Fuzzy Logic for Performance Analysis of AES and Lightweight AES

the Internet of Things is being more and more adopted for applications in almost every application of today’s business. The ability to integrate the features of the web to the features of Internet of Things systems has led to more flexibility in managing data from almost any location and almost any device platform. The need to secure the exchanged data has made users have some hesitation towards comfortably adopting these technologies, so developers enhanced security measures through encryption, and creating some "lightweight" version of efficient cryptosystems. Having a decision system that guides the user on the best version of a ciphering algorithm means having a more efficient IoT based secured system. The proposed system uses fuzzy logic to provide indications to which variation of the algorithm to use for the exchanges messages, with certainty levels that would assist the user in choosing the most suitable ciphering algorithm.

[1]  Ismail A. Ismail,et al.  Testing Randomness: The Original Poker Approach Acceleration Using Parallel MATLAB with OpenMP , 2015 .

[2]  Prafulla Kumar Choubey,et al.  Power efficient, bandwidth optimized and fault tolerant sensor management for IOT in Smart Home , 2015, 2015 IEEE International Advance Computing Conference (IACC).

[3]  Claude Castelluccia,et al.  Code injection attacks on harvard-architecture devices , 2008, CCS.

[4]  Benny Pinkas,et al.  Secure Hamming Distance Based Computation and Its Applications , 2009, ACNS.

[5]  Daniel J. Bernstein,et al.  Cache-timing attacks on AES , 2005 .

[6]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[7]  Christof Paar,et al.  New Lightweight DES Variants , 2007, FSE.

[8]  Ming Ming Wong,et al.  VLSI implementation and its optimisation for digital cryptosystems , 2012 .

[9]  David Lai,et al.  Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol , 2015, 2015 22nd International Conference on Telecommunications (ICT).

[10]  Minh-Triet Tran,et al.  Gray S-Box for Advanced Encryption Standard , 2008, 2008 International Conference on Computational Intelligence and Security.

[11]  Dave Raggett,et al.  The Web of Things: Challenges and Opportunities , 2015, Computer.

[12]  Oscar Castillo,et al.  Generalized Type-2 Fuzzy Systems for controlling a mobile robot and a performance comparison with Interval Type-2 and Type-1 Fuzzy Systems , 2015, Expert Syst. Appl..

[13]  Klaus Diepold,et al.  Statistical Testing for Disk Encryption Modes of Operations , 2007, IACR Cryptol. ePrint Arch..

[14]  Kwok-Wo Wong,et al.  A true random number generator based on mouse movement and chaotic cryptography , 2009 .

[15]  Sri Parameswaran,et al.  Advanced modes in AES: Are they safe from power analysis based side channel attacks? , 2014, 2014 IEEE 32nd International Conference on Computer Design (ICCD).

[16]  Christof Paar,et al.  A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.

[17]  Emil Simion,et al.  The Relevance of Statistical Tests in Cryptography , 2015, IEEE Security & Privacy.

[18]  Hemraj Saini,et al.  A recent review on lightweight cryptography in IoT , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[19]  Jia Jun Tay,et al.  Compact and low power AES block cipher using lightweight key expansion mechanism and optimal number of S-Boxes , 2014, 2014 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).

[20]  Pejman Tahmasebi,et al.  A hybrid neural networks-fuzzy logic-genetic algorithm for grade estimation , 2012, Comput. Geosci..