+ All Categories
Home > Documents > secuity ppt

secuity ppt

Date post: 07-Jul-2018
Category:
Upload: aaka-sh
View: 217 times
Download: 0 times
Share this document with a friend

of 18

Transcript
  • 8/18/2019 secuity ppt

    1/18

    LIGHTWEIGHT SECURITYALGORITHM FOR WIRELESS

    NODE CONNECTED WITH IOT AUTHORS

    D Aakash

    P Shanthi

    Presented by

     NAME: D. Aakash

    COURSE: M.Tech -Embedded Systems

      SASTRA UNIVERSITY

  • 8/18/2019 secuity ppt

    2/18

    CONTENTS

    • Objective

    • Introdction

    • !iteratre Srvey

    • Re"ated #orks

    • Pro$osed sche%e

    • &"ock Dia'ra%

    • Desi'n ("o# Dia'ra%• Hard#are Ot$t

    • Conc"sion

  • 8/18/2019 secuity ppt

    3/18

    O&)ECTI*E

    • To deter%ine a !i'ht#ei'ht Secrity Encry$tion a"'orith%

    +or Resorce Constrained A$$"ication

    •In this, the co%bination o+ Sbstittion and Per%tation issed to brin' ot a ci$her that can #ithstand certain

    cry$tana"ysis

    I%$"e%entation o+ the a"'orith% in a $rototy$e thatsecre"y share sensor data +or IoT a$$"ication

  • 8/18/2019 secuity ppt

    4/18

    Introdction

    • -ire"ess Sensor Net#ork is a #ide +ie"d that on"y re"y on the

    sensor data.

    • IoT /Internet o+ thin'0 is an e1tension o+ -SN ,#here #e se

    c"od +or trans%ission and rece$tion o+ data any#here .

    • 2ajor +actor considered• Resorce

    • 2e%ory• Po#er 

    • E1ection Ti%e

    •  Secrity a"'orith% %st be a trade o++ to a"" these +actors

  • 8/18/2019 secuity ppt

    5/18

    Internet O+ Thin's

    • 3evin Ashton coined 4Internet o+ Thin's4 $hrase to

    describe a syste% #here the Internet is connected to the

    $hysica" #or"d via bi5itos sensors

    • Key Open Issues o !he IoT•  Architectre /ed'e devices, servers, discovery services, $rivacy

    etc.0

    • secrity

    • 6overnance, na%in', identity, inter+aces• Service o$enness, intero$erabi"ity

    • Connections o+ rea" and virta" #or"d

    • S$ectr% /H(, UH(, IS2 etc.70

    • Standards

  • 8/18/2019 secuity ppt

    6/18

    !i'ht#ei'ht Cry$to'ra$hy

    • Sy%%etric Cry$to'ra$hy *s Asy%%etric Cry$to'ra$hy

    • &"ock and Strea% Ci$her 

    • -hy &"ock Ci$her7

    • Secrity

    •Hi'her Thro'h$t

    • !o# $o#er Cons%$tion

    • Co%$actness

    • !ess 6ate E5iva"ents

  • 8/18/2019 secuity ppt

    7/18

    S.NO PAPER TIT!E PU&!ICATION DESCRIPTION

    8. A co%$rehensive

    srvey o+ %odern

    sy%%etric

    cry$to'ra$hic so"tions

    +or resorce

    constrained

    environ%ents

    )orna" o+ Net#ork and

    Co%$ter A$$"ications

    Srvey o+ varios !-C a"'orith%s.

    9. !i'ht#ei'ht

    Cry$to'ra$hy +or

    (P6As

    Internationa" Con+erence on

    Recon+i'rab"e Co%$tin'

    and (P6As, 9::;

    Pro$ose "i'ht#ei'ht cry$to'ra$hy

    +or (P6As by introdcin' b"ock

    ci$her inde$endent o$ti%i

  • 8/18/2019 secuity ppt

    8/18

    . Per+or%ance Ana"ysis o+

    Ne# !i'ht -ei'ht

    Cry$to'ra$hic

     A"'orith%s

    IOSR )orna" o+ Co%$ter

    En'ineerin' /IOSR)CE0 ,

    9:89

    H%%in' &irdB9 and PRESENT are

    t#o recent"y $ro$osed !i'ht #ei'ht

    cry$to'ra$hic a"'orith%s .

    Per+or%ance ana"yses o+ these t#oe++icient a"'orith%s are done in this

    $a$er.

    . PRESENTAn "traB

    "i'ht#ei'ht b"ock ci$her

    in Cry$to'ra$hicHard#are and

    E%bedded Syste%s

    S$rin'er, 9::

    vo". 9

    Sbstittion Per%tation net#ork +or

    E1tre%e"y resorce constrained

    On"y co%%ensrate "eve" o+ secrityHi'h e1ection Ti%e

    !atency

    F. The 89G

    bit b"ock ci$her C!E(IA

    in (ast So+t#areEncry$tion

    S$rin'er, 9::

    vo". ;>

    (iesta" strctre #ith Sbstittion

    bo1 2ore secre

    Cons%e %ore s$ace de to "ar'ern%ber o+ ronds

    . TEA, a tiny encry$tion

    a"'orith%

    in (ast So+t#are

    Encry$tion

    S$rin'er, 8;;

    vo". 8::G

    Si%$"est a"'orith%

    (e# "ines o+ code

    Easi"y breakab"e

  • 8/18/2019 secuity ppt

    9/18

    Re"ated -orks

    2ethod Descri$tion !i%itation

    PRESENT Sbstittion Per%tation net#ork+or E1tre%e"y resorceconstrained

    On"y co%%ensrate "eve"o+ secrityHi'h e1ection Ti%e!atency

    !ED Co%bination o+ PRESENT AESSPN

    (aster in so+t#are ands"o#er in Hard#areCons%es %ore ener'yin hard#are

    C!E(IA (iesta" strctre #ith Sbstittion

    bo12ore secre

    Cons%e %ore s$ace

    de to "ar'er n%ber o+ronds

    TEA Si%$"est a"'orith%(e# "ines o+ code

    Easi"y breakab"e

    SEA !atency is "ess

    (iesta" Strctre

    6ate e5iva"ent is hi'her

    hence %e%ory re5ired is%ore

  • 8/18/2019 secuity ppt

    10/18

    GRP :A BIT PERMUTATION INSTRUSTION

    8 bit GRP e!m"t#ti$%

    PROPOSE& SC'EME:

     Permutation Merit Demerit 

    GRP Uses (esse! mem$!y #%d

    (ess GE C$"%t

    Bette! c!yt$)!#hic

     !$e!ties

     N"mbe! $* st#)es +#!ies

    ,ith %"mbe! $* bits

    #te%cy i%c!e#se ,ith

     bits sie i%c!e#ses

    OM/IP0Omega-Flip)

    Oe!#te i% si%)(e cyc(e #%d"ses /i1ed %"mbe! $*

    st#)es *$! e!m"ti%)

    ess #te%cy

    E#si(y !e+e!sib(e

    &&R 

    0 Data-Dependent

    rotation)

    E#sy t$ im(eme%t $%(y *$!

    sm#(( *!#cti$% $* bit,ise

    $e!#ti$%

    #te%cy is m$!e #%d

    !e2"i!e m$!e cyc(es

    PPERM3R 

     

    I% this the c$%t!$( bit is

    e#sy t$ )e%e!#te s"$!t!eetiti$% #%d !es"(t i% the

    midd(e $* e!m"t#ti$% c#%

     be $bt#i%ed

    #te%cy is m$!e

    I%iti#(i#ti$% !$cesst#4es time

    5% e!m"t#ti$% is h#!de!

    *!$m % e!m"t#ti$%

    T#b(e $$4" This meth$d is *#ste! 

    A%d e#sy t$ im(eme%t i%

    '#!d,#!e

    It c$%s"mes m$!e

    mem$!y6 (#te%cy is m$!e

    #%d !e2"i!e m$!e %"mbe!

    $* i%st!"cti$%s

  • 8/18/2019 secuity ppt

    11/18

    TRANSPOSITION CIPHER

    • 6RP bit "eve" $er%tation ses "ess %e%ory

    • There+ore $o#er cons%$tion is a"so "ess

  • 8/18/2019 secuity ppt

    12/18

    PRESENTB6RP A NE- HJ&RID

    !I6HT-EI6HT DESI6N• 6RP Per%tation

    • Si%$"e strctre

    • se !ess 2e%ory s$ace

    •  6RP &it Per%tation "a's in SBbo1

    •  SB&o1 is se"ected +ro% PRESENT a"'orith% is Added

    • Hybrid Strctre consist o+ one Con+sion and one Di++sion

    $ro$erty

    • !esser 6ate e5iva"ent

  • 8/18/2019 secuity ppt

    13/18

    &"ock Dia'ra%

  • 8/18/2019 secuity ppt

    14/18

    Secrity Ana"ysis

    • Di++erentia" Cry$tana"ysis

    • It is sed to e1$"ore the stren'th o+ the a"'orith% by checkin' its

    nonBrando% behavior by 'ivin' certain di++erences in the in$t and

    ot$t to check it is hi'h"y $robab"e that is a hi'h"y secre b"ockci$her

    • !inear Cry$tana"ysis

    • It is done #ith the -a"sh Trans+or% #hich describes the c"oseness

    o+ the &oo"ean +nction f to #hether it is a++ine or "inear +nction

  • 8/18/2019 secuity ppt

    15/18

    Desi'n ("o# Dia'ra%

  • 8/18/2019 secuity ppt

    16/18

    Hard#are Ot$t

  • 8/18/2019 secuity ppt

    17/18

    Conc"sion

    • Enhance the secrity "eve" and ba"ance trade o++ #ith

    $er+or%ance and cost.

    • Secrity "eve" can be i%$roved by %odi+yin' and enhancin' the

    Sbstittion bo1 o+ the a"'orith%

    • To deve"o$ a secre end to end e++icient syste%.

    •  Hard#are i%$"e%entation in "o# $o#er nodes #ithot a++ectin'its nor%a" $er+or%ance

    • Hard#are i%$"e%entation +or -SN secre channe" can be

    done

  • 8/18/2019 secuity ppt

    18/18


Recommended