2017 International Symposium on Signals, Circuits and Systems (ISSCS) 2017
DOI: 10.1109/isscs.2017.8034875
|View full text |Cite
|
Sign up to set email alerts
|

Extended DES algorithm to Galois Fields

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…CONSTRAINED IOT DEVICES According to [26], IoT devices are known for their limited memory space and computational capabilities, and conventional solutions such as encryption methods are inadequate to solve many privacy concerns. According to [27], the running time of the algorithm imposes a constraint on its applicability in several domain. In favor of the narrative of constrained IoT devices, they proposed that an extension of DES into Galois fields of GF (16) with a 256-bits key might be a good alternative to the advanced encryption standard if the technology is sufficiently developed to run fast enough.…”
Section: Background Of Complexity Reduction Aimed Atmentioning
confidence: 99%
See 2 more Smart Citations
“…CONSTRAINED IOT DEVICES According to [26], IoT devices are known for their limited memory space and computational capabilities, and conventional solutions such as encryption methods are inadequate to solve many privacy concerns. According to [27], the running time of the algorithm imposes a constraint on its applicability in several domain. In favor of the narrative of constrained IoT devices, they proposed that an extension of DES into Galois fields of GF (16) with a 256-bits key might be a good alternative to the advanced encryption standard if the technology is sufficiently developed to run fast enough.…”
Section: Background Of Complexity Reduction Aimed Atmentioning
confidence: 99%
“…Effectively implementing conventional security mechanisms in the IoT domain is challenging as most of state-of-the-art mechanisms are too heavy to suit for the tiny and resource constrained IoT devices [38]. Leading classical security algorithms which have been widely used for encrypting messages include; but not limited to the Data Encryption Standard (DES) [33], [39], [40], the Triple Data Encryption Standard (3DES) [27], [41], and the Advanced Encryption Standard (AES) [33], [39], [42]-[44]. On the security standing of these classical algorithms and their viability in the rapidly developing IoT landscape, while DES has been widely accepted as insecure and although the security of the 3DES is being adjudged to be reasonably secure [40] in certain applications, the properties of 3DES when juxtaposed with the characteristics of constrained IoT devices shows no viability as according to [41], the triple encryption/decryption in comparison to standard DES triples the cost of required resources and latency as a corresponding consequence, resulting in the 3DES being slower than other cipher algorithms [45] [31].…”
Section: Related Work a Constrained Iot Devices And Security Algomentioning
confidence: 99%
See 1 more Smart Citation