Skip to main content
Log in

Modeling, hardware architecture, and performance analyses of an AEAD-based lightweight cipher

  • Research
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Ensuring data security and integrity is crucial for achieving the highest level of protection and performance in modern cyber-physical systems (CPS). Authenticated encryption with associated data (AEAD) is an efficient and secure way to encrypt data that ensures confidentiality and authenticity. The proposed work focuses on image encryption using the TinyJAMBU cipher within the AEAD scheme. In this paper, image encryption using the TinyJAMBU cipher with software and hardware modeling has been proposed, and image encryption evaluation over standard matrices has been performed. The hardware architecture for TinyJAMBU has been implemented on the Xilinx Virtex-7 FPGA device. The implementation results are compared with the realization of other contemporary ciphers that make TinyJAMBU-128’s implementation better in terms of look-up tables (LUTs), slice utilization, and power consumption. In the experimentation phase, the results of TinyJAMBU-128/192/256 for image encryption have been compared with existing image encryption techniques. It has been observed that, compared to other implementations, the proposed image encryption application using TinyJAMBU provides better results for PSNR, MSE, RMSE, and UACI.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

The codes/data referenced in this research may be available for public access. Interested researchers may request access from the corresponding author for academic usage, subject to approval.

References

  1. Abdulgadir, A., Lin, S., Farahmand, F., Kaps, JP., Gaj, K.: Side-channel resistant implementations of a novel lightweight authenticated cipher with application to hardware security. In: Proceedings of the 2021 on great lakes symposium on VLSI. Virtual Event, USA, pp. 229–234 (2021)

  2. Assche, G.V., Keer, R.V.: Xoodyak, a lightweight cryptographic scheme. IACR Transactions on Symmetric Cryptology (2020)

  3. Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665–673 (2013)

    Article  Google Scholar 

  4. Banik, S., Chakraborti, A., Inoue, A., Iwata, T., Minematsu, K., Nandi, M., Peyrin, T., Sasaki, Y., Sim, SM., Todo, Y.: GIFT-COFB. Cryptology ePrint Archive (2020)

  5. Bao, Z., Chakraborti, A., Datta, N., Guo, J., Nandi, M., Peyrin, T., Yasuda, K.: PHOTON-beetle authenticated encryption and hash family. NIST Lightweight Compet Round 1, 115 (2019)

    Google Scholar 

  6. Beierle, C., Biryukov, A., dos Santos, LC., Großschädl, J., Perrin, L., Udovenko, A., Velichkov, V., Wang, Q.: Lightweight AEAD and hashing using the sparkle permutation family. IACR Transactions on Symmetric Cryptology, pp. 208–261 (2020)

  7. Beyne, T., Chen, Y.L., Dobraunig, C., Mennink, B.: Multi-user security of the Elephant v2 authenticated encryption mode. In: Selected Areas in Cryptography: 28th International Conference, Virtual Event, September 29-October 1, 2021, pp. 155–178. Springer, Revised Selected Papers (2022)

  8. Buchanan, WJ., Maglaras, L.: Review of the NIST light-weight cryptography finalist. arXiv preprint arXiv:2303.14785 (2023)

  9. Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F., Mennink, B., Primas, R., Unterluggauer, T.: ISAP v2. 0. IACR Transactions on Symmetric Cryptology (2020)

  10. Dobraunig, C., Eichlseder, M., Mendel, F., Schläffer, M.: ASCON v1. 2: lightweight authenticated encryption and hashing. J. Cryptol. 34, 1–42 (2021)

    Article  MathSciNet  Google Scholar 

  11. Duka, AV.: Software implementation and benchmarking of TinyJAMBU on programmable logic controllers. In: The 16th International Conference Interdisciplinarity in Engineering: Inter-Eng 2022 Conference Proceedings. pp. 889–899. Springer (2022)

  12. ElBeltagy, M., Alexan, W., Elkhamry, A., Moustafa, M., Hussein, HH.: Image encryption through Rössler system, PRNG S-Box and Recamán’s sequence. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0716–0722. IEEE (2022)

  13. Harb, S., Ahmad, MO., Swamy, M.: A high-speed FPGA implementation of AES for large scale embedded systems and its applications. In: 2022 13th International Conference on Information and Communication Systems (ICICS), pp. 59–64. IEEE (2022)

  14. Hasan, M., Chang, D.: Lynx: family of lightweight authenticated encryption schemes based on tweakable blockcipher. Cryptology ePrint Archive (2023)

  15. Hell, M., Johansson, T., Maximov, A., Meier, W., Sönnerup, J., Yoshida, H.: Grain-128AEADv2-a lightweight AEAD stream cipher. The NIST Lightweight Cryptography Standardization Process (2019)

  16. Hemmati, A., Rahmani, A.M.: The internet of autonomous things applications: a taxonomy, technologies, and future directions. Internet Things 20, 100635 (2022)

    Article  Google Scholar 

  17. Hussain, S., Jamal, S.S., Shah, T., Hussain, I.: A power associative loop structure for the construction of non-linear components of block cipher. IEEE Access 8, 123492–123506 (2020). https://doi.org/10.1109/ACCESS.2020.3005087

    Article  Google Scholar 

  18. Jangir, A., Pandey, J.G.: GIFT cipher usage in image data security: hardware implementations, performance and statistical analyses. J. Real Time Image Process. 18(6), 2551–2567 (2021)

    Article  Google Scholar 

  19. Katagi, M., Moriai, S., et al.: Lightweight Cryptography for the Internet of Things, pp. 7–10. Sony corporation (2008)

  20. Kaur, M., Alzubi, AA., Singh, D., Kumar, V., Lee, HN.: Lightweight biomedical image encryption approach. IEEE Access (2023)

  21. Khairallah, M., Khairallah, M.: Romulus: lightweight AEAD from tweakable block ciphers. Hardware oriented authenticated encryption based on tweakable block ciphers, pp. 115–134 (2022)

  22. Kitahara, T., Hira, R., Hara-Azumi, Y., Miyahara, D., Li, Y., Sakiyama, K.: Optimized software implementations of ASCON, Grain-128AEAD, and TinyJambu on ARM Cortex-M0. In: 2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW), pp. 316–322. https://doi.org/10.1109/CANDARW57323.2022.00030 (2022)

  23. Mishra, Z., Mishra, S., Acharya, B.: High throughput novel architecture of SIT Cipher for IoT application. In: Nanoelectronics, Circuits and Communication Systems: Proceeding of NCCS 2019, pp. 267–276. Springer (2021)

  24. Mondal, B., Singh, J.P.: A lightweight image encryption scheme based on chaos and diffusion circuit. Multimed. Tools Appl. 81(24), 34547–34571 (2022)

    Article  Google Scholar 

  25. Muhajer, S.S.: A Review of DES and AES algorithms for image encryption. Al-Qadisiyah J. Pure Sci. 27, 48–56 (2023). https://doi.org/10.29350/qjps.2022.27.1.1512

    Article  Google Scholar 

  26. Naito, Y., Matsui, M., Sugawara, T., Suzuki, D.: SAEB: a lightweight blockcipher-based AEAD Mode of Operation. Cryptology ePrint Archive (2019)

  27. Poojary, A., Kiran Kumar, V., Nagesh, H.: FPGA implementation novel lightweight MBRISI cipher. J. Ambient Intell. Humaniz. Comput. 14, 1–13 (2022)

    Google Scholar 

  28. Rashidi, B.: Flexible and high-throughput structures of camellia block cipher for security of the internet of things. IET Comput. Digit. Tech. 15(3), 171–184 (2021)

    Article  Google Scholar 

  29. Report GVR IoT Device Management Market Size & Share Report, 2030. https://www.grandviewresearch.com/industry-analysis/iot-device-management-market (2018)

  30. Roy, S., Shrivastava, M., Pandey, CV., Nayak, SK., Rawat, U.: IEVCA: an efficient image encryption technique for IOT applications using 2-D Von-Neumann cellular automata-multimedia tools and applications (2021). https://doi.org/10.1007/s11042-020-09880

  31. Singh, P., Agrawal, B., Chaurasiya, R.K., Acharya, B.: Low-area and high-speed hardware architectures of klein lightweight block cipher for image encryption. J. Electron. Imaging 32(1), 013012–013012 (2023)

    Article  Google Scholar 

  32. Som, S., Kotal, A., Mitra, A., Palit, S., Chaudhuri, B.B.: A Chaos based partial image encryption scheme. In: 2014 2nd International Conference on Business and Information Management (ICBIM). Durgapur, India, pp. 58–63. (2014). https://doi.org/10.1109/ICBIM.2014.6970933

  33. Weber, A.G.: The USC-SIPI Image Database: Version 5, Original Release: October 1997. University of Southern California, Department of Electrical Engineering, Signal and Image Processing Institute (2019)

  34. Wu, H., Huang, T.: TinyJAMBU: a family of lightweight authenticated encryption algorithms (version 2). Submission to the NIST Lightweight Cryptography Standardization Process (2021)

  35. Yan, L., Li, L., Guo, Y.: DBST: a lightweight block cipher based on dynamic S-box. Front. Comput. Sci. 17(3), 173805 (2023)

    Article  Google Scholar 

  36. Yang, G., Shi, Z., Chen, C., Xiong, H., Li, F., Hu, H., Wan, Z.: Hardware optimizations of fruit-80 stream cipher: smaller than grain. ACM Trans. Reconfig. Technol. Syst. 16, 1–32 (2022)

    Article  Google Scholar 

  37. Yang, H., Wong, K.W., Liao, X., Zhang, W., Wei, P.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15(11), 3507–3517 (2010)

    Article  Google Scholar 

  38. Yousaf, A., Razaq, A., Baig, H.: A lightweight image encryption algorithm based on patterns in Rubik’s revenge cube. Multimed. Tools Appl. 81(20), 28987–28998 (2022)

    Article  Google Scholar 

  39. Yousaf, M.A., Alolaiyan, H., Ahmad, M., Dilbar, M., Razaq, A.: Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access 8, 39781–39792 (2020). https://doi.org/10.1109/ACCESS.2020.2975880

    Article  Google Scholar 

  40. Zhang, L., Wu, R., Zhang, Y., Zheng, Y., Wu, W.: LLLWBC: a new low-latency light-weight block cipher. In: International Conference on Information Security and Cryptology, pp. 23–42. Springer (2023)

  41. Zhang, X., Tang, S., Li, T., Li, X., Wang, C.: GFRX: a new lightweight block cipher for resource-constrained IoT nodes. Electronics 12(2), 405 (2023)

    Article  Google Scholar 

  42. Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)

    Article  Google Scholar 

Download references

Acknowledgements

Jugal Gandhi would like to acknowledge the fellowship support provided by CSIR-HRDG through CSIR-GATE-SRF.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jai Gopal Pandey.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jhawar, K., Gandhi, J., Shekhawat, D. et al. Modeling, hardware architecture, and performance analyses of an AEAD-based lightweight cipher. J Real-Time Image Proc 21, 32 (2024). https://doi.org/10.1007/s11554-024-01416-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11554-024-01416-w

Keywords

Navigation