is used to explore the strength of the algorithm by checking its
Linear Cryptanalysis
It is done with the Walsh Transform which describes the closeness
Hardware Output
Conclusion
Enhance the security level and balance trade off with
done
THANK YOU