Lightweight Dynamic Crypto Algorithm for Next Internet Generation

A. H. Al-Omari


Modern applications, especially real time applications, are hungry for high-speed end-to-end transmission which usually conflicts with the necessary requirements of confidential and secure transmission. In this work, a relatively fast, lightweight and attack-resistant crypto algorithm is proposed. The algorithm is a symmetric block cipher that uses a secure pre-shared secret as the first step. Then, a dynamic length key is generated and inserted inside the cipher text. Upon receiving the cipher text, the receiver extracts the key from the received cipher text to decrypt the message. In this algorithm, ciphering and deciphering are mainly based on simple XoR operations followed by substitutions and transpositions in order to add more confusion and diffusion to the algorithm. Experimental results show faster encryption/decryption time when compared to known encryption standards.


dynamic crypto algorithm; lightweight crypto algorithm; dynamic cryptography; shared secrets; next internet generation security

Full Text:



M. Talbi, F. Maddouri, A. Jemai, M. S. Bouhlel, “Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT”, Sixth International Conference on Advances in Computing, Electronics and Communication, Rome, Italy, 2017

S. Singh, P. K. Sharma, S. Y. Moon, J. H. Park, “Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions”, Journal of Ambient Intelligence and Humanized Computing, 2017

K. A. McKay, L. Bassham, M. S. Turan, N. Mouha, Report on Lightweight Cryptography. Technical Report NISTIR 8114, National Institue of Standards and Technology, 2017

G. Bansod, N. Raval, N. Pisharoty, “Implementation of a new lightweight encryption design for embedded security”, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 1, pp. 142-151, 2015

B. Chaitra, V. G. K. Kumar, R. C. Shatharama, “A Survey on Various Lightweight Cryptographic Algorithms on FPGA”, IOSR Journal of Electronics and Communication Engineering, Vol. 12, No. 1, pp. 45-59, 2017

K. P. Mahaffey, J. G. Hering, J. D. Burgess, J. P. Grubb, D. Golombek, D. L. Richardson, A. McKay Lineberry, T. M. Wyatt, System and Method for Mobile Communication Device Application Advisement, U.S. Patent No. 9,367,680, 2016

Isha, A. K. Luhach, “Analysis of Lightweight Cryptographic Solutions for Internet of Things”, Indian Journal of Science and Technology, Vol. 9, No. 28, 2016

W. Joseph, B. Braem, E. Reusens, B. Latre, L. Martens, I. Moerman, C. Blondia, “Design of energy efficient topologies for wireless on-body channel”, 17th European Wireless 2011-Sustainable Wireless Technologies, Vienna, Austria, April 27-29, 2011

J. Yick, B. Mukherjee, D. Ghosal, “Wireless sensor network survey”, Computer Networks, Vol. 52, No. 12, pp. 2292-2330, 2008

A. Sajid, H. Abbas, K. Saleem, “Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges”, IEEE Access, Vol. 4, pp. 1375-1384, 2016

A. Poschmann, G. Leander, K. Schramm, C. Paar, “New Light-Weight Crypto Algorithms for RFID”, IEEE International Symposium on Circuits and Systems, New Orleans, USA, May 27-30, 2007

A. Biryukov, L. P. Perrin, “State of the art in lightweight symmetric cryptography”, available at:, 2017

H. M. S. El Hennawy, A. E. A. Omar, S. M. A. Kholaif, “LEA: link encryption algorithm proposed stream cipher algorithm”, Ain Shams Engineering Journal, Vol. 6, No. 1, pp. 57-65, 2015

A. H. Omari, B. M. Al-Kasasbeh, A. A. Omari, “Dynamic Cryptography Algorithm for Real-Time Applications DCA-RTA”, 3rd International Conference on Applied Mathematics, Simulation, Modelling, Circuits, Systems and Signals, Athens, Greece, December 29-31, 2009

A. H. Omari, B. M. Al-Kasasbeh, R. E. AL-Qutaish, M. I. Muhairat, “New Cryptographic Algorithm for the Real Time Applications”, 7th WSEAS International Conference on Information Security and Privacy, Cairo, Egypt, December 29-31, 2008

A. H. Al-Omari, “Dynamic Crypto Algorithm for Real-Time Applications DCA-RTA, Key Shifting”, International Journal of Advanced Computer Science and Applications, Vol. 7, No. 1, pp. 72-77, 2016

C. H. Lim, T. Korkishko, “mCrypton–A lightweight block cipher for security of low-cost rfid tags and sensors”, in: Information Security Applications, Lecture Notes in Computer Science, Vol. 3786, pp. 243–258, Springer, 2005

C. H. Lim, Crypton: A New 128-bit Block Cipher, NIsT AEs Proposal 1998

D. Engels, M. J. O. Saarinen, P. Schweitzer, E. M. Smith, “The Hummingbird-2 lightweight authenticated encryption algorithm”, 7th International Workshop on Security and Privacy, Amherst, USA, June 26–28, 2011

A. A. Al-Omari, Investigating a Dynamic Crypto Algorithm for Real Time Applications (DCA-RTA), MSc Thesis, The University of Jordan, 2012

M. A. Al-Qaysi, A Shared Value Based Symmetric Crypto System (SVSCS), MSc Thesis, Princess Sumaya University for Technology, 2014

C. Cremers, “Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2”, in: European Symposium on Research in Computer Security, Lecture Notes in Computer Science, Vol. 6879, pp. 315-334, Springer, 2011

Y. Dodis, M. Stam, J. Steinberger, T. Liu, “Indifferentiability of Confusion-Diffusion Networks”, in: Advances in Cryptology–Eurocrypt 2016, Lecture Notes in Computer Science, Vol. 9666, pp. 679-704, Springer, 2016

H. Feistel, Cryptographic coding for data-bank privacy, IBM Thomas J. Watson Research Center, 1970

G. Singh, Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications, Vol. 67, No. 19, pp. 33–38, 2013

Divyanjali, Ankur, V. Pareek, “An overview of cryptographically secure pseudorandom number generators and BBS”, International Conference on Advances in Computer Engineering & Applications, Ghaziabad, India, February 15, 2015

eISSN: 1792-8036     pISSN: 2241-4487