Research Article |
128-Bit LEA Block Encryption Architecture to Improve the Security of IoT Systems with Limited Resources and Area
Author(s) : Hyogeun An1, Sudong Kang2, Guard Kanda 3 and Prof. Kwangki Ryoo4
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 10, Issue 2
Publisher : FOREX Publication
Published : 10 June 2022
e-ISSN : 2347-470X
Page(s) : 245-249
Abstract
The LEA block encryption algorithm is an architecture suitable for IoT systems with limited resources and space. It was developed by the National Security Technology Research Institute in 2013 and established as an international standard for cryptography by the International Electrotechnical Commission in 2019, drawing much attention from developers. In this paper, the 128-bit LEA block encryption algorithm was light weighted and implemented in a hardware environment. All modules share and reuse registers and are designed and implemented in a bottom area through the resource sharing function. As a result of synthesis using Xilinx ISE 14.7 Virtex-5 as a design environment, the maximum frequency achieved 190.88 MHz and has a processing speed of up to 128 Mbps. Compared to the previously designed architecture, we present a bottom-level hardware design with a 128-bit LEA algorithm implemented with a 49.8% reduction in Flip-Flop, 18.8% reduction in LUTs, and 67.6% reduction in Slices.
Keywords: 128-bit LEA
, IoT
, Hardware Design
, Lightweight
, Cryptography Algorithm
Hyogeun An, Department of Info, and Comm. Engineering, Hanbat National University, Daejeon, South Korea
Sudong Kang, Department of Info, and Comm. Engineering, Hanbat National University, Daejeon, South Korea
Guard Kanda, Department of Info, and Comm. Engineering, Hanbat National University, Daejeon, South Korea
Kwangki Ryoo, Department of Info, and Comm. Engineering, Hanbat National University, Daejeon, South Korea; Email: kkryoo@gmail.com [Cross Ref]
[1] Kishor M. D. 2017. Paperless Society in Digital Era. International Journal of Library and Information Studies, 7(4), 317-319. [Cross Ref]
[2] Peterson, Z. N., Gondree, M., and Beverly, R. 2011. A position paper on data sovereignty: The importance of geolocating data in the cloud. In 3rd USENIX Workshop on Hot Topics in Cloud Computing. [Cross Ref]
[3] Ilmudeen A. 2020. Big Data, Artificial Intelligence, and the Internet of Things in Cross-Border E-Commerce. Cross-Border E-Commerce Marketing and Management. DOI:10.4018/978-1-7998-5823-2.ch011[Cross Ref]
[4] Mohan, D., Alwin, L., Neeraja, P., Deepak Lawrence K. and Vinod Pathari. 2021. A private Ethereum blockchain implementation for secure data handling in Internet of Medical Things. Journal of Reliable Intelligent Environments. DOI:10.1007/s40860-021-00153-2 [Cross Ref]
[5] Dijesh P., SuvanamSasidhar B. and Yellepeddi V. 2020. Enhancement of e-commerce security through asymmetric key algorithm. Computer Communications, 8, 125-134. DOI:10.1016/j.comcom.2020.01.033[Cross Ref]
[6] Ryoo H. G. and Ryoo K. K. 2019. Kindergarten school bus notification service using IoT network. Journal of Next-generation Convergence Technology Association, 3(1), 21-28. DOI:10.33097/JNCTA.2019.03.01.21 [Cross Ref]
[7] Akbar M. A., Rashid M. M. and Embong A. H. 2018. Technology Based Learning System in Internet of Things (IoT) Education. 2018 7th International Conference on Computer and Communication Engineering, 192-197. DOI: 10.1109/ICCCE.2018.8539334[Cross Ref]
[8] Tara S. 2021. IoT Attacks Skyrocket, Doubling in 6 Months. Threatpost. https://threatpost.com/iot-attacks-doubling/169224/ [Cross Ref]
[9] Daemen J. and Rijmen V. 1998. AES Proposal : Rijndael. https://www.cs.miami.edu/home/burt/learning/Csc688.012/rijndael/rijndael_doc_V2.pdf[Cross Ref]
[10] Kwon D. et al. 2003. New Block Cipher: ARIA. Information Security and Cryptology, 2971, 432-445. DOI:10.1007/978-3-540-24691-6_32 [Cross Ref]
[11] Hong D. et al. 2006. HIGHT: A New Block Cipher Suitable for Low-Resource Device. Cryptographic Hardware and Embedded Systems, 4249, 46-59. DOI:10.1007/11894063_4 [Cross Ref]
[12] Hong D. J., Lee J. K., Kim D. C., Kwon D. S., Ryu K, H. and Lee D. G. 2014. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors. The 14th International Workshop on Information Security Applications, 8267, 3-27. DOI : 10.1007/978-3-319-05149-9_1[Cross Ref]
[13] Feistel Block Cipher. 2021. tutorialspoint. https://www.tutorialspoint.com/cryptography/feistel_block_cipher.htm[Cross Ref]
[14] Yoon K. H. and Park S. M. 2015. A Study on Hardware Implementation of 128-bit LEA Encryption Block. Smart Media Journal, 4(4), 39-46. [Cross Ref]
[15] Sung M. J., and Shin K. W. 2015. A Small-area Hardware Design of 128-bit Lightweight Encryption Algorithm LEA. Journal of the Korea Institute of Information and Communication Engineering, 19(4), 888–894. DOI : 10.6109/JKIICE.2015.19.4.888[Cross Ref]
[16] Lee, S. Y. (2020). Blockchain for Medical Information of Personal Health Record System. Journal of Smart Technology Applications, 1(1), 13-20. DOI:10.21742/JSTA.2020.1.1.03[Cross Ref]
[17] Falah, A. A. (2021). Improving Learning Performance in Neural Networks. International Journal of Hybrid Innovation Technologies, 1(2), 27-42. DOI:10.21742/IJHIT.2021.1.2.02[Cross Ref]
Hyogeun An, Sudong Kang, Guard Kanda and Prof. Kwangki Ryoo (2022), 128-Bit LEA Block Encryption Architecture to Improve the Security of IoT Systems with Limited Resources and Area. IJEER 10(2), 245-249. DOI: 10.37391/IJEER.100232.