Tailoring AES for resource-constrained IoT devices
Saved in:
| Title: | Tailoring AES for resource-constrained IoT devices |
|---|---|
| Authors: | Saleh, Shaimaa S., Al-Awamry, Amr A., Taha, Ahmed |
| Source: | Indonesian Journal of Electrical Engineering and Computer Science; Vol 36, No 1: October 2024; 290-301 ; 2502-4760 ; 2502-4752 ; 10.11591/ijeecs.v36.i1 |
| Publisher Information: | Institute of Advanced Engineering and Science |
| Publication Year: | 2024 |
| Subject Terms: | Computer science, AES algorithm, Cryptography, ESP32, IoT security, Substitution-box |
| Description: | The internet of things (IoT) is a network of interconnected hardware, software, and many infrastructures that require cryptography solutions to provide security. IoT security is a critical concern, and it can be settled by using cryptographic algorithms such as advanced encryption standard (AES) for encryption and authentication. A fundamental component within the AES algorithm is the substitution box (S-box), which generates confusion and nonlinearity between plaintext and ciphertext, strengthening the process of security. This paper introduces a comparative analysis to offer valuable knowledge of the factors related to different S-box modifications, which will ultimately affect the design of cryptographic systems that use the AES algorithm. Then, a tailored AES algorithm is proposed for resource-constrained IoT devices by changing the standard S-box with another S-box. The new S-box reduces the rounds number and the time needed for the AES algorithm’s encryption, decryption, and key expansion. The performance of the proposed AES is assessed through various experiments. Therefore, our tailored AES with the new S-box is more secure and efficient than AES with a standard S-box. |
| Document Type: | article in journal/newspaper |
| File Description: | application/pdf |
| Language: | English |
| Relation: | https://ijeecs.iaescore.com/index.php/IJEECS/article/view/36386/18634; https://ijeecs.iaescore.com/index.php/IJEECS/article/view/36386 |
| DOI: | 10.11591/ijeecs.v36.i1.pp290-301 |
| Availability: | https://ijeecs.iaescore.com/index.php/IJEECS/article/view/36386 https://doi.org/10.11591/ijeecs.v36.i1.pp290-301 |
| Rights: | Copyright (c) 2024 Shimaa Said Saleh ; http://creativecommons.org/licenses/by-nc-sa/4.0 |
| Accession Number: | edsbas.CF7DBD29 |
| Database: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://ijeecs.iaescore.com/index.php/IJEECS/article/view/36386# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Saleh%20SS Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.CF7DBD29 RelevancyScore: 969 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 968.605590820313 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Tailoring AES for resource-constrained IoT devices – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Saleh%2C+Shaimaa+S%2E%22">Saleh, Shaimaa S.</searchLink><br /><searchLink fieldCode="AR" term="%22Al-Awamry%2C+Amr+A%2E%22">Al-Awamry, Amr A.</searchLink><br /><searchLink fieldCode="AR" term="%22Taha%2C+Ahmed%22">Taha, Ahmed</searchLink> – Name: TitleSource Label: Source Group: Src Data: Indonesian Journal of Electrical Engineering and Computer Science; Vol 36, No 1: October 2024; 290-301 ; 2502-4760 ; 2502-4752 ; 10.11591/ijeecs.v36.i1 – Name: Publisher Label: Publisher Information Group: PubInfo Data: Institute of Advanced Engineering and Science – Name: DatePubCY Label: Publication Year Group: Date Data: 2024 – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Computer+science%22">Computer science</searchLink><br /><searchLink fieldCode="DE" term="%22AES+algorithm%22">AES algorithm</searchLink><br /><searchLink fieldCode="DE" term="%22Cryptography%22">Cryptography</searchLink><br /><searchLink fieldCode="DE" term="%22ESP32%22">ESP32</searchLink><br /><searchLink fieldCode="DE" term="%22IoT+security%22">IoT security</searchLink><br /><searchLink fieldCode="DE" term="%22Substitution-box%22">Substitution-box</searchLink> – Name: Abstract Label: Description Group: Ab Data: The internet of things (IoT) is a network of interconnected hardware, software, and many infrastructures that require cryptography solutions to provide security. IoT security is a critical concern, and it can be settled by using cryptographic algorithms such as advanced encryption standard (AES) for encryption and authentication. A fundamental component within the AES algorithm is the substitution box (S-box), which generates confusion and nonlinearity between plaintext and ciphertext, strengthening the process of security. This paper introduces a comparative analysis to offer valuable knowledge of the factors related to different S-box modifications, which will ultimately affect the design of cryptographic systems that use the AES algorithm. Then, a tailored AES algorithm is proposed for resource-constrained IoT devices by changing the standard S-box with another S-box. The new S-box reduces the rounds number and the time needed for the AES algorithm’s encryption, decryption, and key expansion. The performance of the proposed AES is assessed through various experiments. Therefore, our tailored AES with the new S-box is more secure and efficient than AES with a standard S-box. – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: https://ijeecs.iaescore.com/index.php/IJEECS/article/view/36386/18634; https://ijeecs.iaescore.com/index.php/IJEECS/article/view/36386 – Name: DOI Label: DOI Group: ID Data: 10.11591/ijeecs.v36.i1.pp290-301 – Name: URL Label: Availability Group: URL Data: https://ijeecs.iaescore.com/index.php/IJEECS/article/view/36386<br />https://doi.org/10.11591/ijeecs.v36.i1.pp290-301 – Name: Copyright Label: Rights Group: Cpyrght Data: Copyright (c) 2024 Shimaa Said Saleh ; http://creativecommons.org/licenses/by-nc-sa/4.0 – Name: AN Label: Accession Number Group: ID Data: edsbas.CF7DBD29 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.CF7DBD29 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.11591/ijeecs.v36.i1.pp290-301 Languages: – Text: English Subjects: – SubjectFull: Computer science Type: general – SubjectFull: AES algorithm Type: general – SubjectFull: Cryptography Type: general – SubjectFull: ESP32 Type: general – SubjectFull: IoT security Type: general – SubjectFull: Substitution-box Type: general Titles: – TitleFull: Tailoring AES for resource-constrained IoT devices Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Saleh, Shaimaa S. – PersonEntity: Name: NameFull: Al-Awamry, Amr A. – PersonEntity: Name: NameFull: Taha, Ahmed IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2024 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: Indonesian Journal of Electrical Engineering and Computer Science; Vol 36, No 1: October 2024; 290-301 ; 2502-4760 ; 2502-4752 ; 10.11591/ijeecs.v36.i1 Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science