Method for AC-Powered Encryption

Using a bit serialized, ultra-low power SIMON core that leverages adiabatic switching to provide cybersecurity via the form of encryptions Background: The exponential advancement of the internet, coding, and devices that embody both have led to a term known as ubiquitous computing. This term basically means that computing can be done anywhere, on a multitude of devices, in multiple formats; this is also evident as smart fridges, smart TVs, automated lights, and etc have started to increase. As one can expect, the continued growth of ubiquitous computing will have a big influence on areas such as transportation, healthcare, smart environment, and social relationships. As this concept grows, one major challenge that needs to be addressed is cybersecurity. In a cyber-environment where billions of small objects communicate with each other and collect information, the security of these processes must be guaranteed to protect the data, user information, and the control of the devices themselves. One of the conventional solutions to the security problem is the advanced encryption standard (AES). This approach is secure and robust, but it is not suitable for protecting data that is traveling between resource-constrained devices. Therefore, a more promising solution is needed that allows tradeoffs among security level, area, and performance. One solution lies in lightweight cryptography algorithms. Technology Overview: This technology revolves around a SIMON block cipher that transforms plain text input data into output data that is encrypted via one or more encryption keys. SIMON is a lightweight cryptography algorithm.This process includes a key expansion module and a round function module as well. The key expansion module generates and outputs the encryption key(s). It generates encryption keys through the use of adiabatic registers and key generation data values. Through the use of adiabatic switching, those values are transmitted through the adiabatic registers to generate the encryption key(s). The round function module (which has a second series of adiabatic registers) serves to receive the plain text input data, encrypt it via the encryption keys, and through the use of adiabatic switching, to transmit the encrypted data through the second series of adiabatic registers to generate the final encrypted output data. Advantages: much Better at providing security via encryptions To Internet-of-Things (IOT) devices than conventional cybersecurity methods. - is cost-effective. - It Provides An Effective tradeoff between security level, area, and performance. Applications: This technology is used to encrypt data and protect user's information/devices from being intercepted and stolen. It is applicable to most if not all IOT devices. Intellectual Property Summary: Provisional patent Stage of Development: PCT/US2020/022522 Licensing Potential: Commercial partner,Development partner,Licensing Licensing Status: Available for Licensing R#9000 Additional Information: encryption,internet,coding,automated,cybersecurity,cyber,security,encrypted,adiabatic,encrypted data,cryptography,iot,data encryption,internet of things,internet of things security,digital encryption,encryption on private data,encryption software,cyber protection,data protection,computing Please note, header image is purely illustrative. Source:, unsplash license

Patent Information:
Technology/Start-up ID: