BOKHARI 256: A Lightweight Stream Cipher Design

This article presents the design of BOKHARI 256, a lightweight stream cipher aimed at enhancing data security in resource-constrained environments.

BOKHARI 256: A Lightweight Stream Cipher Design
IJERT
20 views β€’ May 17, 2022
BOKHARI 256: A Lightweight Stream Cipher Design

About this video

πŸ‘‡Download ArticleπŸ‘‡

https://www.ijert.org/design-of-a-lightweight-stream-cipher-bokhari-256
IJERTV9IS030509
Design of a Lightweight Stream Cipher: BOKHARI 256

Prof. M. U. Bokhari , Shabbir Hassan

Symmetric key cryptography is the most commonly used primitive and stream cipher, in particular, meets the requirement of such algorithms. Developing a software-based synchronous stream cipher is reduced to building a pseudo-random sequence generator with specified cryptographic properties. It is pertinent to note that the implementation of such reliable cryptographic primitives is extremely complicated in practice that requires small processing capacity, low volume, low area, and low power consumption. In the recent past, a few lightweight stream ciphers have been implemented for real applications. In this paper, we have proposed software- based synchronous lightweight stream ciphers, BOKHARI 256, mainly aimed for resource-constrained devices such as Radio Frequency Identification Devices (RFID) Tags, Wireless Sensor Node (WSN) and devices with limited processing capabilities, memory, power resources and the limited computational unit, insufficient wireless bandwidth and low ability to communicate and other general-purpose devices such as credit card, smart card, Personal Digital Assistant (PDA), etc. BOKHARI 256 has designed using the feature of some well-known stream ciphers like FRUIT, LIZARD, SOBER and Grain 128 to improve the performance. The cipher BOKHARI 256 uses a 256-bit key and initialization vector (IV) that is known to be safe and can withstand several cryptographic attacks. BOKHARI 256 uses eight variant stage LFSRs and a linear feedback function () for providing 256-bit security while the internal states and bit permutation use commutation relations of bitstream over (). We used some new design paradigm to fulfill the requirement of a low-cost environment as mentioned above.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

20

Duration

22:56

Published

May 17, 2022

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.