Lightweight Dynamic Crypto Algorithm for Next Internet Generation

Authors

  • A. H. Al-Omari Computer Science Department, Northern Border University, Saudi Arabia

Abstract

Modern applications, especially real time applications, are hungry for high-speed end-to-end transmission which usually conflicts with the necessary requirements of confidential and secure transmission. In this work, a relatively fast, lightweight and attack-resistant crypto algorithm is proposed. The algorithm is a symmetric block cipher that uses a secure pre-shared secret as the first step. Then, a dynamic length key is generated and inserted inside the cipher text. Upon receiving the cipher text, the receiver extracts the key from the received cipher text to decrypt the message. In this algorithm, ciphering and deciphering are mainly based on simple XoR operations followed by substitutions and transpositions in order to add more confusion and diffusion to the algorithm. Experimental results show faster encryption/decryption time when compared to known encryption standards.

Keywords:

dynamic crypto algorithm, lightweight crypto algorithm, dynamic cryptography, shared secrets, next internet generation security

Downloads

Download data is not yet available.

References

M. Talbi, F. Maddouri, A. Jemai, M. S. Bouhlel, “Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT”, Sixth International Conference on Advances in Computing, Electronics and Communication, Rome, Italy, 2017

S. Singh, P. K. Sharma, S. Y. Moon, J. H. Park, “Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions”, Journal of Ambient Intelligence and Humanized Computing, 2017 DOI: https://doi.org/10.1007/s12652-017-0494-4

K. A. McKay, L. Bassham, M. S. Turan, N. Mouha, Report on Lightweight Cryptography. Technical Report NISTIR 8114, National Institue of Standards and Technology, 2017 DOI: https://doi.org/10.6028/NIST.IR.8114

G. Bansod, N. Raval, N. Pisharoty, “Implementation of a new lightweight encryption design for embedded security”, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 1, pp. 142-151, 2015 DOI: https://doi.org/10.1109/TIFS.2014.2365734

B. Chaitra, V. G. K. Kumar, R. C. Shatharama, “A Survey on Various Lightweight Cryptographic Algorithms on FPGA”, IOSR Journal of Electronics and Communication Engineering, Vol. 12, No. 1, pp. 45-59, 2017 DOI: https://doi.org/10.9790/2834-1201025459

K. P. Mahaffey, J. G. Hering, J. D. Burgess, J. P. Grubb, D. Golombek, D. L. Richardson, A. McKay Lineberry, T. M. Wyatt, System and Method for Mobile Communication Device Application Advisement, U.S. Patent No. 9,367,680, 2016

Isha, A. K. Luhach, “Analysis of Lightweight Cryptographic Solutions for Internet of Things”, Indian Journal of Science and Technology, Vol. 9, No. 28, 2016 DOI: https://doi.org/10.17485/ijst/2016/v9i28/98382

W. Joseph, B. Braem, E. Reusens, B. Latre, L. Martens, I. Moerman, C. Blondia, “Design of energy efficient topologies for wireless on-body channel”, 17th European Wireless 2011-Sustainable Wireless Technologies, Vienna, Austria, April 27-29, 2011

J. Yick, B. Mukherjee, D. Ghosal, “Wireless sensor network survey”, Computer Networks, Vol. 52, No. 12, pp. 2292-2330, 2008 DOI: https://doi.org/10.1016/j.comnet.2008.04.002

A. Sajid, H. Abbas, K. Saleem, “Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges”, IEEE Access, Vol. 4, pp. 1375-1384, 2016 DOI: https://doi.org/10.1109/ACCESS.2016.2549047

A. Poschmann, G. Leander, K. Schramm, C. Paar, “New Light-Weight Crypto Algorithms for RFID”, IEEE International Symposium on Circuits and Systems, New Orleans, USA, May 27-30, 2007 DOI: https://doi.org/10.1109/ISCAS.2007.378273

A. Biryukov, L. P. Perrin, “State of the art in lightweight symmetric cryptography”, available at: http://orbilu.uni.lu/handle/10993/31319, 2017

H. M. S. El Hennawy, A. E. A. Omar, S. M. A. Kholaif, “LEA: link encryption algorithm proposed stream cipher algorithm”, Ain Shams Engineering Journal, Vol. 6, No. 1, pp. 57-65, 2015 DOI: https://doi.org/10.1016/j.asej.2014.08.001

A. H. Omari, B. M. Al-Kasasbeh, A. A. Omari, “Dynamic Cryptography Algorithm for Real-Time Applications DCA-RTA”, 3rd International Conference on Applied Mathematics, Simulation, Modelling, Circuits, Systems and Signals, Athens, Greece, December 29-31, 2009

A. H. Omari, B. M. Al-Kasasbeh, R. E. AL-Qutaish, M. I. Muhairat, “New Cryptographic Algorithm for the Real Time Applications”, 7th WSEAS International Conference on Information Security and Privacy, Cairo, Egypt, December 29-31, 2008

A. H. Al-Omari, “Dynamic Crypto Algorithm for Real-Time Applications DCA-RTA, Key Shifting”, International Journal of Advanced Computer Science and Applications, Vol. 7, No. 1, pp. 72-77, 2016 DOI: https://doi.org/10.14569/IJACSA.2016.070110

C. H. Lim, T. Korkishko, “mCrypton–A lightweight block cipher for security of low-cost rfid tags and sensors”, in: Information Security Applications, Lecture Notes in Computer Science, Vol. 3786, pp. 243–258, Springer, 2005 DOI: https://doi.org/10.1007/11604938_19

C. H. Lim, Crypton: A New 128-bit Block Cipher, NIsT AEs Proposal 1998

D. Engels, M. J. O. Saarinen, P. Schweitzer, E. M. Smith, “The Hummingbird-2 lightweight authenticated encryption algorithm”, 7th International Workshop on Security and Privacy, Amherst, USA, June 26–28, 2011 DOI: https://doi.org/10.1007/978-3-642-25286-0_2

A. A. Al-Omari, Investigating a Dynamic Crypto Algorithm for Real Time Applications (DCA-RTA), MSc Thesis, The University of Jordan, 2012

M. A. Al-Qaysi, A Shared Value Based Symmetric Crypto System (SVSCS), MSc Thesis, Princess Sumaya University for Technology, 2014

C. Cremers, “Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2”, in: European Symposium on Research in Computer Security, Lecture Notes in Computer Science, Vol. 6879, pp. 315-334, Springer, 2011 DOI: https://doi.org/10.1007/978-3-642-23822-2_18

Y. Dodis, M. Stam, J. Steinberger, T. Liu, “Indifferentiability of Confusion-Diffusion Networks”, in: Advances in Cryptology–Eurocrypt 2016, Lecture Notes in Computer Science, Vol. 9666, pp. 679-704, Springer, 2016 DOI: https://doi.org/10.1007/978-3-662-49896-5_24

H. Feistel, Cryptographic coding for data-bank privacy, IBM Thomas J. Watson Research Center, 1970

G. Singh, Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications, Vol. 67, No. 19, pp. 33–38, 2013 DOI: https://doi.org/10.5120/11507-7224

Divyanjali, Ankur, V. Pareek, “An overview of cryptographically secure pseudorandom number generators and BBS”, International Conference on Advances in Computer Engineering & Applications, Ghaziabad, India, February 15, 2015

Downloads

How to Cite

[1]
A. H. Al-Omari, “Lightweight Dynamic Crypto Algorithm for Next Internet Generation”, Eng. Technol. Appl. Sci. Res., vol. 9, no. 3, pp. 4203–4208, Jun. 2019.

Metrics

Abstract Views: 879
PDF Downloads: 414

Metrics Information