Cryptography for Resource Constrained Devices: A Survey
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 11
Abstract
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ciphers and stream ciphers. Algorithms under both these categories are presented in this paper. Security features and performances of hardware implementations of these algorithms are also analyzed.
Authors and Affiliations
Jacob John
A Modified Ant-based Clustering for Medical Data
Ant-based techniques, in the computer sciences, are designed for those who take biological inspirations on the behavior of the social insects. Data-clustering techniques are classification algorithms that have a wide ran...
DEVELOPMENT OF BIO-CRYPTO KEY FROM FINGERPRINTS USING CANCELABLE TEMPLATES
Identity theft can be effectively solved by the integration of biometrics and cryptography. Lately, researchers and experimenters have been greatly attracted by the improved performance (protection) of cryptographic keys...
Efficient use of available network in mobile for executing mobile application with real time constraints.
In today’s world mobile fulfill most of computational needs of average persons in form of different applications. As smart phones works in multiprocessing mode, no of applications gets executed simultaneously executed in...
Deep Webpage Classification and Extraction (DWCE)
As the Deep web (or Hidden web) information is hidden behind the search query forms, this information can only be accessed by interacting with these forms. Therefore, development of automated system that interacts with t...
Analysis of Security Features in 5 Layer Internet Model
The Internet was originally conceived as an open, loosely inked computer network that would facilitate the free xchange of data. Security concept is relatively newer concept to that of TCP/IP suite or Layered Internet...