AnswerBun.com

How to justify the lightweight symmetric PRESENT encryption algorithm is more secure?

Cryptography Asked by Sunitha Tappari on December 31, 2021

My domain is VLSI design, currently, I’m working on PRESENT Lightweight cryptographic algorithm.

  • I want to know how to improve the security of the algorithm rather than increasing bit size?
  • Is there any possibility to improve the security of the algorithm by using automatically generated keys rather than manually giving data?

Any suggestion?

Add your own answers!

Related Questions

What will be appropriate AES padding characters?

2  Asked on November 23, 2021 by user3769778

     

How does RSA signature verification work?

3  Asked on November 19, 2021

   

Padding Oracle Attack with AES-128-CTR and MAC

1  Asked on November 13, 2021 by answerfinder95

         

Generate AES key from weak string

1  Asked on November 13, 2021 by user81531

   

Definition of $x^u bmod k$

2  Asked on October 24, 2021

 

Ask a Question

Get help from others!

© 2022 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, MenuIva, UKBizDB, Menu Kuliner, Sharing RPP, SolveDir