Lightweight Structure of Random Key Generation for PRESENT Block Cipher

Publish Year: 1403
نوع سند: مقاله ژورنالی
زبان: English
View: 48

This Paper With 11 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IECO-7-1_004

تاریخ نمایه سازی: 20 فروردین 1403

Abstract:

In this paper, we design a lightweight and modified random key generation for PRESENT block cipher which is applicable in the encryption of the digital signals. In the block ciphers, the master key is used directly in the encryption process for the data (plaintext). But in this work, a master key (initial key) is used to derive the new random master keys (random session keys) and use these keys for the encryption process. The use of random keys will overcome the brute force attack that can be applied to the PRESENT cipher. The random session keys generated will produce different ciphertexts for the same plaintext for every session. In this approach, we take advantage of the block cipher to produce random keys. The PRESENT cipher is shared in both random key generation and encryption process. Therefore, the proposed structure has both random key generation and data encryption in a unified circuit. This property reduces hardware resources. The implementation results, in ۱۸۰ nm CMOS technologies, show the proposed structure is comparable in terms of area and delay with other works.

Authors

Bahram Rashidi

Dept. of Elec. Eng., Ayatollah Boroujerdi University

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I. and Manifavas, C., A ...
  • Sadhukhan, R., Patranabis, S., Ghoshal, A., Mukhopadhyay, D., Saraswat, V. ...
  • You, L., Yang, E., and Wang, G., A novel parallel ...
  • Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., ...
  • International Standardization of Organization (ISO): Information Technology-Security Techniques-Lightweight Cryptography-Part ۲: ...
  • Rashid, M., Imran, M., Jafri, A.R., Al-Somani, T.F., Flexible Architectures ...
  • Wang, C., and Heys, H.M., An ultra compact block cipher ...
  • Rolfes, C., Poschmann, A., Leander, G., Paar, C., UltraLightweight Implementations ...
  • Maene, P., and Verbauwhede, I., PRESENT: An ultra lightweight block ...
  • Rekha, S.S., and Saravanan, P., Low Cost Circuit Level Implementation ...
  • Rashidi, B., Efficient and High-throughput ASIC Implementations of HIGHT and ...
  • Rashidi, B., Flexible Structures of Lightweight Block Ciphers PRESENT, SIMON ...
  • Sherine Jenny, R., Sudhakar, R., Karthikpriya, K. Design of Compact ...
  • Panchami, V., Mary Mathews, M., A Substitution Box for Lightweight ...
  • Mishra, R., Okade, M., Mahapatra, K., Optimized S-Box Architectures of ...
  • Parthasarathy, P., Saravanan, Efficient Hardware Implementation of PRESENT Lightweight Cipher, ...
  • N.Noura, H., Chehab, A., Raphael, C. Efficient & secure cipher ...
  • Ismail Abdelfatah, R. Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve ...
  • Shanthakumari, R. and Malliga, S., Dual layer security of data ...
  • Yang, C.H., Wu, H.C., and Su, S.F., Implementation of Encryption ...
  • Penchalaiah, P., and Ramesh Reddy, K., Random multiple key streams ...
  • Montero-Canela, R., Zambrano-Serrano, E., Tamariz-Flores, E.I., Munoz-Pacheco, J.M., and Torrealba-Melendez, ...
  • Pradeep, L.N., and Bhattacharjya, A., Random Key and Key Dependent ...
  • Rashidi, B., Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures ...
  • Courtois, N.T., Hulme, D., and Mourouzis, T., Solving Circuit Optimisation ...
  • Tay, J.J., Wong, M.L.D., Wong, M.M., Zhang, C. and Hijazin, ...
  • Kocher, P., Jaffe, J., and Jun, B., Differential power analysis, ...
  • Kocher, P.C., Timing Attacks on Implementations of Diffie“Hellman, RSA, DSS, ...
  • Hayashi, Y.I., and Homma, N., Mizuki, T., Aoki, T., Sone, ...
  • نمایش کامل مراجع