2019
DOI: 10.3390/sym12010032
|View full text |Cite
|
Sign up to set email alerts
|

MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT

Abstract: Lightweight stream ciphers have attracted significant attention in the last two decades due to their security implementations in small devices with limited hardware. With low-power computation abilities, these devices consume less power, thus reducing costs. New directions in ultra-lightweight cryptosystem design include optimizing lightweight cryptosystems to work with a low number of gate equivalents (GEs); without affecting security, these designs consume less power via scaled-down versions of the Mutual Ir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…As a result, it had a smaller hardware footprint and higher throughput. A2U2, Encoro 80, Encoro 128, MICKEY, 72 SNOW‐3G, and Quavium are other significant ciphers. In 2015, the sprout cipher was suggested.…”
Section: Lightweight Encryptionmentioning
confidence: 99%
“…As a result, it had a smaller hardware footprint and higher throughput. A2U2, Encoro 80, Encoro 128, MICKEY, 72 SNOW‐3G, and Quavium are other significant ciphers. In 2015, the sprout cipher was suggested.…”
Section: Lightweight Encryptionmentioning
confidence: 99%
“…e advanced encryption standard (AES) and error-correcting codes (ECC) are mainly used as basic lightweight encryption elements. Various studies have been aimed to optimize lightweight encryption while balancing security and performance management [69][70][71][72][73][74][75][76].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…Lightweight encryption with low processing time and low power consumption is required to protect and secure data transmissions of resource-constrained IoT devices. Block encryption, such as AES and S-box, Galois Counter Mode, and physical unclonable functions, are being utilized, evaluated, and proposed [70,72,73,[182][183][184][185][186][187][188].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Among the algorithms of public key cryptography, the Rivest, Shamir and Adleman (RSA) [5] and the algorithms based on Eliptic Curve Criptography (ECC) [6,7] stand out. Among the secret key algorithms, the Advanced Encryption Standard (AES) block cipher [8] is the standard approved by National Institute of Standards and Technology (NIST), but there are also many other proposals for lightweight applications such as LED [9] and stream ciphers such as Mickey [10] and Trivium [11].…”
Section: Introductionmentioning
confidence: 99%