0% found this document useful (0 votes)
49 views

Light Weight Cryptography and Plagiarism Free Dead Line Is 22nd December With Good Structure of 1500 To 2000 Word's

The document discusses lightweight cryptography and its importance for resource-constrained devices used in applications like the Internet of Things. Lightweight cryptography aims to achieve high security using small computing power. It allows diverse modern applications to perform duties easily. Standardization of lightweight cryptography is needed for all its benefits to be realized. Security threats to low-powered devices include network attacks and limited memory for cryptography. Software and hardware performance metrics are considered. Common lightweight cryptographic algorithms include block ciphers, stream ciphers, and hash functions.

Uploaded by

Carlos Alphonce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views

Light Weight Cryptography and Plagiarism Free Dead Line Is 22nd December With Good Structure of 1500 To 2000 Word's

The document discusses lightweight cryptography and its importance for resource-constrained devices used in applications like the Internet of Things. Lightweight cryptography aims to achieve high security using small computing power. It allows diverse modern applications to perform duties easily. Standardization of lightweight cryptography is needed for all its benefits to be realized. Security threats to low-powered devices include network attacks and limited memory for cryptography. Software and hardware performance metrics are considered. Common lightweight cryptographic algorithms include block ciphers, stream ciphers, and hash functions.

Uploaded by

Carlos Alphonce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Light weight cryptography and plagiarism free dead line is 22nd December with good structure of

1500 to 2000 word's.

Introduction

Cryptography refers to the process that involves combination of the decryption and encryption.

The process encompasses a plain text information being converted into a cypher text or unintelligible

text and then back to the plain text. However when a combination of security and lightweight is

considered, the process is known as lightweight cryptography. The high levels of security is achieved

using the lightweight cryptography by using only a small computing power. The other notable definition

of the lightweight cryptography is a cryptographic protocol or algorithm tailored for implementation and

use in the constrained environments including the sensors, RFID tags, healthcare devices, contactless

smart cards and etc.

The purpose of the lightweight cryptography is to allow diverse range of modern applications

such as vehicle security systems, smart meters, wireless patient monitoring systems, the internet of

things and the Intelligent Transport systems to perform their respective duties with relative ease. A wide

variety of devices are helped using the lightweight cryptography which can be implemented in various

kinds of software and hardware. The process of communication can be wireless or wired. The devices

that are wireless are powered using a battery or an electromagnetic induction. The battery being used

can be rechargeable or disposable. The power consumption or energy in some applications can be very

important but other types of applications are just okay with low latency levels. The factors that make

the process quite limiting is the fact that the software code size or the hardware area can be small and a

very small amount of RAM can be available.

Various features are available that assist the lightweight cryptography work optimally. The

features include the stream ciphers, the block ciphers, hash functions and so on. The contribution of the

lightweight cryptography to the security of various smart devices and objects include its smaller
footprint and efficiency. The networks being used should be implemented more primitively in

combination with the lightweight primitives.

The internet of things uses a wide range of the lightweight cryptography techniques. A high

number of challenges are faced by the internet of things such as the power, privacy, security,

heterogeneity, scalability and bandwidth. The main reasons for the adoption of the lightweight

cryptography is the applicability to devices having lower resources and the efficiency of the end-to-end

communication. All the benefits of the lightweight cryptography will only be realized when the

lightweight cryptography is standardized. The resource constrained devices such as the internet of

things uses the lightweight encryption sector.

Security threats in systems using low powered devices

Devices using the internet of things are constrained on the amount of energy they can use. Such

devices include RFID tags, wireless sensors, machine-to-machine microcontrollers (M2M) and NFC tags.

Cryptography is important for these devices to ensure they are fully secured and will provide fast

identification, data protection and authentication. However, because of their low level usage of energy,

many advantages have been confined to applicability and design and a source of unique challenges in

security.

The smaller size of the low end energy devices in terms of ROM and ROM presents a greater

security challenge. The small products such as the fitness trackers, smart lighting, tire pressure

monitoring sensors and smart watches are designed to have the smallest amount of possible profile to

satisfy the engineering and marketing needs. The devices have very little ROM and RAM available for

cryptography. Solutions for these steps still exist.

Network attacks exist in various ways such as the attacker sniffing out the confidential

information and other types of data that flows through the RFID technologies because of the wireless
characteristics. The attacker will try to access some information from inside the organization using the

port scanning and the sniffing applications.

Working mechanism for lightweight cryptographies

Lightweight cryptography is an important developing and attractive public key cryptosystem

that is applied with many different kind of devices. The lightweight cryptography is normally applied if

the device cannot undertake enough cryptographic operations to ensure adequate security. The

lightweight cryptographic accommodates different kinds of limitations related to the resource

constrained environment of a lot of new application generations.

Performance metrics

The implementation for metrics in both the software and hardware are not identical because of

the cipher complexities during its operation. The bit permutation implementation offers an expensive

software but it is relatively easy to implement if we are dealing with hardware. The look up tables are

easy to be set up in software and very difficult and tough when it comes to hardware devices.

Software performance metrics

The amount of data gathered in RAM is measured in terms of size of tool and the implemented

information type. It contains private RAM data such as master keys, ciphered data, initialization vectors

and round keys. The price of the microcontrollers depends on memory and from the evidence collected

from the block cipher it only needs small lower usage of the memory. It has more limited hardware

resource than the computers and meeting the block cipher data memory requirements forms the main

part of the microcontrollers. The code footprint that is stored in the flash memory of the microcontroller

controls the size requirement of the microcontroller that is computed in bytes and correspond to the

footprint code. The object files created by the compiler is used to adjust several implementation of the

block cipher size tool and the object file made by the compiler to determine the ROM or the code size of

the software. The execution time of the forms the best performance metric of the software. The
execution time is related to other factors such as target device, the number of rounds and the structure

of the cipher. The time of the execution is obtained from the processor cycles commanded by set of

instructions to be executed. The number of cycles in the processor clock is used to find the number of

processor cycles obtained from the cipher basic operations.

Types of lightweight Cryptographic algorithm

The three main types of cryptographic algorithm include public key, secret key and hash

functions. For example the data encryption standards (DES) uses the same key type to decrypt and

encrypt a message and hence the receiver and the sender must use and know the same private key. The

DES is described as being a block cipher since they use the same kind of 64 bits size plain text blocks and

returns the cipher text block of same type. The permutation type also called the “2x64th power) leads to

possible arrangements of the 64 bits that can either be 1 or 0. The 64 bits block is further divided into

two other blocks of 32 bits each, a right half R and the left half block L. Using the key size of the 56 size

of block, operating on 64 bits block that are stored using the 64 bits long key and hence no 8 th bit key

was used such as the 8, 16, 24, 32, 40, 48, 56, and 64. The DES works using the binary numbers or bits of

1s and 0s that are normally used in digital computers. The four bits group make up the hexadecimal or

base 16 number. The binary number 0001 is treated similar to the hexadecimal number 1 binary. The

1000 is same to the hexadecimal number 8. The 1001 is equal to the 9 hexadecimal number and 1010

same to hexadecimal number 1010 while 1111 is equal to the F hexadecimal number.

You might also like