Advertisement

Lightweight Cipher Using GRP Bit Permutation and Tweak

  • Aruna GawadeEmail author
  • Narendra Shekokar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 940)

Abstract

Internet of Things (IoT) is a network of sensors which are able to connect and exchange data. IoT uses RPL (Routing Protocol for Low power and lossy network) as a routing protocol. This protocol uses Rank mechanism where each node is given a rank based on their proximity from the root node. But malicious nodes can advertise fake rank information to be a part of the graph and get sensitive information.

RPL uses AES/CCMP as a security mechanism to send messages securely but as AES/CCMP is designed for non-constrained environment and IoT is a network of lightweight constrained devices there is a need for lightweight cryptographic algorithms. PRESENT is the best lightweight encryption protocol. In this paper we have modified the P-Box of PRESENT using GRP bit permutation operations and also incorporated tweak structure to ensure security. Our algorithm shows better results in terms of execution time when compared with existing PRESENT protocol.

Keywords

PRESENT GRP AES Tweak 

References

  1. 1.
    Mckay, K.A., Bassham, L., Turan, M.S., Mouha, N.: Report on lightweight cryptography, NISTIR 8114Google Scholar
  2. 2.
    Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)Google Scholar
  3. 3.
    Shi, Z., Lee, R.B.: Bit permutation instructions for accelerating software cryptography. IEEE (2000)Google Scholar
  4. 4.
    Raval, N., Bansod, G., Pisharoty, N.: Implementation of efficient bit permutation box for embedded security. WSEAS Trans. Comput. 13, 442–451 (2014)Google Scholar
  5. 5.
    Bansod, G., Raval, N., Pisharoty, N.: Implementation of a new lightweight encryption design for embedded security. IEEE Trans. Inf. Forensics Secur. 10(1), 142–151 (2015)CrossRefGoogle Scholar
  6. 6.
    Pehlivanoglu, M.K., Akleylek, S., Tolga Sakall, M.: On the design strategies of diffusion layers and key schedule in lightweight block ciphers. IEEE (2017)Google Scholar
  7. 7.
    James, M., Kumar, D.S.: An implementation of modified lightweight advanced encryption standard in FPGA. RAEREST (2016)Google Scholar
  8. 8.
    Liskov, M., Rivest, R.: Tweakable block ciphers. J. Cryptol. 24, 588–613 (2011)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Saputro, N., Akkaya, K., Uludag, S.: A survey of routing protocols for smart grid communications. Comput. Netw. 56(11), 2742–2771 (2012)CrossRefGoogle Scholar
  10. 10.
    Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-Bit Blockcipher CLEFIA (Extended Abstract). Springer, Heidelberg (2007)Google Scholar
  11. 11.
  12. 12.
  13. 13.
  14. 14.
  15. 15.
    Gawade, A.U., Shekokar, N.: Lightweight secure RPL: a need in IoT. In: International Conference on Information Technology (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Computer Engineering DepartmentD.J. Sanghvi College of EngineeringMumbaiIndia

Personalised recommendations