عرض تفاصيل البحث

ادناه جميع التفاصيل الخاصة بالبحث المطلوب عرضه. توفر هذه المنصة معلومات اساسية حول البحث, لمزيد من التفاصيل يرجى متابعة التصفح من خلال الضغط على الرابط الاصلي للبحث او رابط DOI.

عنوان البحث
Enhancement Process Of Aes: A Lightweight Cryptography Algorithm-Aes For Constrained Devices
عنوان المجلة
Telkomnika Telecommunication, Computing, Electronics And Control
ISSN-1693-6930
تفاصيل النشر
سنة النشر - 2022 / الفهرس الاصلي للمجلة - 20 : 3 (عدد الصفحات 9)
تصنيف البحث
هندسة الحاسبات - المجموعة الهندسية
البحث والاستدامة
الهدف 9– الصناعة والابتكار والبنية التحتية   المزيد حول هذا الهدف
البحث والمجتمع
نعم , يدعم

اسم الباحثجهة الانتساببلد الباحث
Hussein M. Mohammad جامعة بابل العراق
Alharith A. Abdullah جامعة بابل العراق

The restricted devices have a small memory, simple processor, and limited power. To secure them, we need lightweight cryptography algorithms, taking into account the limited specifications. Lightweight cryptography (LWC) algorithms provide confidentiality and maintain information integrity for devices with limited resources. This paper improves and enhances advanced encryption standard (AES) algorithm by reducing algorithm computation power and improving cryptography performance from the point of resource constraint devices. The proposed algorithm is fast and lightweight, which is essential for securing all kinds of data. Besides, the use of mix column overhead is dispensing with, and the ciphertext is processed by the mathematical function (continued fraction) to compress the ciphertext and make it more confusing and also to increasing the data transfer speed. The proposed lightweight cryptography-AES (LWC-AES) algorithm highly suitable for the timely execution of encryption and decryption (such as when encrypt text has (45.1 KB) encryption execution time for AES was (294 ms), while in LWC-AES was (280 ms), as well as suitable for the memory size of the resource-constrained devices for all types of data, than the AES algorithm. The proposed algorithm tested for security analysis using the Avalanche Effect parameter, and this test showed acceptable and within required security results