2014
DOI: 10.4236/jis.2014.53011
|View full text |Cite
|
Sign up to set email alerts
|

I-PRESENT<sup>TM</sup>: An Involutive Lightweight Block Cipher

Abstract: This paper proposes a new involutive light-weight block cipher for resource-constraint environments called I-PRESENT TM . The design is based on the Present block cipher which is included inthe ISO/IEC 29192 standard on lightweight cryptography. The advantage of I-PRESENT TM is that the cipher is involutive such that the encryption circuit is identical to decryption. This is an advantage for environments which require the implementation of both circuits. The area requirement of I-PRESENT TM compares reasonably… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 19 publications
(27 reference statements)
0
6
0
Order By: Relevance
“…The DC attack has initially been presented on the AES-128 decreased to five rounds by Biham and Keller [23,24]. That was later developed by Cheon et al [25] to discover six rounds utilizing 291.5 preferred plaintext pairs and time complexity of 2122.…”
Section: Theoretical Confirmation Of DC Attack On Aesmentioning
confidence: 99%
See 3 more Smart Citations
“…The DC attack has initially been presented on the AES-128 decreased to five rounds by Biham and Keller [23,24]. That was later developed by Cheon et al [25] to discover six rounds utilizing 291.5 preferred plaintext pairs and time complexity of 2122.…”
Section: Theoretical Confirmation Of DC Attack On Aesmentioning
confidence: 99%
“…That was later developed by Cheon et al [25] to discover six rounds utilizing 291.5 preferred plaintext pairs and time complexity of 2122. For AES-192 and AES-256, Raphael and Phan [26] achieved to attack both AES-192 and AES-256 reduced to seven rounds [24]. The DC attack needed 292 (AES-192) and 292.5 (AES-256) chosen-plaintext pairs with time complexities of 2186 (AES-192) and 2250.5 (AES256) respectively [24].…”
Section: Theoretical Confirmation Of DC Attack On Aesmentioning
confidence: 99%
See 2 more Smart Citations
“…The generated key schedule will be of the length of 80 to 128 bits. The developed protocol is modelled using VHDL based platform and the results obtained from the study shows that better security is achieved with the developed ultralight weight cipher with the block size of 64 bit and size of authentic key is of 80 bit [38], [39]. D. SIMON The family of SIMON block ciphers was mainly designed to provide security for a constrained device in which the design simplicity is a crucial factor [45].…”
Section: Fig 4 Trade-off Between the Performance Cost And Securitymentioning
confidence: 99%