Lightweight Cryptography for Resource Constrained Devices

被引:0
|
作者
Shraddha, B. H. [1 ]
Kinnal, Bhagyashree [1 ]
Wali, Heera [1 ]
Iyer, Nalini C. [1 ]
Vishal, P. [1 ]
机构
[1] KLE Technol Univ, Hubballi, Karnataka, India
来源
关键词
Hummingbird-2; Anti-counterfeiting; Lightweight cryptography; Plaintext; Encryption; Decryption; PRESENT;
D O I
10.1007/978-3-030-96305-7_51
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Counterfeiting of products is constantly increasing, and more so in developing markets. As per the statistics counterfeiting incidents have increased over 24% in India in the year 2019 over previous years and badly hitting the economy by creating an over of 1-lakh-crore hole in the economy. These counterfeited products pose a threat to the sales figures of Original Equipment Manufacturers (OEM)'s and the safety of end-users. Problem of counterfeiting can be reduced substantially by providing a means for distinguishing the original product from the duplicates circulating in the market. Cryptography is a method used to encrypt certain data that can only be read in its original form by the person for whom the information is intended by the method of decryption. In order to fit these cryptographic algorithms into the products, the cryptographic primitives deployed on these devices have to be lightweight so as to not increase the size of the end product. In this paper, we have discussed and validated a method of authenticating original products. Low-cost methods of cryptography are required for the widespread adoption of anti-counterfeiting measures Hummingbird-2 is a robust lightweight cryptographic algorithm that strikes a good balance between cost and security and it has comparatively a smaller footprint when compared to other light weight cryptographic algorithms. This paper, details the design and validation of Hummingbird-2 a light weight cryptographic algorithm and its implementation using Verilog in Xilinx ISE. The algorithm is of tested for an input which is the plain text and key size of 128bits respectively. The validated functional design is implemented on the target platform SPARTAN 6. A comparison between Hummingbird-2 and Present-80 algorithms is also presented. Quantitative analysis of timing analysis, slice utilization, macro statistics and memory usage of algorithm is tabulated and presented.
引用
收藏
页码:553 / 564
页数:12
相关论文
共 50 条
  • [1] Lightweight Cryptography for Constrained Devices
    Alippi, Cesare
    Bogdanov, Andrey
    Regazzoni, Francesco
    [J]. 2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 144 - 147
  • [2] Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
    Engels, Daniel
    Fan, Xinxin
    Gong, Guang
    Hu, Honggang
    Smith, Eric M.
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 3 - +
  • [3] Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities
    Thakor, Vishal A.
    Razzaque, Mohammad Abdur
    Khandaker, Muhammad R. A.
    [J]. IEEE ACCESS, 2021, 9 : 28177 - 28193
  • [4] Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities
    Thakor, Vishal A.
    Razzaque, Mohammad Abdur
    Khandaker, Muhammad R. A.
    [J]. IEEE Access, 2021, 9 : 28177 - 28193
  • [5] Lightweight Cryptography for Resource Constraint Devices: Challenges and Recommendation
    Al-Aboosi, Ahmad Mustafa Mohamad
    Kamil, Samar
    Abdullah, Siti Norul Huda Sheikh
    Ariffin, Khairul Akram Zainol
    [J]. 2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 44 - 49
  • [6] Efficient lightweight cryptography for resource-constrained WSN nodes
    Sable, Nilesh P.
    Rathod, Vijay U.
    Parlewar, Pallavi
    Rathod, Smita B.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 349 - 359
  • [7] Light Weight Cryptography for Resource Constrained IoT Devices
    Al Shebli, Hessa Mohammed Zaher
    Beheshti, Babak D.
    [J]. PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 1, 2019, 880 : 196 - 204
  • [8] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    [J]. Journal of Systems Architecture, 2022, 133
  • [9] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133
  • [10] CPOP: Cryptography process offloading proxy for resource constrained devices
    They, Yu-Shu
    Phang, Seong-Yee
    Lee, Sanggon
    Lee, HoonJae
    Lim, Hyotaek
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 289 - 294