2021
DOI: 10.1109/jiot.2021.3064203
|View full text |Cite
|
Sign up to set email alerts
|

Shadow: A Lightweight Block Cipher for IoT Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 46 publications
(11 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…Representative lightweight block ciphers include ULC [13], PRESENT [14], GIFT [15], Midori [16], Piccolo [17], and RECTANGLE [18]. The nonlinear components in the second category are mainly modular addition operations (⊞), AND operations (&), etc., such as HIGHT [19], SIMON and SPECK [20], Simeck [21], CHAM [22], Shadow [23], and SAND [24].…”
Section: Related Workmentioning
confidence: 99%
“…Representative lightweight block ciphers include ULC [13], PRESENT [14], GIFT [15], Midori [16], Piccolo [17], and RECTANGLE [18]. The nonlinear components in the second category are mainly modular addition operations (⊞), AND operations (&), etc., such as HIGHT [19], SIMON and SPECK [20], Simeck [21], CHAM [22], Shadow [23], and SAND [24].…”
Section: Related Workmentioning
confidence: 99%
“…The cryptographic algorithm based on ARX realizes the nonlinearity, ambiguity, and diffusion of the algorithm through the combination of Addition, Rotation, and XOR. According to the report of FelICS [23], the block cipher implementation of ARX is superior to other S-box-based ciphers, and some ARX algorithms specially designed for IoT nodes have emerged [24][25][26][27].…”
Section: Status Quo Of Arx Lightweight Algorithms In Iot Applicationsmentioning
confidence: 99%
“…In [20], another block cipher based on Feistel network is proposed, which uses a 64-bit key size and an effective key update mechanism to ensure a medium-level security. In [21], another system combines generalized Feistel structure (GFS) with "AND", "Rotation", and "XOR" (ARX) operations. In [22], a hybrid encryption scheme with a 128-bit key is proposed, which encrypts and decrypts the data collected by the fog node.…”
Section: Literature Reviewmentioning
confidence: 99%