Enhanced_Data_Security_Framework_Using_Lightweight_Cryptography_and_Multi-Level_Encryption (1)
Enhanced_Data_Security_Framework_Using_Lightweight_Cryptography_and_Multi-Level_Encryption (1)
Abstract—Network security is essential for individuals as well environments, such as embedded systems [2], smart cards,
as organizations in the modern day, since the majority of & Internet of Things devices, is known as lightweight
enterprises and organizations store their data on clouds. cryptography. These systems have limited memory, energy,
Therefore, a way to guarantee data security during network and processing capacity; therefore, they require
transmission needs to be discovered. Data security also heavily
cryptography particularly built for them. PRESENT is a
depends on device level security. These days, it's necessary to
protect data at the device, network, and application levels very thin block cipher that was introduced as a privacy-
simultaneously. The developers of the suggested concept use enhanced reduced-sized block cipher. The cipher was
multi-level encryption techniques and lightweight designed [3] with high security, minimal energy use, &
cryptography algorithms to attempt to safeguard data on all compact code size in mind. Since its release, the present has
three levels. grown in popularity within the cryptography, which is used
in a wide range of applications today, including wireless
This paper proposes multi-level cryptography as a fix for the sensor networks, RFID tags, and smart cards.
previously noted issue that compared to normal encryption,
which uses different keys for each round of encryption,
II. BACKGROUND
resulting in a complex or powerful algorithm, multi-level
encryption protects data more thoroughly.
A. Security outline of lightweight Cryptographic
Keywords—Healthcare, Multilevel Encryption, Lightweight Algorithm
PRESENT, Lightweight RSA, Cryptography
Cryptographic algorithms are used to secure data.
I. INTRODUCTION Cryptography is the process of encrypting data into code
for secure transmission. Cryptographic ciphers fall into two
This Data security is essential since a lot of stuff is categories: symmetric & asymmetric ciphers. Symmetric
transferred via networks these days. Employing a suitable key encryption encrypts and decrypt data using the same
privacy transformation methodology is the most effective key. This encryption method is quite safe and reasonably
way to secure data transferred across networks. Various rapid. The exchange of the private key between
tactics are employed to protect the private information. communication parties is the main disadvantage of
Most data these days is secured via encryption and symmetric key encryption. An attacker can compromise the
certificate technologies [1]. Most methods are based on data's encryption if they manage to gain the key. Symmetric
cryptography. A new concept known as multi-level key algorithms ensure data integrity and confidentiality but
encryption is used to make the system more secure than not authentication. Examples of conventional symmetric
earlier cryptosystems. Leveraging the same as well as [4] key ciphers are (AES, DES, 3DES & BLOWFISH)
different keys, plain text is encrypted once or more times in among others. Asymmetric encryption offers
the multi-level encryption approach. It makes the process confidentiality, integrity, and authentication. The
more powerful and intricate than it was previously. transmitter encrypts data with its public key, & the recipient
decrypts it with his private key, guaranteeing secrecy and
With an increasing number of IoT devices connecting to the integrity. To ensure authentication, the sender encrypts data
internet and exchanging data, lightweight cryptography has using his private key. The recipient uses the sender's public
become more and more important. To be secure, sensitive key to decrypt the data and confirm its authenticity [5]. The
data needs to be encrypted. The use of cryptographic fact that asymmetric cryptography permits key sharing and
techniques and protocols in resource-constrained all other security techniques is one of its advantages. The
720
979--83503-6684-6/24/$31.00 ©2024 IEEE
Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)
ProduceRoughKeys()
End for addRoundKey (STATE, K32), AddRoundKey
(STATE, Ki) for i=1 to 31 & State-specific s-BoxLayer and
pLayer. Here is how the encryption process works:
721
Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)
Fig. 3 which is included below and is suggested in this TABLE I. PRESENT’S S-BOX
paper—flowcharts the suggested RSA algorithm.
A. Application Layer
722
Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)
D. Descriptive Analysis
723
Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)
VIII. CONCLUSIONS
724
Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)
725
Authorized licensed use limited to: Sri Jayachamarajendra College of Engineering. Downloaded on November 12,2024 at 14:17:54 UTC from IEEE Xplore. Restrictions apply.