Bright – Proposed Family of Lightweight Block Ciphers for IoT-Enabled Smart Environment
Deepti Sehrawat1, Nasib Singh Gill2
1Deepti Sehrawat, Department of Computer Science and Applications, Maharshi Dayanand University, Rohtak, Haryana, India
2Nasib Singh Gill, Department of Computer Science and Applications, Maharshi Dayanand University, Rohtak, Haryana, India.
Manuscript received on 27 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 584-592 | Volume-8 Issue-9, July 2019 | Retrieval Number: I7778078919/19©BEIESP | DOI: 10.35940/ijitee.I7778.078919
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Lightweight security algorithms are tailored for resource-constrained environment. To improve the efficiency of an algorithm, usually, a tradeoff is involved in lightweight cryptography in terms of its memory requirements and speed. This paper proposes a software-oriented new family of lightweight block ciphers, BRIGHT. Proposed family of ciphers support a range of block and key sizes for constraint environment. BRIGHT family has 6 variants and all variants fulfill Strict Avalanche Criteria and key sensitivity test. It is believed that BRIGHT family of ciphers provides better security and performance in IoT-enabled smart environment. Our aim, while designing BRIGHT is to enhance the cipher for IoT applications. For this, we have used the concept of key whitening that helps to resist against attacks like MITM and brute-force. Round permutation in BRIGHT results in stronger and faster diffusion and provides resistance against linear, differential, impossible differential, related-key rectangle, biclique, MITM, and statistical saturation attack which is likely to be applied to GFN based ciphers. BRIGHT using round constant thwarts attacks like rotational cryptanalysis, self-similarity, invariant attack, related-key attacks, and weak key attacks.
Index Terms: ARX, BRIGHT, Cryptographic solutions, Feistel Block Ciphers, GFN, Lightweight Block Cipher.
Scope of the Article: Block Chain-Enabled IoT Device and Data Security and Privacy