Abstract
Information security is considered as a very critical issue in the transmission of information. Therforelossing or threatening the information transmission will therefore be a great loss in the process of transmitting the information. Recently, Lightweight block cipher Algorithms have gained wide acceptance and it is used in restricted applications, such as electronic passport, smart card, etc. In this study, a modified HISEC algorithm is proposed to enhance and improve the original HISEC algorithm by introducing the concept of a key dependent S-box. This proposal algorithm aims to generate a safer block of code and solve the problem of the fixed structure of the used S-box that was a vulnerability for the attacker. It was an impenetrable barrier facing the attacks of the (Linear cryptanalysis) and (Differential Cryptanalysis). The proposed algorithm showed some improvements when comparing it to the orginal algorithm.
Highlights
There are many important applications that need high security lightweight block cipher algorithm like credit card, electronic passport, etc
Cryptanalysis is a major element in examining the security of the algorithm as it is used to evaluate the security of any algorithm and this is done by using the cryptanalysis test
It shows thecalculated cost of the proposed Highest Security Lightweight block cipher (HISEC) algorithm according to each operation in the algorithm based on what will be done and what it requires from GE
Summary
There are many important applications that need high security lightweight block cipher algorithm like credit card, electronic passport, etc. High security lightweight block cipher algorithm have gained more attention recently. An investigation on the issue aiding write operations on the outsourced data for clients using mobile devices was presented. The Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme was considered because it is convenient in aiding access control in outsourced cloud environments. One of the flaws of CP-ABE is that users can adjust the access policy stated by the data owner if write operations are included in the scheme. The implementation and comprehensive performance analysis of the scheme indicated that the proposed scheme was satisfactory for real mobile applications. The security analysis indicates that the security characteristics of the system were not exposed
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Turkish Journal of Computer and Mathematics Education (TURCOMAT)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.