International Journal of Soft Computing and Engineering (IJSCE)
With the rapid advances in wireless networks low-end devices, such as RFID tags, wireless sensor nodes are deployed in increasing numbers each and every day. Such devices are used in many applications and environments, leading to an ever increasing need to provide security. When choosing security algorithms for resource-limited devices the implementation cost should be taken into account, In order to satisfy these need, secure and efficient encryption and authentication schemes have to be developed. Symmetric-key algorithms, especially lightweight block ciphers, still play an important role to provide confidentiality in the said applications.