2022
DOI: 10.3390/sym14030604
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys

Abstract: The key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a direct security impact. Despite its undeniable significance, the KSA is still a less focused area in the design of an encryption algorithm. PRESENT is a symmetric lightweight block cipher that provides the optimal balance between security, performance, and minimal cost in IoT. However, the linear functions in KSA lead to a slow and predictable bit transition, indicating the relationship between round keys. A robust KSA shou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 48 publications
0
11
0
Order By: Relevance
“…Although these methods can protect the information in the resource platform, all of them have some shortcomings in one way or another. The commonly used information encryption and decryption algorithms have problems related to key distribution, which may cause indelible losses if the key is leaked or the system is accessed by lifting rights in an open and complex network architecture [31][32][33][34][35]. In some scenarios with high-security-factor requirements, multiple DES is usually used, which further increases the algorithm's complexity by multiple iterations and improves the security of encrypted data to some extent.…”
Section: Related Workmentioning
confidence: 99%
“…Although these methods can protect the information in the resource platform, all of them have some shortcomings in one way or another. The commonly used information encryption and decryption algorithms have problems related to key distribution, which may cause indelible losses if the key is leaked or the system is accessed by lifting rights in an open and complex network architecture [31][32][33][34][35]. In some scenarios with high-security-factor requirements, multiple DES is usually used, which further increases the algorithm's complexity by multiple iterations and improves the security of encrypted data to some extent.…”
Section: Related Workmentioning
confidence: 99%
“…Public key coordinators are calculated based on distance during the t and δt time. Both nodes selected any equation from the elliptic curve in the form of y 2 = x 3 + ax e + b mod p where the condition is that an equation must satisfy the elliptic curve, that is, 4 a 3 + 27b 2 ≠ 0 and find the coordinators on the curve over Z p where p is the modulus [32]. The ECC algorithm calculates secret key points, as shown in algorithm 1.…”
Section: Swarm Intelligence‐based Secure Aodv (Sis‐aodv) Algorithmmentioning
confidence: 99%
“…It is built on a substitution-permutation network and uses 64-bit blocks for the 80-bit and 128-bit keys with GE requirements of 1570 and 1886, respectively. A version of PRE-SENT has a minimal GE requirement of approximately 1000 GE, and it takes between 2520 and 3010 GE to offer sufficient security [32].…”
Section: Encryption Algorithmmentioning
confidence: 99%
“…A substitution box (S-Box) is an essential part of encryption algorithms and aids in performing the nonlinear transformation and causes bits to get confused [16]. Since static S-Box block ciphers employ the same S-Box for every input, they are weak and open to intrusion [17][18] [19]. Dynamic S-Boxes, on the other hand, are more robust and provide greater protection via confusion since they are reliant on key [20][21] [22].…”
Section: Introductionmentioning
confidence: 99%