Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Research Article
Humming Bird with Coloured Wings: A Feedback Security Approach

Siva Janakiraman, K.V.Sai Krishna Kumar, R.Rohit Kumar Reddy, A. Srinivasulu, Rengarajan Amirtharajan, K. Thenmozhi and John Bosco Balaguru Rayappan

Information Technology Journal, 2014, 13(12), 2022-2026.

Abstract

The day to day amplification on technology and the demand on shrinking the device sizes reflect in the diminution on memory sizes and constraints on device outlay. In the present times of mass communication with the swift escalating technology, there is a dire necessity for security on the information traversing between authorized individuals. All these factors invite the property of light weightiness and the focused security algorithms such as Hummingbird for devices with humiliated resources. This study present an efficient software implementation of modified Humming Bird algorithm on an 8-bit microcontroller with randomization on sub-key selection based on LFSR. We also do comparative analysis on performance in terms of memory foot print and execution time between our modified one and the original algorithm implementations. The obtained results make it evident that the proposed method raises the complexity significantly without hike in resource consumption and makes it more suitable to provide security in extremely constrained devices.

ASCI-ID: 28-2008

Cited References Fulltext

Related Articles


Steganography-The Art of Hiding Data

Information Technology Journal, 2004, 3(3), 245-269.

Implementation of One-Time Pad Cryptography

Information Technology Journal, 2005, 4(1), 87-95.

Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes

Information Technology Journal, 2005, 4(2), 132-139.

Theory and Implementation of Data Encryption Standard: A Review

Information Technology Journal, 2005, 4(4), 307-325.

Using Emulation Instead of Simulation to Analyze Synchronized Higher Layers Performance in Wireless Networks

Information Technology Journal, 2007, 6(7), 941-953.

Key Transformation Approach for Rijndael Security

Information Technology Journal, 2010, 9(2), 290-297.

A Secure Non-Interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting Protocol

Information Technology Journal, 2009, 8(3), 302-309.

The Subset Search Algorithm: A New Attack on the Discrete Logarithm Problem over Finite Fields and Elliptic Curves

Information Technology Journal, 2006, 5(3), 520-523.

A New Proxy Blind Signature Scheme with Message Recovery

Information Technology Journal, 2013, 12(21), 6159-6163.

Cryptic Cover for Covered Writing: A Pre-Layered Stego

Information Technology Journal, 2014, 13(16), 2524-2533.

Data Security and Cryptographic Techniques: A Review

Information Technology Journal, 2004, 3(1), 106-132.

Implementation of One-Time Pad Cryptography

Information Technology Journal, 2005, 4(1), 87-95.

Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes

Information Technology Journal, 2005, 4(2), 132-139.

Theory and Implementation of Data Encryption Standard: A Review

Information Technology Journal, 2005, 4(4), 307-325.

An Enhanced Scheme against Node Capture Attack using Hash-Chain for Wireless Sensor Networks

Information Technology Journal, 2012, 11(1), 102-109.

Reversible Steganography on OFDM Channel: A Role of Cyclic Codes

Information Technology Journal, 2014, 13(12), 2047-2051.

Hybrid Encryption Algorithms in Cloud Computing

Information Technology Journal, 2013, 12(14), 3015-3019.

Elliptic Curve Cryptography over Binary Finite Field GF(2m)

Information Technology Journal, 2006, 5(1), 204-229.

Modeling Combo PR Generator for Stego Storage Self Test (SSST)

Information Technology Journal, 2014, 13(12), 1936-1944.