SlideShare a Scribd company logo
Proposed Lightweight
Block Cipher Algorithm for
Securing Internet of Things
By:
Seddiq Q. Abd Al-Rahman
Prof. Dr. Ali Makki Sagheer
Dr. Omar A. Dawood
The 3rd International Conference
on Computing, Communications,
and Information Technology
24-25 April 2019
Outline
 Internet of Things
 Lightweight cryptographic Cipher
 The Proposed Algorithm
 The Encryption Process
 Shifting Layer
 MixColumn Layer
 Key Scheduling
 The Decryption Process
 The Analysis of Algorithm
 Expermental Results
 Conclusion & Future Works
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The of Internet of Things (IoT) is a copy of
possibility for the computer applications
everywhere.
• It has become an inevitable fact and widely
applied to life style applications such as
smart grid, intelligent transportation, smart
security, and smart home.
• In addition to these applications, Access
cards, bus cards, and some other small
applications are applied.
Internet of Things
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
Internet of Things
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The aim of applied lightweight cryptography is to
use it in equipment with limited requirements
(memory, power, size).
• Lightweight cipher compensate and make
tradeoffs among security, cost, and performance
metrics.
• There are some design conditions, that should
taken into account such as low cost of hardware,
low power consumption, and small amount of
memory and etc .
• This is represents the main challenge in our
design to provide security margin in such a low-
end device with restricted environment.
Lightweight Cryptographic
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
Lightweight Cryptographic
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• Block Data: 64-bit
• Length of Secret Key: 64-bit
• Structure: balance Feistel network.
• Round Key: 32-bit
• No. Rounds: 24 rounds.
The Proposed Algorithm (1-2)
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
The Proposed Algorithm (2-2)
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
New
bit
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Old
Bit
31 30 29 28 23 22 21 20 7 6 5 4 27 26 25 24
New
bit
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Old
bit
15 14 13 12 3 2 1 0 11 10 9 8 19 18 17 16
Shifting Layer
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
1. The state is collected as a matrix in (4×2)
half bytes.
2. The columns of MDS are consider as
polynomials over GF(24) and multiply modulo of
(x4+x3+x2+1) with a fixed polynomial.
3. The result matrix (4×2) by multiply
polynomial matrix (4×4) with the text matrix
(4×2).
4. Return the text one-
Dimensional bitwise
matrix.
MixColumn Layer
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
The key schedule takes a 64-bit key as input.
The round key Rki at every round is derived
from three steps to be generated: left cyclic
shift, S-box and bitwise NOT.
K = k0 … k63
for i = 0 to 23 do
<<<12
S-Box(K)
NOT (K)
Rki  K
end for
Key Scheduling
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The Decryption Process are performed on the
left side of the algorithm, unlike the encryption
process.
• The main operations lie in the (F) function with
made the same order and the same values as in
the encryption process but with different
processes in each operation.
• The same S-box is used in the Subbyte
operation because with self-inverse.
• The bits in shifting operation must be returned
with the actions used in the encryption operation.
The Decryption Process
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The proposed algorithm is designed in regarding to the
restricted hardware resources that fit to the IoT
applications.
• The 64-bit key that makes a powerful analytical process that
scheduling with a little time (high key agility).
• This cipher utilizes an elegant structure, in the form of key
dependent S-box, that make an unusual dependency
among the structure and the key scheduling for subkeys.
• An efficient combination of S-box and MixColumn
operations was proposed with the same structure to reduce
the resources.
• The proposal model adopts the Feistel structure with high
speed implementation in encryption and decryption
structure.
Expremintal Analysis
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• NIST statistical tests are used to test the strength of the
proposed cipher. All the tests have been applied to the
algorithm and give a reasonable results .
Results
Test Name Proposed Algorithm
Frequency (monobit) test 0.073100
Frequency test within a block 0.815961
Runs test 0.134389
Cumulative sums
(Cusum) test
REVERSE 0.137790
FORWARD 0.196863
Test for the longest run of ones in a block 1.000000
Serial test P-v1 0.113246
P-v2 0.419500
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The algorithm is implemented by PC
computer of Intel Core i7-4600u at 2.10 GHz
processor using Visual Studio .NET C#
language with a total execution time of
0.002003 ms for 64-bits.
• The proposed algorithm is worked with 64-bit,
that meaning the probability of (264) is equal
to 18446744073709551616. So, the
attackers will need much time and will face
high complexity to break the ciphertext.
Results
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
• The internal round transformation encrypts and
decrypts data with the same invertible operations.
• The proposed structure works to balance among the
triples constraints of the lightweight design Cost,
Performance and Security factors.
• The proposed cipher submitted a reasonable security
level and high-speed implementation with low amount
of memory requirement.
• It is highly recommended to Implement the proposed
lightweight cipher on embedded devices like FPGA,
ASIC, and others.
• Recommended to Compute the required number of GE
and the power consumption, regarding to the proposed
cipher operations on FPGA and ASIC.
Conclusion & Future Works
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search
Proposed
Lightweight
Block Cipher for
Securing
Internet of
Things
Title search

More Related Content

What's hot (20)

PDF
5G and IoT Security
NUS-ISS
 
PPTX
Investigating Using the Dark Web
Case IQ
 
PDF
Introduction to Cryptography
Popescu Petre
 
ODT
Operating System Forensics
ArunJS5
 
PDF
Cybersecurity Basics - Aravindr.com
Aravind R
 
PDF
Security in IoT
SKS
 
PPTX
Encryption
keith dias
 
PPTX
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
PPT
Steganography ppt
Taha Malampatti
 
PDF
Signaling security essentials. Ready, steady, 5G!
PositiveTechnologies
 
PDF
Birthday Paradox explained
Sajith Ekanayaka
 
PPTX
Hardware Security
Mani Rathnam
 
PDF
CSIRT - BSSN
ssuser6f9867
 
PPSX
What is firewall
Harshana Jayarathna
 
PPTX
Cryptography
subodh pawar
 
PDF
Security using image processing
IJMIT JOURNAL
 
PPT
Security models
LJ PROJECTS
 
PPTX
Introduction to penetration testing
Nezar Alazzabi
 
PPT
Digital Forensic
Cleverence Kombe
 
5G and IoT Security
NUS-ISS
 
Investigating Using the Dark Web
Case IQ
 
Introduction to Cryptography
Popescu Petre
 
Operating System Forensics
ArunJS5
 
Cybersecurity Basics - Aravindr.com
Aravind R
 
Security in IoT
SKS
 
Encryption
keith dias
 
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
Steganography ppt
Taha Malampatti
 
Signaling security essentials. Ready, steady, 5G!
PositiveTechnologies
 
Birthday Paradox explained
Sajith Ekanayaka
 
Hardware Security
Mani Rathnam
 
CSIRT - BSSN
ssuser6f9867
 
What is firewall
Harshana Jayarathna
 
Cryptography
subodh pawar
 
Security using image processing
IJMIT JOURNAL
 
Security models
LJ PROJECTS
 
Introduction to penetration testing
Nezar Alazzabi
 
Digital Forensic
Cleverence Kombe
 

Similar to Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things (20)

PDF
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
PDF
A novel architecture for lightweight block cipher, piccolo
eSAT Journals
 
PDF
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
 
PDF
9. 23765.pdf
TELKOMNIKA JOURNAL
 
PDF
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
IRJET Journal
 
PPTX
New Lightweight Cryptographic Algorithm
arunkumar2949
 
PDF
Lightweight ANU-II block cipher on field programmable gate array
IJECEIAES
 
PDF
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
IOSRJECE
 
PDF
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
IRJET Journal
 
PDF
IP Core Design of Hight Lightweight Cipher and its Implementation
csandit
 
PDF
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
cscpconf
 
PDF
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET Journal
 
DOCX
An encryption scheme using chaotic map and
jpstudcorner
 
PDF
Fog and Internet of Things Network Security through Blowfish Cipher
BRNSSPublicationHubI
 
PPTX
Light Weight Cryptography for IOT.pptx
DineshBoobalan
 
PDF
1 importance of light weight authentication in iot
Chintan Patel
 
DOC
A vlsi implementation of a resource efficient and secure architecture of a b...
eSAT Journals
 
DOC
A vlsi implementation of a resource efficient and secure architecture of a b...
eSAT Journals
 
PDF
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
 
PDF
Secure Channel Communication between IOT Devices and Computers
IRJET Journal
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
A novel architecture for lightweight block cipher, piccolo
eSAT Journals
 
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
 
9. 23765.pdf
TELKOMNIKA JOURNAL
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
IRJET Journal
 
New Lightweight Cryptographic Algorithm
arunkumar2949
 
Lightweight ANU-II block cipher on field programmable gate array
IJECEIAES
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
IOSRJECE
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
IRJET Journal
 
IP Core Design of Hight Lightweight Cipher and its Implementation
csandit
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
cscpconf
 
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET Journal
 
An encryption scheme using chaotic map and
jpstudcorner
 
Fog and Internet of Things Network Security through Blowfish Cipher
BRNSSPublicationHubI
 
Light Weight Cryptography for IOT.pptx
DineshBoobalan
 
1 importance of light weight authentication in iot
Chintan Patel
 
A vlsi implementation of a resource efficient and secure architecture of a b...
eSAT Journals
 
A vlsi implementation of a resource efficient and secure architecture of a b...
eSAT Journals
 
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
 
Secure Channel Communication between IOT Devices and Computers
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
Plant growth promoting bacterial non symbiotic
psuvethapalani
 
PPTX
abdominal compartment syndrome presentation and treatment.pptx
LakshmiMounicaGrandh
 
PDF
Global Congress on Forensic Science and Research
infoforensicscience2
 
PPTX
Neuroinflammation and microglial subtypes
KanakChaudhary10
 
DOCX
Critical Book Review (CBR) - "Hate Speech: Linguistic Perspectives"
Sahmiral Amri Rajagukguk
 
PDF
oil and gas chemical injection system
Okeke Livinus
 
PPTX
Bacillus thuringiensis.crops & golden rice
priyadharshini87125
 
PDF
A Man of the Forest: The Contributions of Gifford Pinchot
RowanSales
 
PPT
Experimental Design by Cary Willard v3.ppt
MohammadRezaNirooman1
 
PDF
Adding Geochemistry To Understand Recharge Areas - Kinney County, Texas - Jim...
Texas Alliance of Groundwater Districts
 
PPTX
Basal_ganglia_Structure_Function_Importance
muralinath2
 
PPTX
Phage Therapy and Bacteriophage Biology.pptx
Prachi Virat
 
PPTX
Q1 - W1 - D2 - Models of matter for science.pptx
RyanCudal3
 
PPTX
Q1_Science 8_Week3-Day 1.pptx science lesson
AizaRazonado
 
PPTX
ION EXCHANGE CHROMATOGRAPHY NEW PPT (JA).pptx
adhagalejotshna
 
PDF
Carbon-richDustInjectedintotheInterstellarMediumbyGalacticWCBinaries Survives...
Sérgio Sacani
 
PDF
The ALMA-CRISTAL survey: Gas, dust, and stars in star-forming galaxies when t...
Sérgio Sacani
 
DOCX
Paper - Suprasegmental Features (Makalah Presentasi)
Sahmiral Amri Rajagukguk
 
PDF
Carbonate formation and fluctuating habitability on Mars
Sérgio Sacani
 
PDF
Rapid protoplanet formation in the outer Solar System recorded in a dunite fr...
Sérgio Sacani
 
Plant growth promoting bacterial non symbiotic
psuvethapalani
 
abdominal compartment syndrome presentation and treatment.pptx
LakshmiMounicaGrandh
 
Global Congress on Forensic Science and Research
infoforensicscience2
 
Neuroinflammation and microglial subtypes
KanakChaudhary10
 
Critical Book Review (CBR) - "Hate Speech: Linguistic Perspectives"
Sahmiral Amri Rajagukguk
 
oil and gas chemical injection system
Okeke Livinus
 
Bacillus thuringiensis.crops & golden rice
priyadharshini87125
 
A Man of the Forest: The Contributions of Gifford Pinchot
RowanSales
 
Experimental Design by Cary Willard v3.ppt
MohammadRezaNirooman1
 
Adding Geochemistry To Understand Recharge Areas - Kinney County, Texas - Jim...
Texas Alliance of Groundwater Districts
 
Basal_ganglia_Structure_Function_Importance
muralinath2
 
Phage Therapy and Bacteriophage Biology.pptx
Prachi Virat
 
Q1 - W1 - D2 - Models of matter for science.pptx
RyanCudal3
 
Q1_Science 8_Week3-Day 1.pptx science lesson
AizaRazonado
 
ION EXCHANGE CHROMATOGRAPHY NEW PPT (JA).pptx
adhagalejotshna
 
Carbon-richDustInjectedintotheInterstellarMediumbyGalacticWCBinaries Survives...
Sérgio Sacani
 
The ALMA-CRISTAL survey: Gas, dust, and stars in star-forming galaxies when t...
Sérgio Sacani
 
Paper - Suprasegmental Features (Makalah Presentasi)
Sahmiral Amri Rajagukguk
 
Carbonate formation and fluctuating habitability on Mars
Sérgio Sacani
 
Rapid protoplanet formation in the outer Solar System recorded in a dunite fr...
Sérgio Sacani
 
Ad

Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things

  • 1. Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things By: Seddiq Q. Abd Al-Rahman Prof. Dr. Ali Makki Sagheer Dr. Omar A. Dawood The 3rd International Conference on Computing, Communications, and Information Technology 24-25 April 2019
  • 2. Outline  Internet of Things  Lightweight cryptographic Cipher  The Proposed Algorithm  The Encryption Process  Shifting Layer  MixColumn Layer  Key Scheduling  The Decryption Process  The Analysis of Algorithm  Expermental Results  Conclusion & Future Works Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 3. • The of Internet of Things (IoT) is a copy of possibility for the computer applications everywhere. • It has become an inevitable fact and widely applied to life style applications such as smart grid, intelligent transportation, smart security, and smart home. • In addition to these applications, Access cards, bus cards, and some other small applications are applied. Internet of Things Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 4. Internet of Things Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 5. • The aim of applied lightweight cryptography is to use it in equipment with limited requirements (memory, power, size). • Lightweight cipher compensate and make tradeoffs among security, cost, and performance metrics. • There are some design conditions, that should taken into account such as low cost of hardware, low power consumption, and small amount of memory and etc . • This is represents the main challenge in our design to provide security margin in such a low- end device with restricted environment. Lightweight Cryptographic Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 6. Lightweight Cryptographic Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 7. • Block Data: 64-bit • Length of Secret Key: 64-bit • Structure: balance Feistel network. • Round Key: 32-bit • No. Rounds: 24 rounds. The Proposed Algorithm (1-2) Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 8. The Proposed Algorithm (2-2) Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 9. New bit 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Old Bit 31 30 29 28 23 22 21 20 7 6 5 4 27 26 25 24 New bit 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Old bit 15 14 13 12 3 2 1 0 11 10 9 8 19 18 17 16 Shifting Layer Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 10. 1. The state is collected as a matrix in (4×2) half bytes. 2. The columns of MDS are consider as polynomials over GF(24) and multiply modulo of (x4+x3+x2+1) with a fixed polynomial. 3. The result matrix (4×2) by multiply polynomial matrix (4×4) with the text matrix (4×2). 4. Return the text one- Dimensional bitwise matrix. MixColumn Layer Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 11. The key schedule takes a 64-bit key as input. The round key Rki at every round is derived from three steps to be generated: left cyclic shift, S-box and bitwise NOT. K = k0 … k63 for i = 0 to 23 do <<<12 S-Box(K) NOT (K) Rki  K end for Key Scheduling Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 12. • The Decryption Process are performed on the left side of the algorithm, unlike the encryption process. • The main operations lie in the (F) function with made the same order and the same values as in the encryption process but with different processes in each operation. • The same S-box is used in the Subbyte operation because with self-inverse. • The bits in shifting operation must be returned with the actions used in the encryption operation. The Decryption Process Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 13. • The proposed algorithm is designed in regarding to the restricted hardware resources that fit to the IoT applications. • The 64-bit key that makes a powerful analytical process that scheduling with a little time (high key agility). • This cipher utilizes an elegant structure, in the form of key dependent S-box, that make an unusual dependency among the structure and the key scheduling for subkeys. • An efficient combination of S-box and MixColumn operations was proposed with the same structure to reduce the resources. • The proposal model adopts the Feistel structure with high speed implementation in encryption and decryption structure. Expremintal Analysis Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 14. • NIST statistical tests are used to test the strength of the proposed cipher. All the tests have been applied to the algorithm and give a reasonable results . Results Test Name Proposed Algorithm Frequency (monobit) test 0.073100 Frequency test within a block 0.815961 Runs test 0.134389 Cumulative sums (Cusum) test REVERSE 0.137790 FORWARD 0.196863 Test for the longest run of ones in a block 1.000000 Serial test P-v1 0.113246 P-v2 0.419500 Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 15. • The algorithm is implemented by PC computer of Intel Core i7-4600u at 2.10 GHz processor using Visual Studio .NET C# language with a total execution time of 0.002003 ms for 64-bits. • The proposed algorithm is worked with 64-bit, that meaning the probability of (264) is equal to 18446744073709551616. So, the attackers will need much time and will face high complexity to break the ciphertext. Results Proposed Lightweight Block Cipher for Securing Internet of Things Title search
  • 16. • The internal round transformation encrypts and decrypts data with the same invertible operations. • The proposed structure works to balance among the triples constraints of the lightweight design Cost, Performance and Security factors. • The proposed cipher submitted a reasonable security level and high-speed implementation with low amount of memory requirement. • It is highly recommended to Implement the proposed lightweight cipher on embedded devices like FPGA, ASIC, and others. • Recommended to Compute the required number of GE and the power consumption, regarding to the proposed cipher operations on FPGA and ASIC. Conclusion & Future Works Proposed Lightweight Block Cipher for Securing Internet of Things Title search