CategoryCryptography

In our current research, we focus on easy-to-use encryption tools for personal communication, designing and analyzing cryptographic primitives such as block and stream ciphers, public-key encryption schemes.

Statistical Comparison of Grain Algorithm for IoT Device Security

Statistical Comparison of Grain Algorithm for IoT Device Security

Published in 11th International Conference on Telecommunication Systems, Services, and Applications

Internet of Things (IoT) is an interconnection among devices or “things” that exchange data between them. A man-in-the-middle can be performed when two IoT devices are communicating, therefore secure data transmission between IoT devices has emerged as a challenging task. There are numbers of existing cryptography algorithms that offers protection. However, their utilization in IoT is questionable since the hardware is not suitable for inexpensive yet efficient encryption process. This paper proposed implementation of Grain as the winner for eSTREAM project and compare all version of Grain, i.e Grain v0, Grain v1 and Grain 128 in Arduino Mega 2560 as it used as a single board computer for IoT. The result shows that there is no significant difference in encryption-decryption processing time. While, in generating keystream, Grain 128 will take more time when implemented in Arduino Mega 2560.

Performance Evaluation of Trivium on Raspberry Pi

Performance Evaluation of Trivium on Raspberry Pi

Published in International Journal of Advanced Computer Science and Applications 9 (11) 579

High connectivity of billions of IoT devices lead to many security issues. Trivium is designed for IoT to overcome the security challenges of IoT. The objective of this study is to implement a security service to provide confidentiality for the communication of IoT devices. Furthermore, this study aims to analyze Trivium performance in terms of keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B. The result showed that there was a statistically significant difference between the keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B based on Kruskal-Wallis H test. Further test of Jonckheere-Terpstra indicates that the fastest keystream generation time was on Raspberry Pi 3B, and the smallest memory utilization was on Raspberry Pi 2B. The implemantation of Trivium on three versions of Raspberry Pi shows promising results with less than 27 MB of memory utilization for cryptography leaves more resources available to applications.

Discuss With Us