Lightweight block cipher algorithms are important for constrained environment. LBlock uses word permutation to do the diffusion while this research uses bit permutation to increase the number of active Substitution box (S-box). The number of active S-box is a regular method to evaluate the security against linear and differential attacks. The bit permutation method is described in this research with analysis and discussion. The preliminary results show that the proposed algorithm has 32 active S-box for 13 rounds which is higher than 32 active S-box for 15 rounds of LBlock algorithm. Also, we can conclude that the proposed algorithm is better than LBlock algorithm in the perspective of security
The needing to secure information in restricted environments is very important so that lightweight ...
Cryptography is one of the techniques to secure communication and data transfer over the network. It...
Cryptography is one of the techniques to secure communication and data transfer over the network. It...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...
Lightweight block cipher algorithms are vital for constrained environment. There are three factors s...
Lightweight block cipher algorithms are vital for constrained environment. There are three factors s...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
Lightweight block cipher algorithms are vital for constrained environment. There are three factors ...
Lightweight block cipher algorithms are vital for constrained environment. There are three factors ...
This research dealt with three problems; First, it is difficult to optimized three factors at same t...
Lightweight cryptography is developed to increase the security level in pervasive computing applicat...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
One of the ways to provide information security is cryptography. Traditionally, cryptographic opera...
The needing to secure information in restricted environments is very important so that lightweight ...
Cryptography is one of the techniques to secure communication and data transfer over the network. It...
Cryptography is one of the techniques to secure communication and data transfer over the network. It...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...
Lightweight block cipher algorithms are vital for constrained environment. There are three factors s...
Lightweight block cipher algorithms are vital for constrained environment. There are three factors s...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
Lightweight block cipher algorithms are vital for constrained environment. There are three factors ...
Lightweight block cipher algorithms are vital for constrained environment. There are three factors ...
This research dealt with three problems; First, it is difficult to optimized three factors at same t...
Lightweight cryptography is developed to increase the security level in pervasive computing applicat...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
One of the ways to provide information security is cryptography. Traditionally, cryptographic opera...
The needing to secure information in restricted environments is very important so that lightweight ...
Cryptography is one of the techniques to secure communication and data transfer over the network. It...
Cryptography is one of the techniques to secure communication and data transfer over the network. It...