2020
DOI: 10.3390/electronics9091548
|View full text |Cite
|
Sign up to set email alerts
|

Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things

Abstract: As the technology of Internet of Things (IoT) evolves, abundant data is generated from sensor nodes and exchanged between them. For this reason, efficient encryption is required to keep data in secret. Since low-end IoT devices have limited computation power, it is difficult to operate expensive ciphers on them. Lightweight block ciphers reduce computation overheads, which are suitable for low-end IoT platforms. In this paper, we implemented the optimized CHAM block cipher in the counter mode of operation, on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Therefore, it is the key to form a strong emergency organization network system to clarify responsibilities, implement responsibilities, and promote coordination and cooperation. For accidents that occur, medical malpractices should be classified and graded first [ 23 , 24 ] and then implemented by emergency agencies of corresponding levels. When the accident disaster situation expands, immediately report to the emergency agencies of the next level to be responsible for the implementation.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is the key to form a strong emergency organization network system to clarify responsibilities, implement responsibilities, and promote coordination and cooperation. For accidents that occur, medical malpractices should be classified and graded first [ 23 , 24 ] and then implemented by emergency agencies of corresponding levels. When the accident disaster situation expands, immediately report to the emergency agencies of the next level to be responsible for the implementation.…”
Section: Introductionmentioning
confidence: 99%
“…This implementation utilized a pre-calculation technique with a counter mode of operation. In [9], parallel implementations were presented.…”
Section: E Related Workmentioning
confidence: 99%
“…LUT#1 3 Optimization of Counter Mode of Operation for 16-bit Architecture: The counter mode of operation can be skipped through pre-computation with constant variables [2]. Previous works have been devoted to improve the performance of counter mode through the precomputation [2,[20][21][22][23][24]. The input of counter mode of operation consists of counter (32-bit) and constant nonce (96-bit).…”
Section: Algorithmmentioning
confidence: 99%