Evaluation of Lightweight Block Ciphers Based on General Feistel Structure (GFS)

Authors

  • Dr. Bassam. W. Aboshosha Department of Computer Engineering, Higher Institute of Engineering, Elshorouk Academy, Cairo , Egypt
  • Dr. Mohamed M. Dessouky Department of Computer Engineering, Menoufia University, Menoufia, Egypt
  • Dr. Rabie. A. Ramadan
  • Dr. Ayman El-Sayed
  • Dr. Fatma H. Galalb

Keywords:

Constraint devices, lightweight cryptographic, IoT, WSNs, RFID, GFS

Abstract

Recently, lightweight block cipher has become a hot topic, which is a key technology to ensure the security of communications among constrained devices such as WSNs, RFID, and IoT. Therefore, hundreds of lightweight block ciphers have been proposed. The architecture of these ciphers is influenced by the balance between protection, efficiency, and costs. Therefore, efficient evaluation methods should be established. This paper outlines the performance analysis of three generalized Feistel lightweight block crypto ciphers - CLEFIA, PICCOLO, and TWINE. Various benchmark parameters, such as area, throughput, and power, need to be considered to analyze such algorithms. The algorithms are also tested for various key and plaintext sizes. This comparison sets the base for other algorithms to be tested and evaluated.  It also encourages the researchers to look after different lightweight algorithms that could be utilized the best in certain applications instead of generalizing their purposes. Moreover, it shows the performance of the selected algorithms on Hardware, where most of the proposed algorithms are examined on software only. 

References

Stallings, W. Cryptography and Network Security: Principles and Practice 0133354695, 9780133354690.

Author 1, A.; Author 2, B. Title of the chapter. In Book Title, 2nd ed.; Editor 1, A., Editor 2, B., Eds.; Publisher: Publisher Location, Country, 2007; Volume 3, pp. 154–196.

Ramadan, R., & Medhat, K. (2021). Intrusion Detection Based Learning in Wireless Sensor Networks. PLOMS AI, 1(2).

Lai, X., Massey, J. L., & Murphy, S. (1991, April). Markov ciphers and differential cryptanalysis. In Workshop on the Theory and Application of of Cryptographic Techniques (pp. 17-38). Springer, Berlin, Heidelberg.

Trappe, W. (2006). Introduction to cryptography with coding theory. Pearson Education India.

Schneier, B. (1993, December). Description of a new variable-length key, 64-bit block cipher (Blowfish). In International Workshop on Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg.

Daemen, J., & Rijmen, V. (2001). Reijndael: The Advanced Encryption Standard. Dr. Dobb's Journal: Software Tools for the Professional Programmer, 26(3), 137-139.

Ertaul, L., & Rajegowda, S. K. (2017). Performance analysis of CLEFIA, PICCOLO, TWINE Lightweight block ciphers in IoT environment. In Proceedings of the International Conference on Security and Management (SAM) (pp. 25-31). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).

Downloads

Published

2018-09-20

How to Cite

W. Aboshosha, B., M. Dessouky, M. ., A. Ramadan, R. ., El-Sayed, A. ., & H. Galalb, F. . (2018). Evaluation of Lightweight Block Ciphers Based on General Feistel Structure (GFS). WAS Science Nature (WASSN) ISSN: 2766-7715, 1(1). Retrieved from https://worldascience.org/journals/index.php/wassn/article/view/32

Issue

Section

Computer Science & Mathematics