Skip to main content
Log in

Optimized Implementation of Gift Cipher

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The Internet of Things is an emerging area which deals with transfer of the data through the wired or wireless network. The prime thing that needs to be addressed in this is the security of the data that must be transferred within the optimized time limit. In this paper, throughput and time delay are need to be considered for the optimized data transfer and while concentrating on this, there is a possibility of allowing the data to be vulnerable to attacks. Security algorithms currently available may be adequate for the wired system and not as the same for wireless scenario. PRESENT cipher is a one of the popular cryptosystem used in wireless which falls under the light weight cryptography category. Gift cipher is an enhanced version of PRESENT cipher. Which aims that maximizing the throughput. In this, iteration structure used for encryption. This can still be improved and optimized in terms of increased data rate and reduced time delay. In this paper, implements the optimization technique of the existing GIFT cipher and throughput is considered as the performance metrics. Pipeline and sub-stage pipeline techniques are used for enhancing the architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig.1
Fig.2
Fig.3
Fig.4
Fig.5
Fig.6
Fig.7
Fig.8

Similar content being viewed by others

References

  1. Adomnicai, A., Najm, Z., & Peyrin, T. (2020). Fixslicing: A new GIFT representation. IACR Cryptol. ePrint Arch., 2020, 412.

    Google Scholar 

  2. Banik, S., Pandey, S. K., Peyrin, T., Sasaki, Y., Sim, S. M., & Todo, Y. (2017). GIFT: A small present towards reaching the limit of lightweight encryption (Full version). Technical Report.

  3. Banik, S., Chakraborti, A., Iwata, T., Minematsu, K., Nandi, M., Peyrin, T., Sasaki, Y,. Sim, S. M., & Todo, Y. (2019). GIFT-COFB. Submission to Round.

  4. Chodowiec, P., & Gaj, K. (2003). Very compact FPGA implementation of the AES algorithm. In International workshop on cryptographic hardware and embedded systems (pp. 319–333). Springer, Berlin, Heidelberg.

  5. Dalmasso, L., Bruguier, F., Benoit, P., & Torres, L. (2019). Evaluation of SPN-based lightweight crypto-ciphers. IEEE Access, 14(7), 10559–10567.

    Article  Google Scholar 

  6. Granado-Criado, J. M., Vega-Rodríguez, M. A., Sánchez-Pérez, J. M., & Gómez-Pulido, J. A. (2010). A new methodology to implement the AES algorithm using partial and dynamic reconfiguration. Integration, 43(1), 72–80.

    Article  Google Scholar 

  7. Hodjat, A., & Verbauwhede, I. (2006). Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors. IEEE Transactions on Computers, 55(4), 366–372.

    Article  Google Scholar 

  8. Lara-Nino, C. A., Diaz-Perez, A., & Morales-Sandoval, M. (2018) FPGA-based assessment of midori and gift lightweight block ciphers. In International conference on information and communications security (pp. 745–755). Springer, Cham.

  9. Rani, D. J., & Roslin, S. E. (2016). Light weight cryptographic algorithms for medical internet of things (IoT)—A review. In 2016 Online international conference on green engineering and technologies (IC-GET) (pp. 1–6).

  10. Rahimunnisa, K., Karthigaikumar, P., Rasheed, S., Jayakumar, J., & Suresh Kumar, S. (2014). FPGA implementation of AES algorithm for high throughput using folded parallel architecture. Security and Communication Networks, 7(11), 2225–2236.

    Article  Google Scholar 

  11. Tao, H., Bhuiyan, M. Z., Abdalla, A. N., Hassan, M. M., Zain, J. M., & Hayajneh, T. (2018). Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet of Things Journal, 6(1), 410–420.

    Article  Google Scholar 

  12. Ismaili, Z. E., & Moussa, A. (2009). Self-partial and dynamic reconfiguration implementation for AES using FPGA. arXiv:0909.2369.

  13. Yoo, S. M., Kotturi, D., Pan, D. W., & Blizzard, J. (2005). An AES crypto chip using a high-speed parallel pipelined architecture. Microprocessors and Microsystems, 29(7), 317–326.

    Article  Google Scholar 

  14. Zhang, J., Li, L., Li, Q., Zhao, J., & Liang, X. (2021). Power analysis attack on a lightweight block cipher gift. In Proceedings of the9th international conference on computer engineering and networks (pp. 565–574). Springer, Singapore.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Jamuna Rani.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jamuna Rani, D., Emalda Roslin, S. Optimized Implementation of Gift Cipher. Wireless Pers Commun 119, 2185–2195 (2021). https://doi.org/10.1007/s11277-021-08325-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08325-2

Keywords

Navigation