Photo by Jen Theodore on Unsplash

The Chaskey Cipher: The Lighter — The Better

Our current cryptography methods, such as with AES, are not fit for limited performance devices, such as RFID tags and 8-bit microprocessors. Thus we need to investigate the usage of light-weight methods, and which are more efficient on energy consumption, processor activity and memory.

Chaskey Cipher is light-weight cryptography method for signing messages (Message Authenticaiton Code —…

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Automating Brand Abuse Detection and Takedowns

AVG Internet Security 21.11.3215 Crack+Activation Key 2022 (Latest)

Will you be paying for that with cash, credit, or your data today?

abstract ice cracking

A Cybersecurity Tongue Twister: Some Simple Signature, So Something Schnorr

Five most important thing in digital strategy

Epic Women in Cyber — Diane Abela

One Way To Make Passwords Less Annoying

{UPDATE} Infamous Killer Trivia Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

Knowing Your Nearest Neighbour … Meet Euclidian Distances

Thank you to Adrien-Marie Legendre and Carl Gustav Jacob Jacobi for their symbols

What’s At The Core of Cybersecurity on the Internet? Well, it probably includes ECDH