Abstract
Digitalization rapidly connected the entire world. Everyday an enormous volumes of digital data produced by billions of intelligent devices which requires safe transmission over internet. If we look into embedded environment, handling massive volume of data is impractical for low power and low memory devices which leads to lightweight concept. The proposed lightweight model includes many symmetric key sequentially. The model follows fiestel network structure where 64 bits input block divided by two 32 bits blocks. Then every half undergoes through various symmetric key algorithms like TE (Triangular Encryption), RPPT (Recursive Pared Parity Technique), RPSPNC( Recursive Positional Substitution on Prime-Nonprime of Cluster), TB(Transformation of Bits) and bits rotation process. A triangular bit sequence generated by TE and from there various encryption as well as decryption techniques[1] have generated by reading bits in a certain order. RPPT encrypts bits by executing logical OR of successive bits. Bit swapping technique is used by TB for encryption and decryption. RPSPNC interchanges bits on the basis of prime-non prime bit position and considers any in between bit sequence as a cipher text. Lastly two resultant sub-blocks are merged to produce cipher text of 64 bits. To check the acceptance of the proposed model, comparisons take place with popular symmetric key algorithm AES and one embedded algorithm RPPT+TB. Software parameters like entropy, n-gram(4-gram), non-homogeneity, histogram are analysed. Hardware analysis of the model ensures us that it falls into lightweight domain by comparing the GE (Gate equivalent) with the ISO /IEC standard value ranges between 1000-2000GE.
References
- Rajdeep Chakraborty, AvishekDatta and JK Mandal “Secure Encryption Technique (SET): A Private Key Crypto System”, published in International Journal of Multidisciplinary in Cryptology and Information Security (IJMCIS) ISSN 2320 –2610, accepted & published in Volume 4, No.1 (January – February 2015) issue, PP 10-13.
- Ashwini R. TondeȦ and Akshay P. DhandeȦ, “Implementation of Advanced Encryption Standard (AES) Algorithm Based on FPGA”, International Journal of Current Engineering and Technology, Volume 4 No. 2 (April 2014), pp 1048 – 1050.
- Bernhard Schmidt, Daniel Ziener, J¨urgenTeich, and Christian Z¨ollner, “Optimizing Scrubbing by Netlist Analysis for FPGA Configuration Bit Classification and Floorplanning”,VLSI Journal 59C (2017) pp. 98-108, DOI: 10.1016/j.vlsi.2017.06.012
- P.Gupta, Pankaj Gulhane,” Design and Implementation of HDLC Controller Using VHDL Code” International Journal of Advance Research, Ideas and Innovations in Technology, ISSN: 2454-132X, (Volume3, Issue3),2017, Page | 1465.
- Miodrag J. Mihaljevic and Hideki Imai, “A Stream Cipher Design Based on Embedding of Random Bits”, International Symposium on Information Theory and its Applications, ISITA2008, Auckland, New Zealand, 7-10, December, 2008, ieeexplore.ieee.org
- AvishekDatta, RajdeepChakraborty and J.K. Mandal, “The CRYPSTER: A Private Key Crypto System”, published & presented in 2015 IEEE International Conference on Computer Graphics, Vision and Information Security (IEEE CGVIS 2015) IEEE Conference Record number: #36759, held on November 02-03, 2015, at Bhubaneswar, India, DOI 10.1109/CGVIS.2015.7449882:, pp 06-10.
- Rajdeep Chakraborty, Runa Seth and J.K. Mandal, “Design of FPGA Based ECB Cryptosystem: RPPT Embedded with TB”, Published and Presented in 5th International Conference on Computing, Communication and Sensor Network, CCSN 2016, held on 24th-25th,Dec 2016, Kolkata, W.B., India, organized and sponsored by International Association of Science, Technology and Management, IEEE (EDS) Kolkata Chapter, Foundation of Computer Science, ISBN 81-85824-46-0, pp 23 – 27.
- Rajdeep Chakraborty, Runa Seth and J.K. Mandal, “An FPGA Based Block Cipher through Recursive Positional Substitution on Prime-Nonprime of Cluster (RPSPNC)”, published & presented in 3rd International Conference on Microelectronics, Circuits and Systems, MICRO 2016, July 09th – 10th, 2016, at Science city, Kolkata, West Bengal, India, organized and sponsored by MaulanaAbulKalam Azad University of Technology (MAKAUT), IEEE, CCSN, EDS, Kolkata, India, ISBN: 978-93-80813-45-5,pp 96-101.
- Rajdeep Chakraborty, Runa Seth and J.K. Mandal, "High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block CipherThrough RSBPNDS and TE", CICBA-2017, March, 2017, Kolkata, W.B., India organized and sponsored by Calcutta Business School, IEEE, Computer Society of India, Springer CCIS series, DOI 10.1007/978-981-10-6427-2, indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, Scopus, pp 485 – 494 (part – I).
- Behrouz A. Forouzan, “Cryptography and Network Security”, Special Indian Edition 2007, Tata Mc-Graw-Hill, ISBN-13: 978-0-07- 066046- 5, ISBN-10: 0-07-066046-8.
