2019
DOI: 10.22266/ijies2019.0831.08
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Newly Proposed Lightweight Cipher, BRIGHT

Abstract: Lightweight security algorithms are tailored for resource-constrained environment. To improve the efficiency of an algorithm, usually, a tradeoff is involved in lightweight cryptography in terms of its memory requirements and speed. By adopting several performance enhancement techniques, a security framework for IoT enabled applications is presented in this paper. Proposed BRIGHT family of ciphers is comparably better than existing lightweight ciphers and support a range of block and key sizes for constraint e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Numerous researchers in the area of IoT security has given different lightweight security algorithms. Moving in the same direction, we have also proposed three different lightweight security algorithms, BRIGHT [28], [29], [30], and UBRIGHT [31]. A total of 9 different security algorithms are proposed in these three security algorithms.…”
Section: Security Mechanism In Iotmentioning
confidence: 99%
“…Numerous researchers in the area of IoT security has given different lightweight security algorithms. Moving in the same direction, we have also proposed three different lightweight security algorithms, BRIGHT [28], [29], [30], and UBRIGHT [31]. A total of 9 different security algorithms are proposed in these three security algorithms.…”
Section: Security Mechanism In Iotmentioning
confidence: 99%
“…Stream ciphers are symmetric key ciphers and are mainly used in those applications where plaintext size is unknown. Although, stream ciphers have a simple and speedy implementation in hardware but due to lengthy initialization phase and also due to some of the communication protocols that do not utilize stream ciphers, these are less preferred over block ciphers and as a result does not receive much attention [6,49]. TRIVIUM: Trivium is a simple, speedy, smallest and most efficient bit-oriented stream cipher which provides good security margin against attacks and requires low power hardware implementation [50,51].…”
Section: Part 3: Stream Ciphersmentioning
confidence: 99%
“…These can be implemented either through software implementation or through hardware implementations. Software oriented cipher designs provide more flexibility at lower costs on manufacturing and maintenance as compared to hardware implementations [6]. This is because of its ability to provide efficient end-to-end communications [7].…”
Section: Introductionmentioning
confidence: 99%
“…It is verified that all versions of BRIGHT family fulfill SAC criteria and key sensitive test. Besides, performance of BRIGHT is evaluated on different parameters and compared with various benchmarked lightweight block ciphers on different platforms (64-bit and 32-bit) which are culminated in the publications [15,16]. Number of bits changed 00 00 00 00 00 00 00 00 25 f8 fc b5 9c 1a a1 4f 34 00 00 00 00 00 00 00 01 9d 9d 5c 32 43 e6 30 97 Table 3: Diffusion for BRIGHT 128/128, when there is a single-bit change in key.…”
Section: Performance Evaluationmentioning
confidence: 99%