Skip to main content
Top

2023 | OriginalPaper | Chapter

Design and Implementation of Highly Secured Nano AES Cryptographic Algorithm for Internet of Things

Authors : E. Roopa, Yasha Jyothi M. Shirur

Published in: Intelligent Cyber Physical Systems and Internet of Things

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Advancement in the internet of things to meet the requirement of human beings and society makes integration of multiple devices into a single system. The integration of hardware and software needs to be provided with security to avoid the stealing of the data. Otherwise, the hacker may gain control over the devices and change the functioning of the system which may lead to malfunction. In order to provide security for the data transfer in IoT, the security algorithm need to be embedded with the IoT. The algorithm should provide high security and at the same time, it should be efficient. In this paper, an attempt is made to design a synthesizable Deoxyribonucleic acid (DNA) based Nano Advanced Encryption Standard (AES) Intellectual Property (IP) Core which can be used as a crypto engine in an IoT system. The crypto engine developed is optimized in terms of power, area and delay. The developed design when compared with the conventional design has given an area advantage of 81.6%, power of 21.17%, gate delay of 88.44% and path delay of 99.64%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lueth KL (2018) State of the IoT 2018: number of IoT devices now at 7B—market accelerating. IoT Analytics Lueth KL (2018) State of the IoT 2018: number of IoT devices now at 7B—market accelerating. IoT Analytics
2.
go back to reference Joe (2015) The 10 challenges of securing IoT communications Joe (2015) The 10 challenges of securing IoT communications
3.
go back to reference Elgeldawi E, Mahrous M, Sayed A (2019) A comparative analysis of symmetric algorithms in cloud computing. Int J Comput Appl Elgeldawi E, Mahrous M, Sayed A (2019) A comparative analysis of symmetric algorithms in cloud computing. Int J Comput Appl
4.
go back to reference Biryukov A (2015) Block ciphers and stream ciphers: the state of the art Biryukov A (2015) Block ciphers and stream ciphers: the state of the art
5.
go back to reference Condon A (2006) Designed DNA molecules: principles and applications of molecular nanotechnology. British Columbia V6T 1Z4, Canada Condon A (2006) Designed DNA molecules: principles and applications of molecular nanotechnology. British Columbia V6T 1Z4, Canada
6.
go back to reference Miles I (2020) An in-depth guide to AES encryption with angular service implementation Miles I (2020) An in-depth guide to AES encryption with angular service implementation
7.
go back to reference Arrag S, Hamdoun A, Tragha A, Khamlich S (2012) Design and implementation a different architectures of mixcolumn in FPGA. Research Gate Arrag S, Hamdoun A, Tragha A, Khamlich S (2012) Design and implementation a different architectures of mixcolumn in FPGA. Research Gate
8.
go back to reference Waqas U, Afzal S, Mir MA, Yousaf M (2015) Generation of AES like S-boxes by replacing affine matrix. Research Gate Waqas U, Afzal S, Mir MA, Yousaf M (2015) Generation of AES like S-boxes by replacing affine matrix. Research Gate
9.
go back to reference Oh J-Y, Yang D-l, Chon K-H (2010) A selective encryption algorithm based on aes for medical information. Healthc Inf Res Oh J-Y, Yang D-l, Chon K-H (2010) A selective encryption algorithm based on aes for medical information. Healthc Inf Res
Metadata
Title
Design and Implementation of Highly Secured Nano AES Cryptographic Algorithm for Internet of Things
Authors
E. Roopa
Yasha Jyothi M. Shirur
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_47

Premium Partner