Design and Analysis of Blockchain Protocols Focusing on Lightweight Cryptography
This study examines the performance of lightweight cryptographic algorithms within blockchain protocols, highlighting their significance and efficiency in enhancing security and functionality.

PhDservices. org
57 views β’ Dec 14, 2023

About this video
Title:- Design and Analysis of Blockchain Protocols with a Special Emphasis on Lightweight Cryptography
-----------------------------------------------------------------------------------------------------------------------
Implementation Plan:
------------------------------
Step 1: We create a Network, it consists of 50- IoT Nodes, 1 Cloud Server and 1 Blockchain.
Step 2: Initially, We perform the User Registration and User Authentication Process by using Username and Password, Fingerprint Authentication and Encrypt the User Data and Generate the Private key and Public Key using Quantum Key Distribution (QKD) protocols.
Step 3: Next, We Encrypt the Previous Step User Datas by using Lightweight Elliptic Curve Cryptography (LECC) and Lightweight Elliptic Curve Secure Key Exchange and Authentication (LECSKEA) for for data processing, key exchange and digital signing.
Step 4: Next, We integrate the blockchain and Harmonic ByzRaft-PoA Fusion Techniques to secure the Data by Node Agreement and Attacked nodes and integrate the Keccak (SHA-3) hash function for Data Integrity.
Step 5: Next, We Store the Data in Blockchain using lightweight Reed-Solomon (LRS) erasure code Algorithm to optimize the Storage.
Step 6: Finally,we plot the results graph for
ο· Time (ms) vs Transaction per second
ο· Block size (transactions) vs Total storage overhead (MB)
ο· Number of nodes vs Recovery latency (ms)
ο· Data size vs Encryption time (ms)
ο· Data size vs Decryption time (ms)
Tools:
--------
1) Python 3.11.4
2) Windows 10 [64-bit]
We perform the EXISTING process based on the Reference 2: CephArmor: A Lightweight Cryptographic Interface for Secure High-Performance Ceph Storage Systems.
----------------------------------------------------------------------------------------------------------------------
#CryptoPerformance
#BlockchainAnalysis
#LightweightAlgorithms
#CryptographicResearch
#BlockchainSecurity
#PerformanceMetrics
#CryptoAnalysis
#LightweightCrypto
#BlockchainAlgorithms
#CryptographicEvaluation
-------------------------------------------------------------------------------------------------------------
PhD Service offers Worldβs best knowledge sharing platform for Research Scholars .
Our Research Team assists endless support for RESEARCH PROPOSAL, PAPER WRITNG, THESIS WRITING of your research paper.
Contact us for your Research Support:
https://phdservices.org/
+91 94448 68310
phdservicesorg@gmail.com
-----------------------------------------------------------------------------------------------------------------------
Implementation Plan:
------------------------------
Step 1: We create a Network, it consists of 50- IoT Nodes, 1 Cloud Server and 1 Blockchain.
Step 2: Initially, We perform the User Registration and User Authentication Process by using Username and Password, Fingerprint Authentication and Encrypt the User Data and Generate the Private key and Public Key using Quantum Key Distribution (QKD) protocols.
Step 3: Next, We Encrypt the Previous Step User Datas by using Lightweight Elliptic Curve Cryptography (LECC) and Lightweight Elliptic Curve Secure Key Exchange and Authentication (LECSKEA) for for data processing, key exchange and digital signing.
Step 4: Next, We integrate the blockchain and Harmonic ByzRaft-PoA Fusion Techniques to secure the Data by Node Agreement and Attacked nodes and integrate the Keccak (SHA-3) hash function for Data Integrity.
Step 5: Next, We Store the Data in Blockchain using lightweight Reed-Solomon (LRS) erasure code Algorithm to optimize the Storage.
Step 6: Finally,we plot the results graph for
ο· Time (ms) vs Transaction per second
ο· Block size (transactions) vs Total storage overhead (MB)
ο· Number of nodes vs Recovery latency (ms)
ο· Data size vs Encryption time (ms)
ο· Data size vs Decryption time (ms)
Tools:
--------
1) Python 3.11.4
2) Windows 10 [64-bit]
We perform the EXISTING process based on the Reference 2: CephArmor: A Lightweight Cryptographic Interface for Secure High-Performance Ceph Storage Systems.
----------------------------------------------------------------------------------------------------------------------
#CryptoPerformance
#BlockchainAnalysis
#LightweightAlgorithms
#CryptographicResearch
#BlockchainSecurity
#PerformanceMetrics
#CryptoAnalysis
#LightweightCrypto
#BlockchainAlgorithms
#CryptographicEvaluation
-------------------------------------------------------------------------------------------------------------
PhD Service offers Worldβs best knowledge sharing platform for Research Scholars .
Our Research Team assists endless support for RESEARCH PROPOSAL, PAPER WRITNG, THESIS WRITING of your research paper.
Contact us for your Research Support:
https://phdservices.org/
+91 94448 68310
phdservicesorg@gmail.com
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
57
Likes
1
Duration
8:47
Published
Dec 14, 2023
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.