2 research outputs found

    Improved Lightweight Implementations of CAESAR Authenticated Ciphers

    Get PDF
    Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Things (IoT). The CAESAR competition seeks optimal authenticated ciphers based on several criteria, including performance in resource-constrained (i.e., low-area, low-power, and low-energy) hardware. Although the competition specified a ”lightweight” use case for Round 3, most hardware submissions to Round 3 were not lightweight implementations, in that they employed architectures optimized for best throughput-to-area (TP/A) ratio, and used the Pre- and PostProcessor modules from the CAE-SAR Hardware (HW) Development Package designed for high-speed applications. In this research, we provide true lightweight implementations of selected ciphers (ACORN, NORX, CLOC-AES, SILC-AES, and SILC-LED). These implementations use an improved version of the CAESAR HW DevelopmentPackage designed for lightweight applications, and are fully compliant with the CAESAR HW Application programming interface for Authenticated Ciphers. Our lightweight implementations achieve an average of 55% reduction in area and40% reduction in power compared to their corresponding high-speed versions. Although the average energy per bit of lightweight ciphers increases by a factor of 3.6, the lightweight version of NORX actually uses 47% less energy per bit than its corresponding high-speed implementation

    A New Hybrid Diffie-Hellman and Caesar Cipher Algorithm for Cryptography

    Get PDF
    Caesar cipher algorithm is one of the ancient algorithms. However, due to advances in technology the algorithm is now much simple to breach. This is because; each letter in the message is replaced by the same letter as specified. To raise the safety, some changes can be made. So, here we are going to use another arithmetic algorithm Diffie - Hellman's mode of changing the key to find the secret key and use simple calculations to verify data encryption. After obtaining a private shared key using the Diffie-Hellman method, depending on the operating mode with 26 keys to get the value of 26 or less, then the current character is taken with the key when the additional value of the new character. In any letter in the position of an 'x', the key first increases with an 'x' and is adjusted to get the encrypted letter. Therefore, 2 messages are repeated 2 times and the third letter has 3. This increases safety. This technology can b
    corecore