IMPROVING SECURITY ANALYSIS OF IOT ENCRYPTION
@article{BSurya2018IMPROVINGSA, title={IMPROVING SECURITY ANALYSIS OF IOT ENCRYPTION}, author={B.Surya and A.V.Sai Prasad and V.Rajesh Kumar and I. Chandra}, journal={International Journal of Advance Research and Innovative Ideas in Education}, year={2018}, volume={4}, pages={257-261} }
A product device for security examination of IoT frameworks is displayed using SIMECK. The instrument, named ASTo (Apparatus Programming Tool) empowers the perception of IoT frameworks utilizing an area particular demonstrating dialect. The displaying dialect gives develops to express the equipment, programming and social ideas of an IoT framework alongside security ideas. Security issues of IoT frameworks are distinguished dependent on the properties of the develops and their connections…
No Paper Link Available
References
SHOWING 1-10 OF 22 REFERENCES
Constraints in the IoT: The World in 2020 and Beyond
- Computer Science
- 2016
This paper surveys major technical limitations that are hindering the successful deployment of the IoT such as standardization, interoperability, networking issues, addressing and sensing issues, power and storage restrictions, privacy and security, etc.
Integrating RFIDs and Smart Objects into a Unified Internet of Things Architecture
- Computer ScienceAdv. Internet Things
- 2011
A generic Internet of Things architecture trying to resolve the existing restrictions of current architectural models by integrating both RFID and smart object-based infrastructures, while also exploring a third parameter, i.e. the social potentialities of the Internet of Thing building blocks towards shaping the “Social Internet of things”.
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
- Computer Science, MathematicsIEEE Transactions on Information Forensics and Security
- 2016
A comprehensive study of AFA on an ultra-lightweight block cipher called LBlock shows that a single fault injection is enough to recover the master key of LBlock within the affordable complexity in each scenario.
On the Security of NOEKEON against Side Channel Cube Attacks
- Computer Science, MathematicsISPEC
- 2010
This paper investigates the security of the NOEKEON block cipher against side channel cube attacks and shows that it is possible to extract 60 independent linear equations over 99 (out of 128) key variables.
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Computer Science, MathematicsCHES
- 2009
A new family of very efficient hardware oriented block ciphers divided into two flavors, which is more compact in hardware, as the key is burnt into the device (and cannot be changed), and achieves encryption speed of 12.5 KBit/sec.
Security evaluation on Simeck against zero-correlation linear cryptanalysis
- Computer Science, MathematicsIET Inf. Secur.
- 2018
This study evaluates the security level of Simeck against zero-correlation linear cryptanalysis and proposes a new block cipher inspired from both SIMON and SPECK, which is more compact and efficient.
Efficient Hamming weight-based side-channel cube attacks on PRESENT
- Computer Science, MathematicsJ. Syst. Softw.
- 2013
The Simeck Family of Lightweight Block Ciphers
- Computer Science, MathematicsCHES
- 2015
This paper introduces Simeck, a new family of lightweight block ciphers that combines the good design components from both Simon and Speck, in order to devise even more compact and efficient blockciphers.
Side Channel Cube Attack on PRESENT
- Computer Science, MathematicsCANS
- 2009
The non-random properties in the first four rounds of PRESENT are detected based on cube attack proposed by Shamir et al. by analyzing the features of the S-box and pLayer and giving the side channel cube attack on PRESENT.
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2015
A new framework for an efficient key recovery attack on block ciphers using a kind of dynamic cube attack, where a cube tester is positioned at the middle of the cipher which is extended in two directions over the maximum possible upper and lower rounds, provided that some subkey bits are guessed.