{"title":"Lightweight Cryptographic Algorithm : Variable Key Length Encryption Algorithm (VEA)","authors":"Bassam W. Aboshosha, R. Ramdan, A. Wahdan","doi":"10.1109/ICCTA35431.2014.9521620","DOIUrl":null,"url":null,"abstract":"Wireless networks applications are growing very fast although their nodes suffer from limited bandwidth, memory, and processing capabilities. They operate on unattended mode in hostile environments and the sensitive data should be protected using some sort of cryptography. Due to the limited computing power of wireless devices, it is impossible to use asymmetric cryptography approaches for the session key establishment or to apply one of the traditional advanced encryption algorithms for the data encryption. Therefore, VEA is proposed in this paper as an appropriate cryptography algorithm for wireless networks due to its low energy consumption, simple hardware requirements and suitable level of security. In addition, the algorithm has an important advantage over the current cryptography algorithm in which variable key length can be used. VEA tries to overcome the limitations of both public- and symmetric-key protocols. VEA relies its design on a smart version of Feistel structure.","PeriodicalId":162170,"journal":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTA35431.2014.9521620","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Wireless networks applications are growing very fast although their nodes suffer from limited bandwidth, memory, and processing capabilities. They operate on unattended mode in hostile environments and the sensitive data should be protected using some sort of cryptography. Due to the limited computing power of wireless devices, it is impossible to use asymmetric cryptography approaches for the session key establishment or to apply one of the traditional advanced encryption algorithms for the data encryption. Therefore, VEA is proposed in this paper as an appropriate cryptography algorithm for wireless networks due to its low energy consumption, simple hardware requirements and suitable level of security. In addition, the algorithm has an important advantage over the current cryptography algorithm in which variable key length can be used. VEA tries to overcome the limitations of both public- and symmetric-key protocols. VEA relies its design on a smart version of Feistel structure.