Identify no more than two issues that, in your opinion, pose the greatest challenge (or even danger) for America. (You are not limited in focusing only on the topics that we have covered in the course.) Describe the challenge that you see. Why did you choose this challenge?
What solution(s) do you propose to stop or even reverse this challenge? Do you think that your solution(s) are palatable to the general public?
uthentication threats RFID tags are the smallest live example for low power devices which uses inductions or fields and to secure these devices lightweight cryptography comes in effect. Attacks associated with RFID tags can be physical and channel threats like disabling, modifying content, cloning, erasing memory of tag etc. Threats which uses channels as medium to find the loophole in system are RFID channel threats and may include eavesdropping, snooping or privacy leaks. 3. Vulnerabilities in systems with low power devices Resource constrained system in either power, computational speed or memory terms is itself a vulnerability, as the most of the controllers used at small scale projects and applications are 4 bit or 8 bit so it is very difficult to implement complex security algorithms. WORKING MECHANSISM OF LIGHTWEIGHT CRYPTOGRAPHY The lightweight cryptographic primitives consist of block ciphers, stream ciphers and hash functions provide advantages and better performance as compared to implementing conventional algorithms as lightweight cryptography is meant for specific range of applications. Lightweight cryptography i>GET ANSWER