Sani Galadima Garba, A. Obiniyi, Musa Adeku Ibrahim, B. I. Ahmad
{"title":"轻量级分组密码的密钥调度","authors":"Sani Galadima Garba, A. Obiniyi, Musa Adeku Ibrahim, B. I. Ahmad","doi":"10.1109/ITED56637.2022.10051257","DOIUrl":null,"url":null,"abstract":"The key schedule, an essential part of the cipher(cryptography), is often neglected during the cipher algorithm design. However, a compromised key schedule leads to the entire cipher's successful attack. In this article, we reviewed the elements to consider when creating an excellent key schedule, proposed a methodology to achieve it, designed a key schedule with the proposed method, implemented the design, and analyzed the result to confirm that it meets the specifications. Our proposed key schedule is specially designed for devices with limited memory size, processing ability, and storage. So, this article's suggested method and design were done to achieve a secure key schedule using minimal resources, especially in hardware implementation.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the Key Schedule of Lightweight Block Cipher\",\"authors\":\"Sani Galadima Garba, A. Obiniyi, Musa Adeku Ibrahim, B. I. Ahmad\",\"doi\":\"10.1109/ITED56637.2022.10051257\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The key schedule, an essential part of the cipher(cryptography), is often neglected during the cipher algorithm design. However, a compromised key schedule leads to the entire cipher's successful attack. In this article, we reviewed the elements to consider when creating an excellent key schedule, proposed a methodology to achieve it, designed a key schedule with the proposed method, implemented the design, and analyzed the result to confirm that it meets the specifications. Our proposed key schedule is specially designed for devices with limited memory size, processing ability, and storage. So, this article's suggested method and design were done to achieve a secure key schedule using minimal resources, especially in hardware implementation.\",\"PeriodicalId\":246041,\"journal\":{\"name\":\"2022 5th Information Technology for Education and Development (ITED)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th Information Technology for Education and Development (ITED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITED56637.2022.10051257\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th Information Technology for Education and Development (ITED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITED56637.2022.10051257","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The key schedule, an essential part of the cipher(cryptography), is often neglected during the cipher algorithm design. However, a compromised key schedule leads to the entire cipher's successful attack. In this article, we reviewed the elements to consider when creating an excellent key schedule, proposed a methodology to achieve it, designed a key schedule with the proposed method, implemented the design, and analyzed the result to confirm that it meets the specifications. Our proposed key schedule is specially designed for devices with limited memory size, processing ability, and storage. So, this article's suggested method and design were done to achieve a secure key schedule using minimal resources, especially in hardware implementation.