2019
DOI: 10.1007/978-3-030-24900-7_1
|View full text |Cite
|
Sign up to set email alerts
|

Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Hybrid block cipher and stream cipher technology were brought by Ragab et al 86 to protect communication by IoT devices. The hybrid technology uses the symmetric cryptography scheme corrected block tiny encryption algorithm (XXTEA) and an asymmetric cryptography scheme of elliptical curve cryptography (ECC) for key generation.…”
Section: Hybrid Cryptosystemmentioning
confidence: 99%
“…Hybrid block cipher and stream cipher technology were brought by Ragab et al 86 to protect communication by IoT devices. The hybrid technology uses the symmetric cryptography scheme corrected block tiny encryption algorithm (XXTEA) and an asymmetric cryptography scheme of elliptical curve cryptography (ECC) for key generation.…”
Section: Hybrid Cryptosystemmentioning
confidence: 99%
“…As a result, numerous hybrid LWC systems have been proposed to effectively safeguard IoT devices with limited resources. Ahmed Ragab and others [29] have made a strong mixture lightweight cryptosystem for safeguarding IoT savvy gadgets by joining three encryption calculations: the XXTEA (symmetric block figure) utilized for privacy; the RSA and ECC utilized for legitimacy, uprightness, and nondisavowed based computerized signature; and the turbulent keys (generator) used to create irregular keys. Their crossover configuration has successfully accomplished secrecy, validness, respectability, and non-renouncement as well as accomplishing the most elevated level of safety and the best presentation, making it equipped for protecting IoT brilliant gadgets from cyberattacks.…”
Section: Review Of Hybrid Crypto Systemmentioning
confidence: 99%
“…Most of PRE schemes used asymmetric cryptography for encryption/decryption. Symmetric Encryption is the good choice for large amount of IoT data as it is relatively faster than asymmetric encryption [21], [22]. Also, the majority of proxy re-encryption schemes proposed have based on pairings.…”
Section: Introductionmentioning
confidence: 99%