Abstract

Information security is considered as a very critical issue in the transmission of information. Therforelossing or threatening the information transmission will therefore be a great loss in the process of transmitting the information. Recently, Lightweight block cipher Algorithms have gained wide acceptance and it is used in restricted applications, such as electronic passport, smart card, etc. In this study, a modified HISEC algorithm is proposed to enhance and improve the original HISEC algorithm by introducing the concept of a key dependent S-box. This proposal algorithm aims to generate a safer block of code and solve the problem of the fixed structure of the used S-box that was a vulnerability for the attacker. It was an impenetrable barrier facing the attacks of the (Linear cryptanalysis) and (Differential Cryptanalysis). The proposed algorithm showed some improvements when comparing it to the orginal algorithm.

Highlights

  • There are many important applications that need high security lightweight block cipher algorithm like credit card, electronic passport, etc

  • Cryptanalysis is a major element in examining the security of the algorithm as it is used to evaluate the security of any algorithm and this is done by using the cryptanalysis test

  • It shows thecalculated cost of the proposed Highest Security Lightweight block cipher (HISEC) algorithm according to each operation in the algorithm based on what will be done and what it requires from GE

Read more

Summary

Introduction

There are many important applications that need high security lightweight block cipher algorithm like credit card, electronic passport, etc. High security lightweight block cipher algorithm have gained more attention recently. An investigation on the issue aiding write operations on the outsourced data for clients using mobile devices was presented. The Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme was considered because it is convenient in aiding access control in outsourced cloud environments. One of the flaws of CP-ABE is that users can adjust the access policy stated by the data owner if write operations are included in the scheme. The implementation and comprehensive performance analysis of the scheme indicated that the proposed scheme was satisfactory for real mobile applications. The security analysis indicates that the security characteristics of the system were not exposed

Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call