Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A study of lightweight cryptography
Download
index.pdf
Date
2020
Author
Çamur, Zeliha
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
545
views
972
downloads
Cite This
Technology is evolving rapidly and with technology, the internet is also changing. People used to use internet to connect to each other. But with the changes in recent years, the internet is starting to be used more to connect devices to each other. These devices can range from powerful computing devices, such as desktop computers and tablets, to resource contrained devices, such as RFID tags and sensor networks. When it comes to these constrained devices, conventional cryptographic algorithms fail to provide necessary security and performance. Therefore, specific algorithms, designed with the limitations of constrained devices in mind, called lightweight algorithms are needed. For this reason, NIST has started a Lightweight Cryptography Project to standardize lightweight algorithms. In this thesis, we first explain what lightweight cryptography is, along with its target devices and performance metrics and give two examples of lightweight algorithms, block cipher PRESENT and stream cipher TRIVIUM . After that, we summarize the Lightweight Cryptography Project and give its timeline. Lastly, we talk about ASCON , one of the second round algorithms of the Lightweight Cryptography Project.
Subject Keywords
Lightweight construction.
,
Lightweight Cryptography
,
PRESENT
,
TRIVIUM
,
ASCON
URI
http://etd.lib.metu.edu.tr/upload/12625541/index.pdf
https://hdl.handle.net/11511/45771
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
A PHENOMENOLOGICAL INVESTIGATION OF PRESCHOOLERS' EXPERIENCES IN READING AN E-BOOK
Kaplan, Göknur; Yildirim, Caglar; Islim, Omer Faruk; Duman, Murat (2012-07-04)
The diffusion of technology in our daily lives has changed our ways of communication, socialization, play, etc. as well as the way we learn. The reflections of this transformation can also be seen in both formal and informal educational settings. A brief review of the literature reveals both successful implementations and potential problems with technology use in education. However, there is still lack of research studies regarding the use of technology in early childhood education. The literature provides ...
A case study: students'attitudes towards computer assisted learning, computer assisted language learning and foreign language learning
Tunçok, Bezen; Daloğlu, Ayşegül; Department of English Language Teaching (2010)
Being one of the most epoch making invention of the 21st century, computers have fundamentally altered every aspect of people’s lives, including the education domain. Thus, for decades, computer-assisted language learning has received considerable amount of attention among researchers and language teachers by serving interactive, multi-sensory, and autonomous learning opportunities. In this respect, innumerable large or small-scale projects blazed a trail for other teachers to follow. The present study, the...
A SYSTEMATIC REVIEW ON SMART CITY SERVICES AND IOT-BASED TECHNOLOGIES
Özkan Yıldırım, Sevgi (2019-03-21)
Due to the technological developments, Internet of things (IoT) has become a real phenomenon. Accordingly, many IoT-based smart concepts appeared in our daily lives such as smart home, smart healthcare and smart city. There are several factors accelerating or hindering the adoption of such new services and concepts. So, the acceptance of IoT-based smart services is critical and should be analyzed carefully. In this study, we aimed to prepare a proper starting point for future studies on end user acceptance ...
A Brief analysis of presentation of self in everyday life and second life
Mit, Nil; Topal, Çağatay; Department of Sociology (2014)
As a result of the rapid advancement of internet today, millions of people are spending a considerable amount of time in virtual environments created via computer technologies. This research has tried to explore, if any, the effects of spending time in virtual environments on the personal relations of the persons in real life. Interactions of the people in the virtual environment, which is Second Life, was studied based on Goffman's Presentation of Self Theory. Within the scope of this research, the author ...
A New search engine ontology for visually impaired users
Akkaya, Ezgi; Karagöz, Pınar; Betin Can, Aysu; Department of Information Systems (2015)
In today’s world, semantic technology is getting more and more important day by day. After Web 3.0, semantic infrastructure has become a must for internet based systems. In this thesis, we have focused on the semantic basis of search engines. Google, Yahoo, Yandex and Bing are the most popular search engines. All of them have a semantic structure, however the semantics have been developed according to the users who have not any visual impairment. In this study, search engine ontology has been developed acco...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Z. Çamur, “A study of lightweight cryptography,” Thesis (M.S.) -- Graduate School of Applied Mathematics. Cryptography., Middle East Technical University, 2020.