2022
DOI: 10.3390/sym14102042
|View full text |Cite
|
Sign up to set email alerts
|

LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application

Abstract: Data transmissions between smartphone users require security solutions to protect communications. Hence, encryption is an important tool that must be associated with smartphones to keep the user’s data safe. One proven solution to enhance the security of encryption algorithms is by using 3D designs on symmetric block ciphers. Although a 3D cipher design could improve the algorithms, the existing methods enlarge the block sizes that will also expand the key sizes and encryption rounds, thus decreasing their eff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(16 citation statements)
references
References 28 publications
0
1
0
Order By: Relevance
“…Encryption algorithms in cryptography are usually divided into two categories: symmetric encryption methods and asymmetric encryption methods [18][19][20][21]. Symmetric encryption algorithms can be divided into public-key encryption (PKE) and private-key encryption (PKE), both of which are effective methods for securing data.…”
Section: Related Workmentioning
confidence: 99%
“…Encryption algorithms in cryptography are usually divided into two categories: symmetric encryption methods and asymmetric encryption methods [18][19][20][21]. Symmetric encryption algorithms can be divided into public-key encryption (PKE) and private-key encryption (PKE), both of which are effective methods for securing data.…”
Section: Related Workmentioning
confidence: 99%
“…This test is used to examine the non-linear feature. By using the cipher text generated from specific input data, the correlation coefficient R is calculated from equation ( 2), ( Zakaria et al, 2022).…”
Section: Correlation Coefficient Testmentioning
confidence: 99%
“…AE is the avalanche effect between the cipher text and the plain text and is calculated according to equation (1). The acceptable result ranges for the correlation coefficients, which have values between -1 and +1, are shown in Table 3 (Zakaria et al, 2022).…”
Section: Correlation Coefficient Testmentioning
confidence: 99%
See 1 more Smart Citation
“…With the popularization and development of computer network technology, cryptographic techniques have been widely used to ensure the confidentiality or integrity of messages and the authenticity of communication parties. However, for many resourceconstrained devices such as mobile phones, public transport systems, smart cards, RFID tags, and Internet of Things devices, the majority of which employ lightweight cryptographic algorithms [1,2], these devices are convenient yet vulnerable. The sensitive information within them might be easily exposed by adversaries through side-channel analysis because of the vulnerability of physical information.…”
Section: Introductionmentioning
confidence: 99%