{"title":"VLSI and AES based IoT security by Modified Random S- Box Generation","authors":"Indrajit Das, Kashmira Jha, Papiya Debnath, Subhrapratim Nath","doi":"10.1109/EDKCON56221.2022.10032902","DOIUrl":null,"url":null,"abstract":"The next phase of the digital revolution is the Internet of Things (IoT), which refers to the scenario in which billions of people and objects are interconnected to permit the flow of enormous volumes of information from many locations. This development is due to the extraordinary expansion in Integrated circuit and sensor technology. IoT’s data transit phases have some security issues with data confidentiality. Along with some benefits and its high usage, some complexity issues arise in form of numerous forms. Thus, a security system is suggested in this research paper that tackles the aforementioned difficulties in order to improve reliable information transmission in a smart IoT scenario with low power consumption, throughout information sending among an IoT system and a cloud server using revised Advance Encryption Standard with random S- Box which is generated by various (nine) irreducible polynomial GF (28) in finite field techniques. In the revised S- Box generation, this research aims to optimize the VLSI circuit design of the SubBytes and inverse SubBytes procedures. To achieve this, all of the building blocks in the modified random S-box transformation are done by finite field arithmetic. For further improvement of the area performance, a blended design of modified S-boxes and inverse S-boxes is suggested where on each occasion a different irreducible polynomial is utilized in the finite field of GF (28) and this irreducible polynomial and secret key is sent to the receiver. As a result, a random S-Box is formed and thereby the algorithm's security is improved.","PeriodicalId":296883,"journal":{"name":"2022 IEEE International Conference of Electron Devices Society Kolkata Chapter (EDKCON)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference of Electron Devices Society Kolkata Chapter (EDKCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDKCON56221.2022.10032902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The next phase of the digital revolution is the Internet of Things (IoT), which refers to the scenario in which billions of people and objects are interconnected to permit the flow of enormous volumes of information from many locations. This development is due to the extraordinary expansion in Integrated circuit and sensor technology. IoT’s data transit phases have some security issues with data confidentiality. Along with some benefits and its high usage, some complexity issues arise in form of numerous forms. Thus, a security system is suggested in this research paper that tackles the aforementioned difficulties in order to improve reliable information transmission in a smart IoT scenario with low power consumption, throughout information sending among an IoT system and a cloud server using revised Advance Encryption Standard with random S- Box which is generated by various (nine) irreducible polynomial GF (28) in finite field techniques. In the revised S- Box generation, this research aims to optimize the VLSI circuit design of the SubBytes and inverse SubBytes procedures. To achieve this, all of the building blocks in the modified random S-box transformation are done by finite field arithmetic. For further improvement of the area performance, a blended design of modified S-boxes and inverse S-boxes is suggested where on each occasion a different irreducible polynomial is utilized in the finite field of GF (28) and this irreducible polynomial and secret key is sent to the receiver. As a result, a random S-Box is formed and thereby the algorithm's security is improved.