Modify PRESENT Algorithm by New technique and key Generator by External unit
Main Article Content
Abstract
Recently, the widespread use of devices in the field of electronics has caused people to worry about safety. Using traditional cryptographic algorithms to build a complete cryptographic environment for embedded applications or the Internet of Things (IoT) will not be possible due to space, power, and speed limitations. The focus is on lightweight encryption to overcome these problems. In this paper, we have developed the (PRESENT) algorithm, which is among the lightweight algorithms that are used in the IOT and that keeps pace with the requirements of communication speed at the present time. We also used a physical part with the developed algorithm (an external unit that is a USB and using it as a fingerprint for the system) to generate the key while ensuring that the system does not work until after the external unit is connected to the calculator to provide more security for the system from breaches. The developed algorithm achieved a high speed of execution faster than the original algorithm and passed standard tests for various files (text, image, audio, video). In addition to increasing the degree of complexity than the original algorithm.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
Tikrit Journal of Pure Science is licensed under the Creative Commons Attribution 4.0 International License, which allows users to copy, create extracts, abstracts, and new works from the article, alter and revise the article, and make commercial use of the article (including reuse and/or resale of the article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made, and the licensor is not represented as endorsing the use made of the work. The authors hold the copyright for their published work on the Tikrit J. Pure Sci. website, while Tikrit J. Pure Sci. is responsible for appreciate citation of their work, which is released under CC-BY-4.0, enabling the unrestricted use, distribution, and reproduction of an article in any medium, provided that the original work is properly cited.
References
[1]. Chaitra, B., Kiran Kumar, V. G., & Shatharama Rai, C. (2017). Comparative Study of cryptographic encryption algorithms. IOSR Journal of Electronic and Communication Engineering (IOSR-JECE), 12(3). [2]. Chatterjee, R., & Chakraborty, R. (2020, March). A modified lightweight PRESENT cipher for IoT security. In 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) (pp. 1-6). IEEE.
[3]. M. Prabu, R. Nenregen, S. Saravana Kumar ,”Comparing Lightweight Algorithms for Embedded System Security” J. Clerk Maxwell, International Journal of Pure and Applied Mathematics, Volume 119 No. 12 2018, 14191-14198. [4]. Wang, M. (2008, June). Differential cryptanalysis of reduced-round PRESENT. In International Conference on Cryptology in Africa (pp. 40-49). Springer, Berlin, Heidelberg. [5]. Ohkuma, K. (2009, August). Weak keys of reduced-round PRESENT for linear cryptanalysis. In International Workshop on Selected Areas in Cryptography (pp. 249-265). Springer, Berlin, Heidelberg. [6]. Cho, J. Y. (2010, March). Linear cryptanalysis of reduced-round PRESENT. In Cryptographers’ Track at the RSA Conference (pp. 302-317). Springer, Berlin, Heidelberg. [7]. Tay, J. J., Wong, M. D., Wong, M. M., Zhang, C., & Hijazin, I. (2015, August). Compact FPGA implementation of PRESENT with Boolean S-Box. In 2015 6th Asia Symposium on Quality Electronic Design (ASQED) (pp. 144-148). IEEE. [8]. Liu, G., Jin, C., & Kong, Z. (2016). Key recovery attack for PRESENT using slender-set linear cryptanalysis. Science China Information Sciences, 59(3), 1-14. [9]. Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., ... & Vikkelsoe, C. (2007, September). PRESENT: An ultra-lightweight block cipher. In International workshop on cryptographic hardware and embedded systems (pp. 450-466). Springer, Berlin, Heidelberg. [10]. Sallam, S., & Beheshti, B. D. (2018, October). A survey on lightweight cryptographic algorithms. In TENCON 2018-2018 IEEE Region 10 Conference (pp. 1784-1789). IEEE. [11]. Bagheri, N., Ebrahimpour, R., & Ghaedi, N. (2013). New differential fault analysis on PRESENT. EURASIP Journal on Advances in Signal Processing, 2013(1), 1-10.