How to justify the lightweight symmetric PRESENT encryption algorithm is more secure?

Cryptography Asked by Sunitha Tappari on December 31, 2021

My domain is VLSI design, currently, I’m working on PRESENT Lightweight cryptographic algorithm.

  • I want to know how to improve the security of the algorithm rather than increasing bit size?
  • Is there any possibility to improve the security of the algorithm by using automatically generated keys rather than manually giving data?

Any suggestion?

Add your own answers!

Related Questions

What will be appropriate AES padding characters?

2  Asked on November 23, 2021 by user3769778


How does RSA signature verification work?

3  Asked on November 19, 2021


Padding Oracle Attack with AES-128-CTR and MAC

1  Asked on November 13, 2021 by answerfinder95


Generate AES key from weak string

1  Asked on November 13, 2021 by user81531


Definition of $x^u bmod k$

2  Asked on October 24, 2021


Ask a Question

Get help from others!

© 2022 All rights reserved. Sites we Love: PCI Database, MenuIva, UKBizDB, Menu Kuliner, Sharing RPP, SolveDir