2021
DOI: 10.1007/s42452-021-04425-7
|View full text |Cite
|
Sign up to set email alerts
|

An improved chacha algorithm for securing data on IoT devices

Abstract: In recent years, revolution of development was exceedingly quick in the Internet. Nevertheless, instead of only linking personal computers, mobiles and wearable equipment's, Internet growths from a web binding to true world physical substances that is indicated to novel connotation, which is labeled as Internet of Things (IoT). This concept is utilized in many scopes like education, health care, agriculture and commerce. IoT devices are presented with batteries to have independence from electric current; conse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Its shortcomings include large propagation time and prone to various attacks, including cryptanalysis attacks. CHACHA stream cipher 69 was the variant of Salsa20 and is commonly referred to as Snuffle 2008. It exhibits a modified round function and takes an identical structure to Salsa.…”
Section: Lightweight Encryptionmentioning
confidence: 99%
“…Its shortcomings include large propagation time and prone to various attacks, including cryptanalysis attacks. CHACHA stream cipher 69 was the variant of Salsa20 and is commonly referred to as Snuffle 2008. It exhibits a modified round function and takes an identical structure to Salsa.…”
Section: Lightweight Encryptionmentioning
confidence: 99%
“…Many associated resource-constrained devices aren't equipped to perform costly traditional cryptographic computations, making it challenging to implement appropriate cryptographic functionality. Lightweight symmetric cryptography has recently been developed, allowing for a faster cryptographic process with fewer computer processes [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…The Blockchain employs cryptography in a variety of ways, particularly for security and privacy features. Cryptography is used in a variety of applications, including digital signatures, wallet generation, and secure transparent transactions [9][10][11]. As shown in Figure 1, hashing, digital signatures, and Merkle Trees are some of the most important cryptographic techniques utilized in blockchain [12].…”
Section: Introductionmentioning
confidence: 99%