2019
DOI: 10.1109/access.2019.2912929
|View full text |Cite
|
Sign up to set email alerts
|

A Complexity-Reduced Block Encryption Algorithm Suitable for Internet of Things

Abstract: The Internet of Things (IoT) poses stringent requirements on service quality and security strength. A highly reliable encryption algorithm with low complexity is required to ensure information security. Therefore, this paper proposes a complexity-reduced secure and fast encryption routine (SAFER)-Fermat block encryption method that accounts for the confusion and diffusion principles. In particular, a novel diffusion layer that exploiting the Fermat number theory transform is proposed, while the confusion layer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 36 publications
(52 reference statements)
0
18
0
Order By: Relevance
“…Most of these works are investigating the use of simplified version of the original AES algorithm by modifying some of the encryption/decryption steps that make it a lightweight block symmetric standard. In [16], the secure and fast encryption routine (SAFER++) is presented for securing IoT applications. It is a low-complexity, secure, and fast block cipher, accomplished by modifying the original SAFER standard with a 64-key length resulting in an algorithm that is equally secure but simpler.…”
Section: Introductionmentioning
confidence: 99%
“…Most of these works are investigating the use of simplified version of the original AES algorithm by modifying some of the encryption/decryption steps that make it a lightweight block symmetric standard. In [16], the secure and fast encryption routine (SAFER++) is presented for securing IoT applications. It is a low-complexity, secure, and fast block cipher, accomplished by modifying the original SAFER standard with a 64-key length resulting in an algorithm that is equally secure but simpler.…”
Section: Introductionmentioning
confidence: 99%
“…Ironically, with increase in high-pace IoT demands, the events of security breaches too have increased severely. The security breaches in IoT can be at the different level, i.e., device level, infrastructure level, network level (say, channel) and data level [3][4] [6] [38]. Such security breaches can cause detrimental impacts in terms of financial loss, data-loss, tack-manipulation and procedural destruction [2].…”
Section: Introductionmentioning
confidence: 99%
“…Recalling the typical architecture of the IoT systems that encompasses Low-power Lossy (sensor) Networks (LLNs), gateways, transmission channel and data-warehouses or storage possessing undeniably security related vulnerabilities. Typically, the poorly interfaced nature of IoT devices and their inferior connection, especially operating online can undergo 377 | P a g e www.ijacsa.thesai.org security breaches and resulting losses [5][6][7]. On the other hand, attack probability gets increased manifolds over channel where different man-in-the middle attack (MITM), linear and differential attacks, impersonation, etc.…”
Section: Introductionmentioning
confidence: 99%
“…For example, no successful attack on the full-round Simon or the full-round Speck, which is a family of lightweight block ciphers, is known [8][9][10]. ird, we need an automated and generalized test tool for checking the safety of various lightweight block ciphers for Internet of ings [11]. ere are various automated techniques that can be used to build distinguishers against block ciphers [12][13][14].…”
Section: Introductionmentioning
confidence: 99%