Ultra-Low Power Core for Lightweight Encryption


The exponential advancement of the internet, coding, and devices that embody both have led to a term known as ubiquitous computing. This term basically means that computing can be done anywhere, on a multitude of devices, in multiple formats; this is also evident as smart fridges, smart TVs, automated lights, and etc have started to increase. As one can expect, the continued growth of ubiquitous computing will have a big influence on areas such as transportation, healthcare, smart environment, and social relationships. As this concept grows, one major challenge that needs to be addressed is cybersecurity. In a cyber-environment where billions of small objects communicate with each other and collect information, the security of these processes must be guaranteed to protect the data, user information, and the control of the devices themselves. One of the conventional solutions to the security problem is the advanced encryption standard (AES). This approach is secure and robust, but it is not suitable for protecting data that is traveling between resource-constrained devices. Therefore, a more promising solution is needed that allows tradeoffs among security level, area, and performance. One solution lies in lightweight cryptography algorithms.


This technology revolves around a SIMON block cipher that transforms plain text input data into output data that is encrypted via one or more encryption keys. SIMON is a lightweight cryptography algorithm.This process includes a key expansion module and a round function module as well. The key expansion module generates and outputs the encryption key(s). It generates encryption keys through the use of adiabatic registers and key generation data values. Through the use of adiabatic switching, those values are transmitted through the adiabatic registers to generate the encryption key(s). The round function module (which has a second series of adiabatic registers) serves to receive the plain text input data, encrypt it via the encryption keys, and through the use of adiabatic switching, to transmit the encrypted data through the second series of adiabatic registers to generate the final encrypted output data.


much Better at providing security via encryptions To Internet-of-Things (IOT) devices than conventional cybersecurity methods. - is cost-effective. - It Provides An Effective tradeoff between security level, area, and performance.


This technology is used to encrypt data and protect user's information/devices from being intercepted and stolen. It is applicable to most if not all IOT devices.

Patent Status

Published: WO2020/186125

Stage Of Development


Licensing Potential

Commercial partner,Development partner,Licensing

Licensing Status

Available for Licensing

Additional Info


https://stonybrook.technologypublisher.com/files/sites/xvdqv9pthfomyeqqwgrl_markus-spiske-iar-afb0qqw-unsplash.jpg Please note, header image is purely illustrative. Source: unsplash.com/photos/iar-afB0QQw, unsplash license
Patent Information:
Case ID: R050-9000
For Information, Contact:
James Martino
Licensing Specialist
State University of New York at Stony Brook
Emre Salman
Milutin Stanacevic
Yasha Karimi
Tutu Wan
Huang Yuanfei