Design and Implementation of Power-Efficient Cryptography Scheme Using a Novel Multiplication Technique
B. Srikanth,J. V. R. Ravindra,P. Ramakrishna,D. Ajitha
DOI: https://doi.org/10.1007/s11277-023-10427-y
IF: 2.017
2023-04-28
Wireless Personal Communications
Abstract:The threat application and data hacking systems rule today’s digital world. Hence, securing digital information is the most needed to keep personal detail confidential. Several advanced crypto techniques were implemented in the past, resulting in the finest securing outcome. However, those models required additional features and maintenance based on the utilized applications. Considering these difficulties, Data-encryption-standard has been implemented, and the security functions were enriched by performing the Bernoulli mathematical model. So, the presented technique is named a novel Bernoulli Data-encryption-standard (B-DES). Here, the Bernoulli function has been performed after the XOR process, and then during the decryption process, the function of the novel B-DES has been reversed. Moreover, the designed encryption approach is checked with different attacks like brute force attack, Known plain-text Analysis, Chosen-Plaintext Analysis, Man-in-the-Middle Attack, and Ciphertext analysis. Here, the gained power usage by the designed scheme is 193 mW, compared to other models; it has diminished the power usage by 7%. Moreover, the earned memory utilization is 0.6 kB; compared to other models, it has reduced memory utilization by 3%. The delay rate recorded by the designed model is 3.43 ns; compared to other models, it has minimized the delay score by 3%.
telecommunications