of 18
8/18/2019 secuity ppt
1/18
LIGHTWEIGHT SECURITYALGORITHM FOR WIRELESS
NODE CONNECTED WITH IOT AUTHORS
D Aakash
P Shanthi
Presented by
NAME: D. Aakash
COURSE: M.Tech -Embedded Systems
SASTRA UNIVERSITY
8/18/2019 secuity ppt
2/18
CONTENTS
• Objective
• Introdction
• !iteratre Srvey
• Re"ated #orks
• Pro$osed sche%e
• &"ock Dia'ra%
• Desi'n ("o# Dia'ra%• Hard#are Ot$t
• Conc"sion
8/18/2019 secuity ppt
3/18
O&)ECTI*E
• To deter%ine a !i'ht#ei'ht Secrity Encry$tion a"'orith%
+or Resorce Constrained A$$"ication
•In this, the co%bination o+ Sbstittion and Per%tation issed to brin' ot a ci$her that can #ithstand certain
cry$tana"ysis
•
I%$"e%entation o+ the a"'orith% in a $rototy$e thatsecre"y share sensor data +or IoT a$$"ication
8/18/2019 secuity ppt
4/18
Introdction
• -ire"ess Sensor Net#ork is a #ide +ie"d that on"y re"y on the
sensor data.
• IoT /Internet o+ thin'0 is an e1tension o+ -SN ,#here #e se
c"od +or trans%ission and rece$tion o+ data any#here .
• 2ajor +actor considered• Resorce
• 2e%ory• Po#er
• E1ection Ti%e
• Secrity a"'orith% %st be a trade o++ to a"" these +actors
8/18/2019 secuity ppt
5/18
Internet O+ Thin's
• 3evin Ashton coined 4Internet o+ Thin's4 $hrase to
describe a syste% #here the Internet is connected to the
$hysica" #or"d via bi5itos sensors
• Key Open Issues o !he IoT• Architectre /ed'e devices, servers, discovery services, $rivacy
etc.0
• secrity
• 6overnance, na%in', identity, inter+aces• Service o$enness, intero$erabi"ity
• Connections o+ rea" and virta" #or"d
• S$ectr% /H(, UH(, IS2 etc.70
• Standards
8/18/2019 secuity ppt
6/18
!i'ht#ei'ht Cry$to'ra$hy
• Sy%%etric Cry$to'ra$hy *s Asy%%etric Cry$to'ra$hy
• &"ock and Strea% Ci$her
• -hy &"ock Ci$her7
• Secrity
•Hi'her Thro'h$t
• !o# $o#er Cons%$tion
• Co%$actness
• !ess 6ate E5iva"ents
8/18/2019 secuity ppt
7/18
S.NO PAPER TIT!E PU&!ICATION DESCRIPTION
8. A co%$rehensive
srvey o+ %odern
sy%%etric
cry$to'ra$hic so"tions
+or resorce
constrained
environ%ents
)orna" o+ Net#ork and
Co%$ter A$$"ications
Srvey o+ varios !-C a"'orith%s.
9. !i'ht#ei'ht
Cry$to'ra$hy +or
(P6As
Internationa" Con+erence on
Recon+i'rab"e Co%$tin'
and (P6As, 9::;
Pro$ose "i'ht#ei'ht cry$to'ra$hy
+or (P6As by introdcin' b"ock
ci$her inde$endent o$ti%i
8/18/2019 secuity ppt
8/18
. Per+or%ance Ana"ysis o+
Ne# !i'ht -ei'ht
Cry$to'ra$hic
A"'orith%s
IOSR )orna" o+ Co%$ter
En'ineerin' /IOSR)CE0 ,
9:89
H%%in' &irdB9 and PRESENT are
t#o recent"y $ro$osed !i'ht #ei'ht
cry$to'ra$hic a"'orith%s .
Per+or%ance ana"yses o+ these t#oe++icient a"'orith%s are done in this
$a$er.
. PRESENTAn "traB
"i'ht#ei'ht b"ock ci$her
in Cry$to'ra$hicHard#are and
E%bedded Syste%s
S$rin'er, 9::
vo". 9
Sbstittion Per%tation net#ork +or
E1tre%e"y resorce constrained
On"y co%%ensrate "eve" o+ secrityHi'h e1ection Ti%e
!atency
F. The 89G
bit b"ock ci$her C!E(IA
in (ast So+t#areEncry$tion
S$rin'er, 9::
vo". ;>
(iesta" strctre #ith Sbstittion
bo1 2ore secre
Cons%e %ore s$ace de to "ar'ern%ber o+ ronds
. TEA, a tiny encry$tion
a"'orith%
in (ast So+t#are
Encry$tion
S$rin'er, 8;;
vo". 8::G
Si%$"est a"'orith%
(e# "ines o+ code
Easi"y breakab"e
8/18/2019 secuity ppt
9/18
Re"ated -orks
2ethod Descri$tion !i%itation
PRESENT Sbstittion Per%tation net#ork+or E1tre%e"y resorceconstrained
On"y co%%ensrate "eve"o+ secrityHi'h e1ection Ti%e!atency
!ED Co%bination o+ PRESENT AESSPN
(aster in so+t#are ands"o#er in Hard#areCons%es %ore ener'yin hard#are
C!E(IA (iesta" strctre #ith Sbstittion
bo12ore secre
Cons%e %ore s$ace
de to "ar'er n%ber o+ronds
TEA Si%$"est a"'orith%(e# "ines o+ code
Easi"y breakab"e
SEA !atency is "ess
(iesta" Strctre
6ate e5iva"ent is hi'her
hence %e%ory re5ired is%ore
8/18/2019 secuity ppt
10/18
GRP :A BIT PERMUTATION INSTRUSTION
8 bit GRP e!m"t#ti$%
PROPOSE& SC'EME:
Permutation Merit Demerit
GRP Uses (esse! mem$!y #%d
(ess GE C$"%t
Bette! c!yt$)!#hic
!$e!ties
N"mbe! $* st#)es +#!ies
,ith %"mbe! $* bits
#te%cy i%c!e#se ,ith
bits sie i%c!e#ses
OM/IP0Omega-Flip)
Oe!#te i% si%)(e cyc(e #%d"ses /i1ed %"mbe! $*
st#)es *$! e!m"ti%)
ess #te%cy
E#si(y !e+e!sib(e
&&R
0 Data-Dependent
rotation)
E#sy t$ im(eme%t $%(y *$!
sm#(( *!#cti$% $* bit,ise
$e!#ti$%
#te%cy is m$!e #%d
!e2"i!e m$!e cyc(es
PPERM3R
I% this the c$%t!$( bit is
e#sy t$ )e%e!#te s"$!t!eetiti$% #%d !es"(t i% the
midd(e $* e!m"t#ti$% c#%
be $bt#i%ed
#te%cy is m$!e
I%iti#(i#ti$% !$cesst#4es time
5% e!m"t#ti$% is h#!de!
*!$m % e!m"t#ti$%
T#b(e $$4" This meth$d is *#ste!
A%d e#sy t$ im(eme%t i%
'#!d,#!e
It c$%s"mes m$!e
mem$!y6 (#te%cy is m$!e
#%d !e2"i!e m$!e %"mbe!
$* i%st!"cti$%s
8/18/2019 secuity ppt
11/18
TRANSPOSITION CIPHER
• 6RP bit "eve" $er%tation ses "ess %e%ory
• There+ore $o#er cons%$tion is a"so "ess
8/18/2019 secuity ppt
12/18
PRESENTB6RP A NE- HJ&RID
!I6HT-EI6HT DESI6N• 6RP Per%tation
• Si%$"e strctre
• se !ess 2e%ory s$ace
• 6RP &it Per%tation "a's in SBbo1
• SB&o1 is se"ected +ro% PRESENT a"'orith% is Added
• Hybrid Strctre consist o+ one Con+sion and one Di++sion
$ro$erty
• !esser 6ate e5iva"ent
8/18/2019 secuity ppt
13/18
&"ock Dia'ra%
8/18/2019 secuity ppt
14/18
Secrity Ana"ysis
• Di++erentia" Cry$tana"ysis
• It is sed to e1$"ore the stren'th o+ the a"'orith% by checkin' its
nonBrando% behavior by 'ivin' certain di++erences in the in$t and
ot$t to check it is hi'h"y $robab"e that is a hi'h"y secre b"ockci$her
• !inear Cry$tana"ysis
• It is done #ith the -a"sh Trans+or% #hich describes the c"oseness
o+ the &oo"ean +nction f to #hether it is a++ine or "inear +nction
8/18/2019 secuity ppt
15/18
Desi'n ("o# Dia'ra%
8/18/2019 secuity ppt
16/18
Hard#are Ot$t
8/18/2019 secuity ppt
17/18
Conc"sion
• Enhance the secrity "eve" and ba"ance trade o++ #ith
$er+or%ance and cost.
• Secrity "eve" can be i%$roved by %odi+yin' and enhancin' the
Sbstittion bo1 o+ the a"'orith%
• To deve"o$ a secre end to end e++icient syste%.
• Hard#are i%$"e%entation in "o# $o#er nodes #ithot a++ectin'its nor%a" $er+or%ance
• Hard#are i%$"e%entation +or -SN secre channe" can be
done
8/18/2019 secuity ppt
18/18