<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modified SIMON approach towards lightweight cryptography scheme for multi data key pair combination</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Aniket Kadukar</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Urvashi Bansal</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science and Engineering, Dr. B.R. Ambedkar National Institute of Technology Jalandhar</institution>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>188</fpage>
      <lpage>196</lpage>
      <abstract>
        <p>There are many IoT devices use by peoples to make their life easy, but there are some devices that are very important like healthcare devices which are very small in size and having very less memory and power backup. It is important to transfer data to the server with privacy, so we use encryption for that. To encrypt data in such small IoT devices we use lightweight cryptography. There are many healthcare IoT devices that uses SIMON algorithm and there is a need to optimise that algorithm to improve the execution time and memory consumption. In this paper we are introducing the new approach to optimise lightweight cryptography algorithm that is SIMON.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Lightweight</kwd>
        <kwd>Cryptography</kwd>
        <kwd>Healthcare</kwd>
        <kwd>SIMON</kwd>
        <kwd>IoT</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>1.1. SIMON Algorithm
m-word m must be 2, 3 or 4
n is equal to word size</p>
      <p>National Security Agency (NSA) proposed the SIMON algorithm. It provides security to
highly constrained devices. It is a Feistel block cipher. The existing cryptographic algorithm is
designed keeping in mind hardware devices. This type of algorithm is designed to work under
pervasive computing systems. Unlike all algorithms its main objective is to protect data. It uses
round functions of left circular shift, bitwise OR and bitwise AND. It was developed to get best
performance on hardware but fortunately it is giving best performance in hardware as well
software.</p>
      <p>Encryption: To encrypt 64bit plaintext P, it uses 44 round functions with 44 round keys generated
using key schedule. The key expansion function and round are designed in such a way that
they can be used in parallel if needed. Encryption and decryption are symmetric.
Decryption: To decrypt a 64 bit ciphertext c, first we swap 32 bit rightmost bits to 32 bits
leftmost bits, then applying 44 round function and after completion of all 44 round function
ifnally we swap 32 bit leftmost with rightmost and vice versa.</p>
      <p>
        In Fig 1 Norah et al.[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] has introduced the new approach to SIMON algorithm that has
reduced the time of execution of most of the data key combination of SIMON algorithm like
SIMON(32/64), SIMON(48/72), SIMON(64/96), SIMON(96/96) and SIMON(128/128) but the ROM
usage of SIMON(64/96), SIMON(96/96) and SIMON(128/128) has increased. SIMON(64/96) taking
more time for execution. In this modification they have removed the left shift operation in the
round function of the algorithm because of that some of the data key combination of SIMON
algorithm has enhanced but some data key combination of this algorithm is not enhanced.
While reducing the execution time of the algorithm ROM usage also increased.
1.2. Tools
Normal simulation tools, unlike Cooja, do not consider the necessity for an on-node processing
technique. It’s worth noting that Cooja has been used to imitate a number of cutting-edge
medical monitoring systems. This simulation is built on the T-mote-sky platform, which is an
board of MSP430-based with an IEEE802.15.4 wireless module. CC2420 a radio chip is used to
save power and enable wake-up-fast from sleep. For all simulations, the platform provides a
stable wireless fascinating communication that runs smoothly. The basic simulation parameters
have been depicted. The MSP430 F1611 microcontroller on the implementation board has 48
KB of ROM, 10 KB of RAM. This hardware requires a battery that is similar to a real-life AA
solid-state battery, with the added advantage of being able to connect to a computer and run
through the USB connection.[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
      </p>
      <p>
        Author utilised the MSP-cycle-watcher, which was designed as a quality-control tool, this
can calculate the clock cycle of encryption algorithm. The number of cycles in the encryption
part’s code is calculated by subtracting it from the total number of cycles in the entire code,
which includes setup and post-processing overhead. To get result in a fair power consumption
comparison research It is important to comparing exact encryption clock cycles. In addition,
this phase (counting encryption cycles) was done exactly by including a determination of check
point for the conclusion and start of the counting process. They use a Bsize command in the
MSP430 GCC compiler to estimate ROM usage in this study. The memory usage of this Bsize
A measure is calculated automatically from the file which is of compiled code. The program’s
consumption of ROM is the total number of data and text bytes utilised and the consumption
of ROM is determined for the specialised encryption portion only.RAM usage comprises both
stack and data use. The consumption of data is calculated using the implementation information
ifle and the command. To examine the stack usage, they used the MSP stack watcher during
execution.[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Review</title>
      <p>
        In December 2015, a paper published by Dhruti Sharma[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] in that paper, she used functional
Encryption technique in Healthcare related data transmission. The main idea is based upon
presenting a framework so that centralised data can be utilized easily and efectively and
also providing data privacy and data confidentiality to IoT healthcare system. In this she
used concept of functional encryption and attribute-based cryptography technique such that
data is processed with structured and systematic access control. So, lets talk about functional
encryption. Actually, it is a generalised version of available public key encryption technique
such as Homomorphic encryption, Identity based encryption etc. In functional encryption
technique, firstly plaintext is encrypted then we run a predefined function on our encrypted
data. Now, when this ciphertext goes to receiver end a predefined function is run by decryption
phase and then convert output ciphertext to plaintext. In this encryption technique is using four
algorithms for proper functioning. The first algo is setup algo, It is used to generate private key
of master and public key of system. Now, 2nd algo i.e., encrypt is used for encrypting a message
using public key and generates ciphertext. The 3rd algo GenTok is used for constructing token
using private key. Then at last, execute algorithm used for conversion of ciphertext token to
functional ciphertext.
      </p>
      <p>Now let’s see about Attribute based encryption technique, it is also a modified version of public
key cryptography, in these various attributes are used to form a public key. This encryption
technique help sender to define access policies for receiver and also provide fine access control
to sender and that lead to control accessibility of data. In this methodology, we are just sending
encrypted data over server which stores these data for further encrypted processing such as
statistical computations, charts and report generation, forecasting etc. Using this technique, we
are also providing data privacy as central system stored each data in encrypted form and can
only be accessible by authorized person.</p>
      <p>
        The authors of [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] experimented the attack on two lightweight cryptography algorithm i.e.
SIMON and SIMECK by reducing their rounds. They reduced the round of SIMON(64/144) by 9
to 16 rounds and SIMECK64 by 2 rounds. After experiment on 45 round SIMON(64/144) and 42
rounds SIMECK64 they got very interesting results. SIMON algorithm is still more secure than
SIMECK algorithm. Exponential time complexity is required to attack on these two algorithm
and still got an success probability between 10% to 19%.
      </p>
      <p>
        The authors of paper [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] suggest an encryption method based on simple mathematical
processes, as well as a simple authentication method based on a unique id. On ASCII values, the
algorithm encrypts them. Each receiver has a distinct identifier, and the sender has a database
of all receivers. There are three keys utilised in this game. The four random digits and receiver’s
alphanumeric id are used to create a palindrome number, which is used to create an encoding
matrix. The encoding matrix and data ASCII values are used to encrypt data. The decryption
procedure uses the decoding matrix, which is the inverse of the encoding matrix. However,
security analysts have raised concerns about the entire procedure. The receiver receives the
random number, keys and encrypted data seed from this point. Any intruder has the ability to
launch a middle-man attack, leaving the entire process susceptible.
      </p>
      <p>
        Authors of [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] present an approach based on a hybrid of the Genetic Algorithm (GA) and
pseudorandom number sequence generating concepts. In this technique, only two GA operators
are used. To choose the crossover operators among three. To produce pseudorandom sequences
(uniform crossover, two points and single point) Blum Blum Shub is used. In addition, the
encryption and decryption processes are carried out using five keys. The first key is an integer
that specifies the block size used to partition plain text into blocks. The random sequences are
generated using the second and third keys. The modulating factor is indicated by the fourth key,
and the mutation oparation is indicated by the fifth key. The notion of GA and pseudorandom
sequence generation is used in this technique to ofer improved performance and security.
      </p>
      <p>While studying above papers got some research gap that execution time is high of
SIMON(64/96). While improving execution time of SIMON(64/96), SIMON(96/96), SIMON(128/128)
ROM usage also increased. There are few works related to optimised SIMON(48/96),
SIMON(64/128), SIMON(96/144), SIMON(128/192), SIMON(128/256).
3. Our Contribution
• To develop a modified approach to decrease the execution time. As the reduction of
execution time helps in the faster communication between healthcare IoT device and
main system or Doctor.
• To design modified approach to decrease the ROM usage.
• To deploy the approach on diferent multiple data key combination to verify check the
performance. As some data key pair combination of SIMON algorithm using more RAM
in optimized SIMON algorithm as compare to original algorithm as shown in fig 1, to
overcome this problem we have introduced some solutions in Proposed Work. With all
this changes lifetime of devices also will increased. This will very useful for devices which
are implant in body of human with surgery like pacemaker.</p>
    </sec>
    <sec id="sec-3">
      <title>4. Proposed Model</title>
      <p>We are going to modify multiple parameters of algorithm in a such a way that the privacy will
not compromise while doing this we will reduce the rounds of the algorithm so ROM usage will</p>
      <p>Dhruti Sharma and Devesh Jin- Secure E-Health IOT
syswala tem idea is given
Power Consumption of
algorithms is not considered</p>
      <p>Asmaa Sabet Anwar et al.</p>
      <p>Athmika Aravind et al.</p>
      <p>Security of image
transmission</p>
      <p>ROM usage is more
Working and implementa- SIMON’s power consumption
tion of IDEA and SIMON is less than IDEA but time delay
algorithms using Xilinx is greater because of rounds.</p>
      <p>14.2</p>
      <p>Norah Alassaf et al.</p>
      <p>ROM usage is not considered</p>
      <p>Sohel Rana et al.</p>
      <p>Lightweight
cryptography to secure medical
data
Comparison of light
weight cryptographic
algorithms</p>
      <p>Norah Alassaf et al.</p>
      <p>Speedup algorithm</p>
      <p>Mohamed Elhoseny et al.</p>
      <p>Bahram Rashidi</p>
      <p>Secure model for patient
data transmission
SIMON algorithm
parameters</p>
      <p>NA</p>
      <p>Shrikant Taware et al.</p>
      <p>Data Security</p>
      <p>Power cunsumption is high</p>
      <p>Gaëtan Leurent et al.</p>
      <p>Attacks and security</p>
      <p>Rounds of algorithm takes
more time to execute</p>
      <p>Anil Gopal Sawant et al.</p>
      <p>Power Consumption</p>
      <p>Execution speed is low</p>
      <p>Bety Hayat Susanti et al.</p>
      <p>Security</p>
      <p>Power consumption is high</p>
      <p>Response time Power
Consumption of SIMON is greater
then SPECK Cycle for key
generation is greater than SPECK
ROM usage is increases in
SIMON(96/96) SIMON(128/128)
Computation power is more
reduce and execution speed of algorithm will increase. Our main focus on the that data key
combination for which there is very few work.</p>
      <p>In Fig 2 we have proposed the modified algorithm for SIMON algorithm. In this algorithm
we are using left shift as the original SIMON algorithm for those data key pair combination
where the ROM usage is increased by removing left shift by using simple if else condition in
the program. Other data key pair combination will not use that left shift as they are performing
well without that. Along with this we are going to reduce some rounds of some data key pair
combinations of SIMON to increase the speed of algorithm and to decrease the ROM usage.</p>
      <p>In Table 3 we have given the tentative reduction of the rounds for each data key combinations
of SIMON algorithm. Security of algorithm is also considered while reducing the rounds of the
SIMON algorithm. In existing SIMON algorithm there are 32 to 72 rounds. We are going to
restrict that round by 0 to 9 cycles. By increasing the execution speed of the the algorithm power
consumption will also going to decrease which will lead to increase the lifetime of healthcare
devices.</p>
    </sec>
    <sec id="sec-4">
      <title>5. Conclusion And Future Work</title>
      <p>In this paper presented a modified version of SIMON lightweight cryptography algorithm for
multi data key pair combinations to improve the execution speed and to decrease the ROM
usage. Also focused on data key pair combinations having very few work related to that. This
will help to increase the lifetime of the device as the time of execution and ROM usage of
algorithm is reduced. In future more modification in SIMON algorithms can done to increase
the security without increasing the rounds of algorithm, So the execution speed and security
both will not compromised.
[9] N. Alassaf, B. Alkazemi, A. Gutub, Applicable light-weight cryptography to secure medical
data in iot systems, Arabia (2003).
[10] S. Rana, S. Hossain, H. I. Shoun, M. A. Kashem, An efective lightweight cryptographic
algorithm to secure resource-constrained devices, International Journal of Advanced
Computer Science and Applications 9 (2018).
[11] M. Elhoseny, G. Ramírez-González, O. M. Abu-Elnasr, S. A. Shawkat, N. Arunkumar,
A. Farouk, Secure medical data transmission model for iot-based healthcare systems, Ieee
Access 6 (2018) 20596–20608.
[12] S. Taware, R. R. Chakravarthi, C. A. Palagan, K. Chandrasekaran, N. Vadivelan, Preserving
mobile commerce iot data using light weight simon block cipher cryptographic paradigm,
Journal of Ambient Intelligence and Humanized Computing 12 (2021) 6081–6089.
[13] P. Yalla, J.-P. Kaps, Lightweight cryptography for fpgas, in: 2009 international conference
on reconfigurable computing and FPGAs, IEEE, 2009, pp. 225–230.
[14] B. Susanti, O. Permana, et al., Robustness test of simon-32, speck-32, and simeck-32
algorithms using fixed-point attacks, in: Journal of Physics: Conference Series, volume
1836, IOP Publishing, 2021, p. 012006.
[15] A. K. Mandal, C. Parakash, A. Tiwari, Performance evaluation of cryptographic algorithms:
Des and aes, in: 2012 IEEE Students’ Conference on Electrical, Electronics and Computer
Science, IEEE, 2012, pp. 1–5.
[16] J. Gitanjali, N. Jeyanthi, C. Ranichandra, M. Pounambal, Ascii based cryptography using
unique id, matrix multiplication and palindrome number, in: The 2014 International
Symposium on Networks, Computers and Communications, IEEE, 2014, pp. 1–3.
[17] M. Hölbl, M. Kompara, A. Kamišalić, L. Nemec Zlatolas, A systematic review of the use of
blockchain in healthcare, Symmetry 10 (2018) 470.
[18] A. Shehab, A. Ismail, L. Osman, M. Elhoseny, I. M. El-Henawy, Quantified self using
iot wearable devices, in: International conference on advanced intelligent systems and
informatics, Springer, 2017, pp. 820–831.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Rashidi</surname>
          </string-name>
          ,
          <article-title>Flexible structures of lightweight block ciphers present, simon and led</article-title>
          ,
          <source>IET Circuits, Devices &amp; Systems</source>
          <volume>14</volume>
          (
          <year>2020</year>
          )
          <fpage>369</fpage>
          -
          <lpage>380</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>N.</given-names>
            <surname>Alassaf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gutub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Parah</surname>
          </string-name>
          , M. Al Ghamdi,
          <article-title>Enhancing speed of simon: A lightweight-cryptographic algorithm for iot applications</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          <volume>78</volume>
          (
          <year>2019</year>
          )
          <fpage>32633</fpage>
          -
          <lpage>32657</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jinwala</surname>
          </string-name>
          ,
          <article-title>Functional encryption in iot e-health care system</article-title>
          ,
          <source>in: International Conference on Information Systems Security</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>345</fpage>
          -
          <lpage>363</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Leurent</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Pernot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Schrottenloher</surname>
          </string-name>
          ,
          <article-title>Clustering efect in simon and simeck</article-title>
          ,
          <source>in: International Conference on the Theory and Application of Cryptology and Information Security</source>
          , Springer,
          <year>2021</year>
          , pp.
          <fpage>272</fpage>
          -
          <lpage>302</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Dutta</surname>
          </string-name>
          ,
          <string-name>
            <surname>T. Das</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Jash</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Patra</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Paul</surname>
          </string-name>
          ,
          <article-title>A cryptography algorithm using the operations of genetic algorithm &amp; pseudo random sequence generating functions</article-title>
          ,
          <source>International Journal 3</source>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alizadeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Salleh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zamani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Shayan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Karamizadeh</surname>
          </string-name>
          ,
          <article-title>Security and performance evaluation of lightweight cryptographic algorithms in rfid</article-title>
          , Kos Island,
          <string-name>
            <surname>Greece</surname>
          </string-name>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Anwar</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. K. A. Ghany</surname>
            ,
            <given-names>H. E.</given-names>
          </string-name>
          <string-name>
            <surname>Mahdy</surname>
          </string-name>
          ,
          <article-title>Improving the security of images transmission</article-title>
          ,
          <source>International Journal 3</source>
          (
          <year>2015</year>
          )
          <fpage>7</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>K. K. VG</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Poojary</surname>
            ,
            <given-names>C. S.</given-names>
          </string-name>
          <string-name>
            <surname>Rai</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Nagesh</surname>
          </string-name>
          ,
          <article-title>Implementation of lightweight cryptographic algorithms in fpga</article-title>
          , in: 2017 International Conference on Circuits, Controls, and
          <string-name>
            <surname>Communications</surname>
          </string-name>
          (CCUBE), IEEE,
          <year>2017</year>
          , pp.
          <fpage>232</fpage>
          -
          <lpage>235</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>