Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2017, Vol. 18 Issue (3): 332-345    DOI: 10.1631/FITEE.1500415
Regular Papers     
BORON: an ultra-lightweight and low power encryption design for pervasive computing
Gaurav Bansod, Narayan Pisharoty, Abhijit Patil
Pune Institute of Computer Technology, Pune 411043, India; Glocal University, Saharanpur 247121, India; Symbiosis Institute of Technology, Pune 412115, India
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON has a compact structure which requires 1939 gate equivalents (GEs) for a 128-bit key and 1626 GEs for an 80-bit key. The BORON cipher includes shift operators, round permutation layers, and XOR operations. Its unique design helps generate a large number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipher. BORON shows good performance on both hardware and software platforms. BORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput as compared to other existing SP network ciphers. We also present the security analysis of BORON and its performance as an ultra-lightweight compact cipher. BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role.

Key wordsLightweight cryptography      SP network      Block cipher      Internet of Things (IoT)      Encryption      Embedded security     
Received: 28 November 2015      Published: 10 March 2017
CLC:  TP309.7  
Cite this article:

Gaurav Bansod, Narayan Pisharoty, Abhijit Patil. BORON: an ultra-lightweight and low power encryption design for pervasive computing. Front. Inform. Technol. Electron. Eng., 2017, 18(3): 332-345.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/FITEE.1500415     OR     http://www.zjujournals.com/xueshu/fitee/Y2017/V18/I3/332

[1] Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu. Efficient hierarchical identity based encryption scheme in the standard model over lattices[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(8): 781-791.
[2] Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan. ImgFS: a transparent cryptography for stored images using a filesystem in userspace[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(1): 28-42.
[3] Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan. Performance study of selective encryption in comparison to full encryption for still visual images[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(6): 435-444.
[4] Baiying Lei, Ing Yann Soon. A multipurpose audio watermarking algorithm with synchronization and encryption[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(1): 11-19.
[5] Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun. CCA2 secure biometric identity based encryption with constant-size ciphertext[J]. Front. Inform. Technol. Electron. Eng., 2011, 12(10): 819-827.