Sign In to Follow Application
View All Documents & Correspondence

Mimli: A Lightweight Block Cipher For Io T Resource Constrained Devices

Abstract: The proliferation of IoT devices has led to an exponential increase in the volume of data generated by these devices. This data often contains sensitive information that needs to be secured against unauthorized access, tampering, and interception. As a result, For both businesses and consumers, protecting the security of IoT devices and the data they create has become a crucial concern. However, since that most Internet of Things (IoT) devices are easily accessible, security is one of the biggest issues in the implementation of IoT, and often have constrained resources, such as physical space, power, memories, and computational capacity. In addition, The information is subject to many forms of assaults because of the extensive connection of Internet of Things (IoT) gadgets and the enormous volume of data they create. To address the security challenges of IoT, cryptographic algorithms are used to provide confidentiality and integrity to the information. However, traditional cryptographic algorithms can be too resource-intensive for IoT devices, making it necessary to develop lightweight security schemes. Lightweight cryptography algorithms are designed to be efficient and lightweight, with a small memory footprint and low computational requirements, making them well-suited for IoT devices with limited resources. Among the lightweight cryptography algorithms, lightweight block ciphers are particularly popular. These ciphers use either a Substitution Permutation type network structure or a Feistel type network structure to encrypt. In the SP network structure, the plaintext is divided into smaller blocks, and each block is substituted and permuted using a fixed set of operations. The Feistel network structure, on the other hand, divides the plaintext into two halves, and each half is processed separately using a set of round functions before being combined again. The proposed work focuses on the design of a Lightweight type Block Cipher which can be used in very low resourced devices (RFID tags, IoT devices, sensors etc.).An ultra-lightweight block cipher architecture is proposed for securing IoT devices with limited resources. The architecture utilizes a combination of the SPN and Feistel structures and achieves a balance between security and resource utilization. The proposed cipher provides robust security for IoT devices and has minimal resource utilization, making it an ideal choice for securing IoT devices with limited resources.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
03 July 2024
Publication Number
32/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

INSTITUTE OF ENGINEERING & MANAGEMENT
INSTITUTE OF ENGINEERING & MANAGEMENT, SALT LAKE ELECTRONICS COMPLEX, SECTOR-V, SALT LAKE, KOLKATA.

Inventors

1. Mihir Lal Saha
INSTITUTE OF ENGINEERING & MANAGEMENT, SALT LAKE ELECTRONICS COMPLEX, SECTOR-V, SALT LAKE, KOLKATA, PIN- 700091.
2. Dr. Malay Gangopadhyaya
INSTITUTE OF ENGINEERING & MANAGEMENT, SALT LAKE ELECTRONICS COMPLEX, SECTOR-V, SALT LAKE, KOLKATA, PIN- 700091.
3. Dr. Siddartha Roy
1/2A/1A Ramkrishna Naskar Lane, Beleghata, Kolkata- 700010
4. Dr. Sanghamitra Poddar
INSTITUTE OF ENGINEERING & MANAGEMENT, SALT LAKE ELECTRONICS COMPLEX, SECTOR-V, SALT LAKE, KOLKATA, PIN- 700091.
5. Dr. Sayan Chatterjee
Dept. of Electronics and Telecommunication Engineering, 188 Raja S. C. Mullick Road, Kolkata 700032, Jadavpur University
6. Dr. Subhabrata Banerjee
INSTITUTE OF ENGINEERING & MANAGEMENT, SALT LAKE ELECTRONICS COMPLEX, SECTOR-V, SALT LAKE, KOLKATA, PIN- 700091.

Specification

Description:The motivation behind this work is design and develop of a lightweight block cipher algorithm that can provide strong encryption while minimizing the use of resources. The proposed algorithm takes advantage of the benefits of both SP-type and Feistel-type network structures to create a novel encryption method that can support 256-bit keys and 64-bit data blocks, which are commonly used in block cipher design. The SP-type network structure is based on the substitution-permutation (SP) type network, which applies a substitution and permutation layer to the plaintext in a parallel fashion. The Feistel-type network structure, on the other hand, uses a series of rounds to encrypt the plaintext, where each round involves splitting the plaintext into two halves, applying a function to one half, and then XOR ing the output of the function with the other half before swapping the two halves and repeating the process. The proposed block cipher algorithm combines the SP-type and Feistel-type network structures to create a hybrid encryption method that takes advantage of the strengths of both structures. The proposed block cipher algorithm supports 256-bit keys and 64-bit data blocks, which makes it suitable for use in resource-constrained environments such as IoT devices.
Here, a method is given that employs bit jumbling, concatenation, and simple logical XOR operations. As a result, only a person with access rights may decrypt the data for use the disclosed system was designed to be as lightweight as feasible and employs 64 bits of unencrypted data.

The disclosed system was designed to be as lightweight as feasible and employs 64 bits of unencrypted data. The big block of data is divided into several blocks of 32 bits as a result, each of which is handled by a distinct data channel. The procedure is repeated for any additional data blocks. The output of processing each data block is integrated to form the encrypted data. Eight 32-bit sub keys that are created from the primary key are used in many rounds of encryption. Good performance for devices with constrained resources requires Enciphering using the suggested method requires little power, little memory, and little storage space.

Figure.2 illustrates an encryption process of proposed block cipher in accordance with an embodiment of the present disclosure. Eight sub keys each of 32-bit width (SK_1, SK_2, SK_3, SK_4, SK_5, SK_6, SK_7 and SK_8) are derived from the eight round keys obtained by splitting the main 256 bits key in eight parts in the proposed method of encryption process and decryption process. By feeding various sub keys into various F-functions of several rounds of encryption, a strong but straightforward key generation method has been developed in response to the necessity to create a lightweight encryption process. Eight separate sub key sequences are used in eight different levels of round operation during the eight different encryption rounds, as was previously described, to ensure resilience against related key assaults. Key generation technique includes a diagram of the sub key creation strategy. The newly developed method skips over a number of monotonous operations, including XOR gates and F-function for eight iterative operations. After each cycle, intermediate cypher text outputs are produced and promptly fed into the following round. The final cypher text output is produced when ten successive rounds have been completed (CT).
The proposed lightweight cryptography system is reportedly designed and developed in Verilog, and its correctness is confirmed using Xilinx Vivado 2018.2 to run a behavioural simulation that takes two inputs: 64 bits of plaintext and 256 bits of key, which results in 64 bits of cipher text are output. To validate the real-time implementation of the recently developed encryption system, a smaller version of the algorithm, requiring 16 bits of input for both the key and the plaintext, is put into practice on the Artix 7 FPGA board.
We have designed a new block cipher that supports 64 bits of plaintext and 256 bits of key. The new cipher has a gate equivalent area (GE) of only 960, which is significantly lesser than 1000 that’s why it can be called as a ultra-lightweight block cipher .This means that the new cipher uses fewer gates, which reduces computational delay while still maintaining a high level of security through bit jumbling and repeating. Compared to other lightweight variants, this block cipher consumes only 2.89 mW of power, which is relatively low. This makes the cipher architecture well-suited for applications where power consumption and compact area are the primary limitations, such as in low-power embedded systems or IoT devices. The delay of a cryptographic algorithm refers to the time it takes for the algorithm to encrypt a given input. In general, a lower delay is desirable, as it allows the algorithm to process data more quickly and efficiently. The lower delay of the proposed block cipher design can be seen as a significant advantage over existing block ciphers, especially in applications where fast processing of large amounts of data is required. , Claims:We Claim:
1. A Different encryption method has been introduced that combines the benefits of both SPN-type and Feistel-type network structures.
2. Comprising a processor configured to execute encryption and decryption operations using the combined SPN and Feistel Network structures.
3. Comprising memory resources for storing encryption keys and intermediate data generated during encryption and decryption processes.
4. A method for generating encryption keys compatible with the lightweight encryption method of utilizing techniques optimized for IoT devices to ensure cryptographic strength and key entropy.
5. A method for securely updating the encryption algorithm and encryption keys used by IoT devices.
6. It can be used in be used in central processing units block for security purposes.

Documents

Application Documents

# Name Date
1 202431050809-REQUEST FOR EXAMINATION (FORM-18) [03-07-2024(online)].pdf 2024-07-03
2 202431050809-FORM 18 [03-07-2024(online)].pdf 2024-07-03
3 202431050809-FORM 1 [03-07-2024(online)].pdf 2024-07-03
4 202431050809-DRAWINGS [03-07-2024(online)].pdf 2024-07-03
5 202431050809-COMPLETE SPECIFICATION [03-07-2024(online)].pdf 2024-07-03
6 202431050809-FORM-9 [06-08-2025(online)].pdf 2025-08-06
7 202431050809-FORM-5 [26-08-2025(online)].pdf 2025-08-26