scispace - formally typeset
Open AccessJournal ArticleDOI

Efficient & secure cipher scheme with dynamic key-dependent mode of operation

TLDR
This paper follows the dynamic key-dependent cipher logic and proposes a new flexible lightweight technique with or without the reliance on the chaining mode of operation, which minimizes the computational overhead without degrading the security level.
Abstract
Security attacks are constantly on the rise leading to drastic consequences. Several security services are required more than ever to prevent both passive and active attacks such as Data Confidentiality (DC). A DC security service is typically based on a strong symmetric cipher algorithm. However, some of today’s applications, such as real-time applications and those running on constrained devices, require efficient lightweight cipher schemes that can achieve a good balance between the security level and system performance. Recently, a set of lightweight cryptographic algorithms has been proposed to that end, which is based on a dynamic key approach. The dynamic structure enables the reduction of the number of rounds to the minimum possible value of just one or two rounds, which minimizes the computational overhead without degrading the security level. This paper follows the dynamic key-dependent cipher logic and proposes a new flexible lightweight technique with or without the reliance on the chaining mode of operation. Furthermore, the dynamic key changes for each input message, which leads to different cipher primitives such as substitution and permutation tables, in addition to round keys. Also, the proposed mode of operation is based on the dynamic key approach whereby blocks are selected and mixed according to a dynamic permutation table. Accordingly, different plaintext messages are encrypted differently while preserving the avalanche effect. Finally, we conduct security and performance analysis to validate the efficiency and robustness of the proposed cipher scheme as compared to traditional ciphers and to the recently proposed dynamic key-dependent ciphers.

read more

Citations
More filters
Journal ArticleDOI

Cyber-Physical Systems Security: Limitations, Issues and Future Trends

TL;DR: The main aspects of CPS and the corresponding applications, technologies, and standards are surveyed and the existing security measures are presented and analyzed while identifying their main limitations.
Journal ArticleDOI

Securing internet of medical things systems: Limitations, issues and recommendations

TL;DR: There is a need to design an efficient intrusion detection/prevention system that cooperates with dynamic shadow honeypots and enhance the immunity of IoMT against cyber-attacks, and this paper proposes a security solution, which is divided into five different layers to detect and prevent attacks.

TestU01: A C Library for Empirical Testing of Random Number Generators

TL;DR: TestU01, a software library implemented in the ANSI C language, and offering a collection of utilities for the empirical statistical testing of uniform random number generators (RNGs), is introduced.
Journal ArticleDOI

Towards a secure ITS: Overview, challenges and solutions

TL;DR: An overview of ITS is presented stating the reasons behind the evolution from Vanet to IoV, and the main threats/attacks that threaten ITS are classified according to their security impact and according to the network layer they affect.
Journal ArticleDOI

Novel one round message authentication scheme for constrained IoT devices

TL;DR: A lightweight MAA that provides data integrity and source authentication based on a dynamic key structure with a single round and simple operations that is immune against existing attacks and require low overhead in terms of computational and storage resources is proposed.
References
More filters
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Book

The Design of Rijndael: AES - The Advanced Encryption Standard

TL;DR: The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked.
Proceedings ArticleDOI

Image Quality Metrics: PSNR vs. SSIM

Alain Horé, +1 more
TL;DR: A simple mathematical relationship is derived between the peak-signal-to-noise ratio and the structural similarity index measure which works for various kinds of image degradations such as Gaussian blur, additive Gaussian white noise, jpeg and jpeg2000 compression.
Journal ArticleDOI

TestU01: A C library for empirical testing of random number generators

TL;DR: TestU01 as discussed by the authors is a software library implemented in the ANSI C language, and offering a collection of utilities for the empirical statistical testing of uniform random number generators (RNGs).
Book

Understanding Cryptography: A Textbook For Students And Practitioners

Christof Paar, +1 more
TL;DR: The authors move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.
Related Papers (5)