Academic literature on the topic 'Lightweight Encryption Algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Lightweight Encryption Algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Lightweight Encryption Algorithm"

1

Nyssanbayeva, Saule, Nursulu Kapalova, Armiyanbek Haumen, and Olzhas Suleimenov. "The LBC-3 lightweight encryption algorithm." Open Engineering 12, no. 1 (2022): 570–77. http://dx.doi.org/10.1515/eng-2022-0372.

Full text
Abstract:
Abstract This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys. The main characteristics of this lightweight algorithm and all the transformations used in the encryption and decryption processes are described. The process of generating the round keys of the algorithm is also considered. The results of the study of the cryptographic properties of the algorithm using the “avalanche effect” and statistical tests are presented. The avalanche property was
APA, Harvard, Vancouver, ISO, and other styles
2

Abdul Hussien, Farah Tawfiq, Abdul Monem S. Rahma, and Hala Bahjat Abdul Wahab. "A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites." Security and Communication Networks 2021 (December 24, 2021): 1–15. http://dx.doi.org/10.1155/2021/9961172.

Full text
Abstract:
Providing security for transmitted data through the e-commerce environment requires using a fast and high secure encryption algorithm. Balancing between the speed and the security degree is a problem that many of the encryption algorithms suffer from. Increasing the security degree requires increasing the level of complexity which results in increasing encryption time. On the other hand, increasing the algorithm speed may reduce the complexity degree which affects the security level. This paper aims to design an encryption algorithm that balances time and complexity (speed and security). This
APA, Harvard, Vancouver, ISO, and other styles
3

Dunmore, Aeryn, Juliet Samandari, and Julian Jang-Jaccard. "Matrix Encryption Walks for Lightweight Cryptography." Cryptography 7, no. 3 (2023): 41. http://dx.doi.org/10.3390/cryptography7030041.

Full text
Abstract:
In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer example Key Matrices and show the efficiency of the proposed method, which operates in linear complexity with an extremely large key space and low-resource requirements. We also provide the Proof of Concept code for the encryption algorithm and a detailed analysis of the security of our proposed MEW. The MEW algorithm is designed for low-resource environments such as IoT or smart devices and is therefore intended to be simp
APA, Harvard, Vancouver, ISO, and other styles
4

Cherckesova, Larissa, Olga Safaryan, Pavel Razumov, Dmitry Medvedev, Veronica Kravchenko, and Yuriy Ivanov. "Analysis of block encryption algorithms being used in devices with restricted amount of technological possibilities." E3S Web of Conferences 224 (2020): 01043. http://dx.doi.org/10.1051/e3sconf/202022401043.

Full text
Abstract:
This report is devoted to the comparative analysis of the lightweight NASH block encryption algorithm and the algorithm presented by USA National Security Agency in 2013 – SPECK. Their detailed description is given, the analysis is made. The task of the study is to investigate and analyze cryptographic encryption algorithms used in devices with limited capabilities such as microcontrollers. The study of lightweight encryption algorithms and their application for cybersecurity tasks is necessary to create the latest cryptographic systems aimed at preventing various types of attacks. The study r
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Xing, Jian Chen, Tianning Li, Gang Dai, and Changda Wang. "LILP: A Lightweight Enciphering Algorithm to Encrypt Arbitrary-Length Messages." Symmetry 15, no. 1 (2023): 177. http://dx.doi.org/10.3390/sym15010177.

Full text
Abstract:
The advancement of the Internet of Things (IoT) has promoted the development of embedded devices. It is important to ensure data transmission security on embedded devices with limited computing power and storage space. However, the traditional block encryption algorithm cannot run efficiently on embedded devices because of the large amount of computation. In this paper, a lightweight length-preserving-encryption algorithm (LILP) is proposed to convert an n-bit block cipher into a special block cipher that supports an arbitrary length of no less than 2n bits as input. LILP adopts the involution
APA, Harvard, Vancouver, ISO, and other styles
6

Kapalova, Nursulu, Kunbolat Algazy, and Armanbek Haumen. "Development of a new lightweight encryption algorithm." Eastern-European Journal of Enterprise Technologies 3, no. 9 (123) (2023): 6–19. http://dx.doi.org/10.15587/1729-4061.2023.280055.

Full text
Abstract:
Lightweight encryption algorithms are considered a relatively new direction in the development of private key cryptography. This need arose as a result of the emergence of a large number of devices with little computing power and memory. Therefore, it became necessary to develop algorithms that can provide a sufficient level of security, with minimal use of resources. The paper presents a new lightweight LBC encryption algorithm. LBC is a 64–bit symmetric block algorithm. It supports 80 bit secret key. The number of rounds is 20. The algorithm has a Feistel network structure. The developed lig
APA, Harvard, Vancouver, ISO, and other styles
7

Bahrami, Saeed, and Majid Naderi. "Image Encryption Using a Lightweight Stream Encryption Algorithm." Advances in Multimedia 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/767364.

Full text
Abstract:
Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. These tests include visual test, histogram analysis, information entropy, encryption quality, correlation analysis, differential analysis, and performance analysis. Based on this analysis, it can be concluded that the present algorithm in comparison to A5/1 a
APA, Harvard, Vancouver, ISO, and other styles
8

Fadhil, Heba Mohammed, Mohamed Elhoseny, and Baydaa M. Mushgil. "Protecting Medical Data on the Internet of Things with an Integrated Chaotic-GIFT Lightweight Encryption Algorithm." Journal of Cybersecurity and Information Management 12, no. 1 (2023): 50–66. http://dx.doi.org/10.54216/jcim.120105.

Full text
Abstract:
The secure transmission of medical data is crucial for the protection of patients' privacy and confidentiality. With the advent of IoT in healthcare, medical data is being transmitted over networks that are vulnerable to cyberattacks. Therefore, there is an urgent need for lightweight yet secure encryption algorithms that can protect medical data in transit. In this paper, we propose an integrated Chaotic-GIFT algorithm for lightweight and robust encryption of medical data transmitted over IoT networks. The proposed algorithm combines the chaos theory with a lightweight block cipher to provide
APA, Harvard, Vancouver, ISO, and other styles
9

Tong, Xiaojun, Xudong Liu, Jing Liu, Miao Zhang, and Zhu Wang. "A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box." International Journal of Bifurcation and Chaos 31, no. 10 (2021): 2150152. http://dx.doi.org/10.1142/s0218127421501522.

Full text
Abstract:
Due to high computational cost, traditional encryption algorithms are not suitable for the environments in which resources are limited. In view of the above problem, we first propose a combined chaotic map to increase the chaotic interval and Lyapunov exponent of the existing one-dimensional chaotic maps. Then, an S-box based on the proposed combined chaotic map is constructed. The performances of the designed S-box, such as bijection, nonlinearity, strict avalanche criteria, differential uniformity, the bits independence criterion, and the linear approximation probability, are tested to show
APA, Harvard, Vancouver, ISO, and other styles
10

Abdalrazzaq, Alaa, and Salah Alabady. "Design and Implementation of a Lightweight and Fast Tiny Advanced Encryption Standard Algorithm." Jordan Journal of Electrical Engineering 8, no. 4 (2022): 339. http://dx.doi.org/10.5455/jjee.204-1658696772.

Full text
Abstract:
Cryptographic algorithms are gaining importance due to their relevance and importance in the areas of privacy and security experienced by the Internet of Things (IoT) devices. They improve data privacy and confidentiality by limiting who can decrypt the data to the person who has the key. Advanced encryption standard (AES) is one of the most important encryption algorithms in use. This algorithm uses 10 rounds for each encryption and decryption process and encrypts data starting with 16 bytes, which increases the time needed for encryption and decryption. In order to speed up encryption and de
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!