Easy to search. Easy to read. Easy to cite with credible sources.
Siva Janakiraman, K.V.Sai Krishna Kumar, R.Rohit Kumar Reddy, A. Srinivasulu, Rengarajan Amirtharajan, K. Thenmozhi and John Bosco Balaguru Rayappan
Information Technology Journal, 2014, 13(12), 2022-2026.
The day to day amplification on technology and the demand on shrinking the device sizes reflect in the diminution on memory sizes and constraints on device outlay. In the present times of mass communication with the swift escalating technology, there is a dire necessity for security on the information traversing between authorized individuals. All these factors invite the property of light weightiness and the focused security algorithms such as Hummingbird for devices with humiliated resources. This study present an efficient software implementation of modified Humming Bird algorithm on an 8-bit microcontroller with randomization on sub-key selection based on LFSR. We also do comparative analysis on performance in terms of memory foot print and execution time between our modified one and the original algorithm implementations. The obtained results make it evident that the proposed method raises the complexity significantly without hike in resource consumption and makes it more suitable to provide security in extremely constrained devices.
ASCI-ID: 28-2008
Information Technology Journal, 2004, 3(3), 245-269.
Implementation of One-Time Pad CryptographyInformation Technology Journal, 2005, 4(1), 87-95.
Implementation of Elliptic Curve Diffie-Hellman and EC Encryption SchemesInformation Technology Journal, 2005, 4(2), 132-139.
Theory and Implementation of Data Encryption Standard: A ReviewInformation Technology Journal, 2005, 4(4), 307-325.
Using Emulation Instead of Simulation to Analyze Synchronized Higher Layers Performance in Wireless NetworksInformation Technology Journal, 2007, 6(7), 941-953.
Key Transformation Approach for Rijndael SecurityInformation Technology Journal, 2010, 9(2), 290-297.
A Secure Non-Interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting ProtocolInformation Technology Journal, 2009, 8(3), 302-309.
The Subset Search Algorithm: A New Attack on the Discrete Logarithm Problem over Finite Fields and Elliptic CurvesInformation Technology Journal, 2006, 5(3), 520-523.
A New Proxy Blind Signature Scheme with Message RecoveryInformation Technology Journal, 2013, 12(21), 6159-6163.
Cryptic Cover for Covered Writing: A Pre-Layered StegoInformation Technology Journal, 2014, 13(16), 2524-2533.
Data Security and Cryptographic Techniques: A ReviewInformation Technology Journal, 2004, 3(1), 106-132.
Implementation of One-Time Pad CryptographyInformation Technology Journal, 2005, 4(1), 87-95.
Implementation of Elliptic Curve Diffie-Hellman and EC Encryption SchemesInformation Technology Journal, 2005, 4(2), 132-139.
Theory and Implementation of Data Encryption Standard: A ReviewInformation Technology Journal, 2005, 4(4), 307-325.
An Enhanced Scheme against Node Capture Attack using Hash-Chain for Wireless Sensor NetworksInformation Technology Journal, 2012, 11(1), 102-109.
Reversible Steganography on OFDM Channel: A Role of Cyclic CodesInformation Technology Journal, 2014, 13(12), 2047-2051.
Hybrid Encryption Algorithms in Cloud ComputingInformation Technology Journal, 2013, 12(14), 3015-3019.
Elliptic Curve Cryptography over Binary Finite Field GF(2m)Information Technology Journal, 2006, 5(1), 204-229.
Modeling Combo PR Generator for Stego Storage Self Test (SSST)Information Technology Journal, 2014, 13(12), 1936-1944.