Skip to main content

Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2024)

Abstract

Edge data security became the crucial concern of the network connected framework. It demands for the lightweight solutions where the traditional algorithms have not been suitable for the resource constrained devices. Hence, the development of lightweight crypto-solutions has attained the visibility. This proposed leverages the traditional Lightweight Encryption Algorithm (LEA) on reconfigurable hardware such as Field Programmable Gate Array (FPGA) by addressing its potential pitfalls namely vulnerable to differential cryptanalysis. To overcome this, 5-bit Substitution box (S-box) blended with chaos approach has been adopted on the traditional LEA schema. Which also ensures the lightweightness. The substitution and chaotic diffusion processes improves the strength of the LEA to meet out the statistical requirements which was confirmed by conducting the NIST SP 800 – 22 batteries of test by attaining the pass rate of 99.9%with the level of significance as 0.01. Further, Hamming distance and Shannon entropy were estimated to determine the switching activity and uniformity of the generated randomness. On the other hand, the modified LEA occupies only less than 5% of the total hardware footprint of the Intel Cyclone IV E FPGA chip which dissipates 131.62 mW of power for encryption and 132.27 mW of power for decryption respectively. The obtained results were compared with the traditional LEA design and it evidences that the modified LEA with S-box and chaos has significantly increased the performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sun, Y., Zhang, J., Bie, R., Yu, J.: Advancing researches on IoT systems and intelligent applications. Personal and Ubiquitous Computing 22(3), 449–452 (2018)

    Google Scholar 

  2. Maddikunta, P.K.R., et al.: Green communication in IoT networks using a hybrid optimization algorithm. Computer Communications 159, 97–107 (2020)

    Google Scholar 

  3. Ch, R., Gadekallu, T.R., Abidi, M.H., Al-Ahmari, A.: Computation system to classify ciber crime offenses using machine learning. Sustainability 12(10), 4087 (2020)

    Article  Google Scholar 

  4. Henriques, M., Vernekar, N.: Using symmetric and asymmetric cryptography to secure communication between devices in IoT. In: 2017 IEEE International Conference on IoT and Application(ICIOT). Nagapattinam, India (2017)

    Google Scholar 

  5. Numan, M., Subhan, F., Khan, W.Z., et al.: A systematic review on clone node detection in static wireless sensor networks. IEEE Access 8, 65450–65461 (2020)

    Google Scholar 

  6. Ragab, A.: Robust hybrid cryptosystem for protecting smart devices in internet of things (IOT), Master Thesis, Department of Computer Engineering, Arab Academy for Science, Technology and Maritime Transport. Cairo, Egypt (2019)

    Google Scholar 

  7. Youssef, W.E.H., Abdelli, A., Dridi, F., Machhout, M.: Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications. Hindawi Security and Communication Networks, Article ID 8860598, 13 (2020). https://doi.org/10.1155/2020/8860598

  8. Baskar, C., Balasubramaniyan, C., Manivannan, D.: Establishment of Light Weight Cryptography for Resource Constraint Environment using FPGA. International Conference on Information Security & Privacy (ICISP2015). Nagpur, INDIA (2015)

    Google Scholar 

  9. Dahiphale, V., Raut, H., Bansod, G.: Design and Implementation of novel datapath designs of lightweight cipher RECTANGLE for resource constrained environment. Multimedia Tools and Applications 78, 23659–23688 (2019). https://doi.org/10.1007/s11042-019-7587-3

    Article  Google Scholar 

  10. Fan, X., Gong, G., Lauffenburger, K., Hicks, T.: FPGA Implementations of the Hummingbird Cryptographic Algorithm

    Google Scholar 

  11. Kiran Kumar, V.G., Poojary, A., Shantharama Rai, C., Nagesh, H.R.: Implementation of Lightweight Cryptographic Algorithms in FPGA. Proceeding of Second International conference on Circuits, Controls and Communications

    Google Scholar 

  12. Kitsos, P., Selimis, G., Koufopavlou, O., Skodras, A.N.: A hardware implementation of CURUPIRA block cipher for wireless sensors. In: 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools, 2008. DSD 08, 3–5 September 2008, pp. 850–3 (2008b)

    Google Scholar 

  13. Satoh, A., Morioka, S.: Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES, Lecture Notes in Computer Science Information Security, pp. 252–266. Springer (2003)

    Google Scholar 

  14. Knudsen, L.R., et al.: PRESENT: an ultralightweight block cipher, A. bogdanov. Hortz gortz institute for I.T. security

    Google Scholar 

  15. Lara-Nino, C.A., Diaz-Perez, A., Morales-Sandoval, M.: Lightweight Hardware Architectures for the Present Cipher in FPGA. IEEE Trans Circuits Syst. I Regul. Pap. 64(9), 2544–2555 (2017)

    Article  Google Scholar 

  16. Mishra, S., Mishra, Z., Acharya, B.: A High Throughput And Speed Architecture of Lightweight Cipher LEA. In: 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)

    Google Scholar 

  17. Thakor, V.A., Razzaque, M.A., Darji, A.D., Patel, A.R.: A novel 5-bit S-box design for lightweight cryptography algorithms. J. Info. Sec. Appl. 73, 103444 (2023)

    Google Scholar 

  18. Han, C.: An image encryption algorithm based on modified logistic chaotic map. Optik- Int. J. Light and Electr. Optics 181, 779–789 (2019)

    Article  Google Scholar 

  19. Andrew Rukhin, S., et al.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (2010). https://doi.org/10.1017/S000156600001014X

  20. Nannipieri, P., et al.: True random number generator based on fibonacci-galois ring oscillators for FPGA. Appl. Sci. 11(8) (2021). https://doi.org/10.3390/app11083330

  21. Manikandan, C., Rakesh Kumar, S., Nikhith, K., Sai Gayathri, M., Neelamegam, P.: Chaotic map based key generation and realistic power allocation technique for secure MU-MIMO wireless system. In: Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings 10, pp. 142–155. Springer Singapore (2019)

    Google Scholar 

  22. Skórski, M.: Evaluating entropy sources for true random number generators by collision counting. In: International Conference on Applications and Techniques in Information Security, pp. 69–80. Springer Singapore, Singapore (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Sivaraman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sri Yugenther, B., Anila Glory, H., Naresh Kumar, H., Sivaraman, R., Shankar Sriram, V.S. (2025). Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions. In: Shankar Sriram, V., H., A.G., Li, G., Pokhrel, S.R. (eds) Applications and Techniques in Information Security. ATIS 2024. Communications in Computer and Information Science, vol 2306. Springer, Singapore. https://doi.org/10.1007/978-981-97-9743-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-9743-1_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-9742-4

  • Online ISBN: 978-981-97-9743-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics