IoT Implementation of SGCA Stream Cipher Algorithm on 8-Bits AVR Microcontroller

  • Mouza Ahmed Bani Shemaili
  • Chan Yeob YeunEmail author
  • Mohamed Jamal Zemerly
  • Khalid Mubarak
  • Hyun Ku Yeun
  • Yousef Al Hammadi
  • Yoon Seok Chang
Part of the Studies in Computational Intelligence book series (SCI, volume 789)


Recently, the computing environment is changing due to the advent of resource-constrained devices, such as smart cards. That causes a limitation in providing some main feature to the low constraint computation devices such as security. The main purpose of this paper is to design a lightweight and secure stream ciphers for IoT to secure hardware and software that can fit constrain resources devices. Thus, we implement our proposed solution on 8 bits AVR microcontroller in order to study the required memory and speed. Also, two hardware algorithms which are Trivium and Grain are implemented and comparison provided between them and the proposed stream ciphers requirements. Also, our proposed SGCA algorithm proves to have less memory and time consuming than Trivium and Grain algorithms.


IoT Stream cipher AVR Trivium Grain 


  1. 1.
    Robshaw, M.J.B.: Stream Cipher. RSA Tech. Report, TR-701, 2, 1–42 (1995)Google Scholar
  2. 2.
    Eisenbarth, T., Paar, C., Poschmann, A., Kumar, S., Usadel, L.: A survey of lightweight—cryptography implementations. In: IEEE CS and the IEEE CASS, pp. 522–533 (2007)Google Scholar
  3. 3.
    Bani Shemaili, M., Yeun, C. Y., Mubarak, K., Zemerly, M.J.: A novel hybrid cellular automata based cipher system for internet of things. In: Future Information Technology (FutureTech 2013), Lecture Notes in Electrical Engineering 276, pp. 269–276 (2013)Google Scholar
  4. 4.
    ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932. Available at
  5. 5.
    De Canni`ere, C., & Preneel, B.: Trivium. In: New Stream Cipher Designs, 4986 of LNCS, pp. 84–97. Springer (2008)Google Scholar
  6. 6.
    Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube testers and key recovery attacks on reduced-round MD6 and trivium. In: FSE, LNCS. Springer (2009)Google Scholar
  7. 7.
    Martin, H., et al.: A stream cipher proposal: Grain-128. In: 2006 IEEE International Symposium on Information Theory. IEEE (2006)Google Scholar
  8. 8.
    Itai, D., et al.: An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. In: Advances in Cryptology–ASIACRYPT 2011, pp. 327–343. Springer, Berlin (2011)Google Scholar
  9. 9.
    Alfke, P.: Efficient Shift Registers, LFSR Counters, and Long Pseudo-Random Sequence Generators. Xilinx, Tech. Rep., (Version 1.1) (1996)Google Scholar
  10. 10.
    Klapper, A., Goresky, M.: 2-adic shift registers. In: Fast Software Encryption (FSE 1993), Lecture Notes in Computer Science 809, pp. 174–178. Springer (1993)Google Scholar
  11. 11.
    Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Proceedings of the Advances in Cryptology (CRYPTO 1993), LNCS, pp. 22–39 (1994)Google Scholar
  12. 12.
    Wolfram, S.: Cryptography with cellular automata. In: Advances in Cryptology: Crypto’85 Proceedings, LNCS 218, pp. 429–432. Springer (1985)Google Scholar
  13. 13.
    Bassham, L., et al.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, pp. 800–822. NIST SP (2010)Google Scholar
  14. 14.
    MIKROELEKTRONIKA: mikroC PRO for AVR, Dec., (2008).
  15. 15.
    PatilȦ, N.V., Irabashetti, P.S.: Dynamic memory allocation: role in memory management. Int. J. Curr. Eng. Technol. 4(2), 531–535 (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Mouza Ahmed Bani Shemaili
    • 1
  • Chan Yeob Yeun
    • 2
    Email author
  • Mohamed Jamal Zemerly
    • 2
  • Khalid Mubarak
    • 3
  • Hyun Ku Yeun
    • 4
  • Yousef Al Hammadi
    • 5
  • Yoon Seok Chang
    • 6
  1. 1.CIS DivisionHCTRas al KhaimahUAE
  2. 2.ECE DepartmentKhalifa University of Science and TechnologyAbu DhabiUAE
  3. 3.Dubai Men’s College, HCTDubaiUAE
  4. 4.NS DivisionHCTAbu DhabiUAE
  5. 5.College of Information TechnologyUAE UniversityAl AinUAE
  6. 6.School of Air Transport and LogisticsKorea Aerospace UniversityGoyangSouth Korea

Personalised recommendations