Abstract
Edge data security became the crucial concern of the network connected framework. It demands for the lightweight solutions where the traditional algorithms have not been suitable for the resource constrained devices. Hence, the development of lightweight crypto-solutions has attained the visibility. This proposed leverages the traditional Lightweight Encryption Algorithm (LEA) on reconfigurable hardware such as Field Programmable Gate Array (FPGA) by addressing its potential pitfalls namely vulnerable to differential cryptanalysis. To overcome this, 5-bit Substitution box (S-box) blended with chaos approach has been adopted on the traditional LEA schema. Which also ensures the lightweightness. The substitution and chaotic diffusion processes improves the strength of the LEA to meet out the statistical requirements which was confirmed by conducting the NIST SP 800 – 22 batteries of test by attaining the pass rate of 99.9%with the level of significance as 0.01. Further, Hamming distance and Shannon entropy were estimated to determine the switching activity and uniformity of the generated randomness. On the other hand, the modified LEA occupies only less than 5% of the total hardware footprint of the Intel Cyclone IV E FPGA chip which dissipates 131.62 mW of power for encryption and 132.27 mW of power for decryption respectively. The obtained results were compared with the traditional LEA design and it evidences that the modified LEA with S-box and chaos has significantly increased the performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sun, Y., Zhang, J., Bie, R., Yu, J.: Advancing researches on IoT systems and intelligent applications. Personal and Ubiquitous Computing 22(3), 449–452 (2018)
Maddikunta, P.K.R., et al.: Green communication in IoT networks using a hybrid optimization algorithm. Computer Communications 159, 97–107 (2020)
Ch, R., Gadekallu, T.R., Abidi, M.H., Al-Ahmari, A.: Computation system to classify ciber crime offenses using machine learning. Sustainability 12(10), 4087 (2020)
Henriques, M., Vernekar, N.: Using symmetric and asymmetric cryptography to secure communication between devices in IoT. In: 2017 IEEE International Conference on IoT and Application(ICIOT). Nagapattinam, India (2017)
Numan, M., Subhan, F., Khan, W.Z., et al.: A systematic review on clone node detection in static wireless sensor networks. IEEE Access 8, 65450–65461 (2020)
Ragab, A.: Robust hybrid cryptosystem for protecting smart devices in internet of things (IOT), Master Thesis, Department of Computer Engineering, Arab Academy for Science, Technology and Maritime Transport. Cairo, Egypt (2019)
Youssef, W.E.H., Abdelli, A., Dridi, F., Machhout, M.: Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications. Hindawi Security and Communication Networks, Article ID 8860598, 13 (2020). https://doi.org/10.1155/2020/8860598
Baskar, C., Balasubramaniyan, C., Manivannan, D.: Establishment of Light Weight Cryptography for Resource Constraint Environment using FPGA. International Conference on Information Security & Privacy (ICISP2015). Nagpur, INDIA (2015)
Dahiphale, V., Raut, H., Bansod, G.: Design and Implementation of novel datapath designs of lightweight cipher RECTANGLE for resource constrained environment. Multimedia Tools and Applications 78, 23659–23688 (2019). https://doi.org/10.1007/s11042-019-7587-3
Fan, X., Gong, G., Lauffenburger, K., Hicks, T.: FPGA Implementations of the Hummingbird Cryptographic Algorithm
Kiran Kumar, V.G., Poojary, A., Shantharama Rai, C., Nagesh, H.R.: Implementation of Lightweight Cryptographic Algorithms in FPGA. Proceeding of Second International conference on Circuits, Controls and Communications
Kitsos, P., Selimis, G., Koufopavlou, O., Skodras, A.N.: A hardware implementation of CURUPIRA block cipher for wireless sensors. In: 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools, 2008. DSD 08, 3–5 September 2008, pp. 850–3 (2008b)
Satoh, A., Morioka, S.: Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES, Lecture Notes in Computer Science Information Security, pp. 252–266. Springer (2003)
Knudsen, L.R., et al.: PRESENT: an ultralightweight block cipher, A. bogdanov. Hortz gortz institute for I.T. security
Lara-Nino, C.A., Diaz-Perez, A., Morales-Sandoval, M.: Lightweight Hardware Architectures for the Present Cipher in FPGA. IEEE Trans Circuits Syst. I Regul. Pap. 64(9), 2544–2555 (2017)
Mishra, S., Mishra, Z., Acharya, B.: A High Throughput And Speed Architecture of Lightweight Cipher LEA. In: 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
Thakor, V.A., Razzaque, M.A., Darji, A.D., Patel, A.R.: A novel 5-bit S-box design for lightweight cryptography algorithms. J. Info. Sec. Appl. 73, 103444 (2023)
Han, C.: An image encryption algorithm based on modified logistic chaotic map. Optik- Int. J. Light and Electr. Optics 181, 779–789 (2019)
Andrew Rukhin, S., et al.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (2010). https://doi.org/10.1017/S000156600001014X
Nannipieri, P., et al.: True random number generator based on fibonacci-galois ring oscillators for FPGA. Appl. Sci. 11(8) (2021). https://doi.org/10.3390/app11083330
Manikandan, C., Rakesh Kumar, S., Nikhith, K., Sai Gayathri, M., Neelamegam, P.: Chaotic map based key generation and realistic power allocation technique for secure MU-MIMO wireless system. In: Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings 10, pp. 142–155. Springer Singapore (2019)
Skórski, M.: Evaluating entropy sources for true random number generators by collision counting. In: International Conference on Applications and Techniques in Information Security, pp. 69–80. Springer Singapore, Singapore (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sri Yugenther, B., Anila Glory, H., Naresh Kumar, H., Sivaraman, R., Shankar Sriram, V.S. (2025). Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions. In: Shankar Sriram, V., H., A.G., Li, G., Pokhrel, S.R. (eds) Applications and Techniques in Information Security. ATIS 2024. Communications in Computer and Information Science, vol 2306. Springer, Singapore. https://doi.org/10.1007/978-981-97-9743-1_9
Download citation
DOI: https://doi.org/10.1007/978-981-97-9743-1_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-9742-4
Online ISBN: 978-981-97-9743-1
eBook Packages: Computer ScienceComputer Science (R0)