Lightweight Structure of Random Key Generation for PRESENT Block Cipher

سال انتشار: 1403
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 27

فایل این مقاله در 11 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IECO-7-1_004

تاریخ نمایه سازی: 20 فروردین 1403

چکیده مقاله:

In this paper, we design a lightweight and modified random key generation for PRESENT block cipher which is applicable in the encryption of the digital signals. In the block ciphers, the master key is used directly in the encryption process for the data (plaintext). But in this work, a master key (initial key) is used to derive the new random master keys (random session keys) and use these keys for the encryption process. The use of random keys will overcome the brute force attack that can be applied to the PRESENT cipher. The random session keys generated will produce different ciphertexts for the same plaintext for every session. In this approach, we take advantage of the block cipher to produce random keys. The PRESENT cipher is shared in both random key generation and encryption process. Therefore, the proposed structure has both random key generation and data encryption in a unified circuit. This property reduces hardware resources. The implementation results, in ۱۸۰ nm CMOS technologies, show the proposed structure is comparable in terms of area and delay with other works.

نویسندگان

Bahram Rashidi

Dept. of Elec. Eng., Ayatollah Boroujerdi University

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I. and Manifavas, C., A ...
  • Sadhukhan, R., Patranabis, S., Ghoshal, A., Mukhopadhyay, D., Saraswat, V. ...
  • You, L., Yang, E., and Wang, G., A novel parallel ...
  • Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., ...
  • International Standardization of Organization (ISO): Information Technology-Security Techniques-Lightweight Cryptography-Part ۲: ...
  • Rashid, M., Imran, M., Jafri, A.R., Al-Somani, T.F., Flexible Architectures ...
  • Wang, C., and Heys, H.M., An ultra compact block cipher ...
  • Rolfes, C., Poschmann, A., Leander, G., Paar, C., UltraLightweight Implementations ...
  • Maene, P., and Verbauwhede, I., PRESENT: An ultra lightweight block ...
  • Rekha, S.S., and Saravanan, P., Low Cost Circuit Level Implementation ...
  • Rashidi, B., Efficient and High-throughput ASIC Implementations of HIGHT and ...
  • Rashidi, B., Flexible Structures of Lightweight Block Ciphers PRESENT, SIMON ...
  • Sherine Jenny, R., Sudhakar, R., Karthikpriya, K. Design of Compact ...
  • Panchami, V., Mary Mathews, M., A Substitution Box for Lightweight ...
  • Mishra, R., Okade, M., Mahapatra, K., Optimized S-Box Architectures of ...
  • Parthasarathy, P., Saravanan, Efficient Hardware Implementation of PRESENT Lightweight Cipher, ...
  • N.Noura, H., Chehab, A., Raphael, C. Efficient & secure cipher ...
  • Ismail Abdelfatah, R. Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve ...
  • Shanthakumari, R. and Malliga, S., Dual layer security of data ...
  • Yang, C.H., Wu, H.C., and Su, S.F., Implementation of Encryption ...
  • Penchalaiah, P., and Ramesh Reddy, K., Random multiple key streams ...
  • Montero-Canela, R., Zambrano-Serrano, E., Tamariz-Flores, E.I., Munoz-Pacheco, J.M., and Torrealba-Melendez, ...
  • Pradeep, L.N., and Bhattacharjya, A., Random Key and Key Dependent ...
  • Rashidi, B., Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures ...
  • Courtois, N.T., Hulme, D., and Mourouzis, T., Solving Circuit Optimisation ...
  • Tay, J.J., Wong, M.L.D., Wong, M.M., Zhang, C. and Hijazin, ...
  • Kocher, P., Jaffe, J., and Jun, B., Differential power analysis, ...
  • Kocher, P.C., Timing Attacks on Implementations of Diffie“Hellman, RSA, DSS, ...
  • Hayashi, Y.I., and Homma, N., Mizuki, T., Aoki, T., Sone, ...
  • نمایش کامل مراجع