A Light Weight Cryptographic Solution for 6LoWPAN Protocol Stack
- URL: http://arxiv.org/abs/2510.14993v1
- Date: Thu, 09 Oct 2025 23:47:04 GMT
- Title: A Light Weight Cryptographic Solution for 6LoWPAN Protocol Stack
- Authors: Sushil Khairnar, Gaurav Bansod, Vijay Dahiphale,
- Abstract summary: This paper presents an implementation of a lightweight 6LoWPAN Protocol stack by using a Light weight Cipher instead of regular heavy encryption cipher AES.<n>The cipher proposed in this paper is specifically suitable for 6LoWPAN architecture as it addresses all the constraints possessed by wireless sensor nodes.<n>The proposed cipher LiCi2 is motivated from LiCi cipher design but outclasses it in every design metric.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Lightweight cryptography is an emerging field in the field of research, which endorses algorithms which are best suited for constrained environment. Design metrics like Gate Equivalence (GE), Memory Requirement, Power Consumption, and Throughput play a vital role in the applications like IoT. This paper presents the 6LoWPAN Protocol Stack which is a popular standard of communication for constrained devices. This paper presents an implementation of a lightweight 6LoWPAN Protocol stack by using a Light weight Cipher instead of regular heavy encryption cipher AES. The cipher proposed in this paper is specifically suitable for 6LoWPAN architecture as it addresses all the constraints possessed by wireless sensor nodes. The lightweight cipher proposed in the paper needs only 1856 bytes of FLASH and 1272 bytes of RAM memory which is less than any other standard existing lightweight cipher design. The proposed ciphers power consumption is around 25 mW which is significantly less as compared to ISO certified lightweight cipher PRESENT which consumes around 38 mW of dynamic power. This paper also discusses the detailed analysis of cipher against the attacks like Linear Cryptanalysis, Differential Cryptanalysis, Biclique attack and Avalanche attack. The cipher implementation on hardware is around 1051 GEs for 64 bit of block size with 128 bit of key length which is less as compared to existing lightweight cipher design. The proposed cipher LiCi2 is motivated from LiCi cipher design but outclasses it in every design metric. We believe the design of LiCi2 is the obvious choice for researchers to implement in constrained environments like IoT.
Related papers
- DictPFL: Efficient and Private Federated Learning on Encrypted Gradients [46.7448838842482]
We present DictPFL, a framework that achieves full gradient protection with minimal overhead.<n>It encrypts every transmitted gradient while keeping non-transmitted parameters local, preserving privacy without heavy computation.<n>Experiments show that DictPFL reduces communication cost by 402-748$times$ and accelerates training by 28-65$times$ compared to fully encrypted FL.
arXiv Detail & Related papers (2025-10-24T01:58:42Z) - CipherGuard: Compiler-aided Mitigation against Ciphertext Side-channel Attacks [26.849878609957386]
CipherGuard is a compiler-based mitigation tool to counteract ciphertext side channels with high efficiency and security guarantees.<n>In its most efficient strategy, CipherGuard incurs an average performance overhead of only 1.41X, with a maximum of 1.95X.
arXiv Detail & Related papers (2025-02-19T03:22:36Z) - Qubit Optimized Quantum Implementation of SLIM [0.0]
We introduce a novel quantum implementation of SLIM, a lightweight block cipher optimized for 32-bit plaintext and an 80-bit key.<n>This work highlights SLIM's potential as a resource-efficient and secure candidate for quantum-resistant encryption protocols.
arXiv Detail & Related papers (2024-12-14T13:52:36Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.<n>This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers [1.5953412143328967]
Indistinguishability is a fundamental principle of cryptographic security, crucial for securing data transmitted between Internet of Things (IoT) devices.<n>This research investigates the ability of machine learning (ML) in assessing indistinguishability property in encryption systems.<n>We introduce MIND-Crypt, a novel ML-based framework designed to assess the cryptographic indistinguishability of lightweight block ciphers.
arXiv Detail & Related papers (2024-05-30T04:40:13Z) - CodeChameleon: Personalized Encryption Framework for Jailbreaking Large
Language Models [49.60006012946767]
We propose CodeChameleon, a novel jailbreak framework based on personalized encryption tactics.
We conduct extensive experiments on 7 Large Language Models, achieving state-of-the-art average Attack Success Rate (ASR)
Remarkably, our method achieves an 86.6% ASR on GPT-4-1106.
arXiv Detail & Related papers (2024-02-26T16:35:59Z) - Grain-128PLE: Generic Physical-Layer Encryption for IoT Networks [6.515605001492591]
Grain-128PLE is a lightweight physical layer encryption scheme that is derived from the Grain-128AEAD v2 stream cipher.
The design of Grain-128PLE maintains the structure of the main building blocks of the original Grain-128AEAD v2 stream cipher.
arXiv Detail & Related papers (2023-09-27T10:48:52Z) - GPT-4 Is Too Smart To Be Safe: Stealthy Chat with LLMs via Cipher [85.18213923151717]
Experimental results show certain ciphers succeed almost 100% of the time to bypass the safety alignment of GPT-4 in several safety domains.
We propose a novel SelfCipher that uses only role play and several demonstrations in natural language to evoke this capability.
arXiv Detail & Related papers (2023-08-12T04:05:57Z) - A Comprehensive Survey on the Implementations, Attacks, and
Countermeasures of the Current NIST Lightweight Cryptography Standard [2.055054374525828]
This survey is the first work on the current standard for lightweight cryptography, standardized in 2023.
Lightweight cryptography plays a vital role in securing resource-constrained embedded systems.
NIST initiated a standardization process for lightweight cryptography.
arXiv Detail & Related papers (2023-04-13T02:29:38Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Lossless Compression of Efficient Private Local Randomizers [55.657133416044104]
Locally Differentially Private (LDP) Reports are commonly used for collection of statistics and machine learning in the federated setting.
In many cases the best known LDP algorithms require sending prohibitively large messages from the client device to the server.
This has led to significant efforts on reducing the communication cost of LDP algorithms.
arXiv Detail & Related papers (2021-02-24T07:04:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.