A Juxtapose of Symmetric Block Cipher Algorithms to Control, Analyse and Augment Efficiency of IoT Enabled Devices
Keywords:
Block Cipher, Encryption, Decryption, Internet of Things (IoT), Light-weight cryptography, Pseudorandom permutation, Reverse cipher, Caesar Cipher, Columnar-Transpositional encodingAbstract
The neoteric times have contrived the utilization of automated functionalities and Internet of Things (IoT) enabled devices for quotidian working. With the increase in engaging physical entities with the virtual technologies, and the collaborative conjunction that has augmented the quality of life, it is quite natural for individuals to implement a paradigm shift in terms of upgrading to IoT enabled entities. Nonetheless, while it creates facile resolutions, the security of devices and data are under enormous risk. Hacking and data pilferage are most often evinced due to the incapability of IoT devices to sufficiently manage storage, integration, communication and the computational complexity that persists between the devices. Block cipher cryptography is a swift-developing domain that enhances the integrity of resources and mitigates intricacy in integrating the diverse operations, along with enhancing the security of functions that is usually carelessly neglected by the conventional processing devices. The previous studies relevant to this field of interest have incorporated the use of hardware services and the functionality of block ciphers to analyse their compatibility with IoT devices. However, this paper focuses to elaborate on a comparative algorithmic implementation of block ciphers to render a scrutinization from three algorithmic processes that dissect the efficiency of security. Rivest-Shamir-Adleman (RSA) algorithm with asymmetric cryptography, and an enhanced key generation of multiples of 256 is incorporated with base 64 encryption and decryption. The processing time in relevance to the encryption methods, and the effective utilization of Pseudorandom Permutational (PRP) technique that further complements the resilience of IoT devices is meticulously employed in this study. The cryptanalysis performed with Reverse, Caesar cipher and columnar- transpositional encoding mechanisms aid to analyse the efficacy of encryption and decryption to supplement competent protection of IoT devices. The simulations for the proposed study is implemented in Python, and the results are successfully procured.
Downloads
References
Fatemeh Babaeian, Nemai Chandra Karmakar, “Time and Frequency Domains Analysis of Chipless RFID Back-Scattered Tag Reflection”, IoT 2020, 1(1), 109-127; doi.org/10.3390/iot1010007
Qusay Idrees Sarhan, “Internet of Things: A Survey of Challenges and Issues”, January 2018, International Journal of Internet of Things and Cyber-Assurance, DOI:10.1504/IJITCA.2018.10011246
Hengameh Delfan Azari, Dr. Prashant V Joshi, “An Efficient Implementation of Present Cipher Model With 80-Bit and 128-Bit Key over FPGA Based Hardware Architecture”, International Journal of Pure and Applied Mathematics Volume 119 No. 14 2018, 1825-1832.
Deepti Sehrawat and Nasib Singh Gill, “Lightweight Block Ciphers for IoT based applications: A Review”, International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 13, Number 5 (2018) pp. 2258-2270.
Muhned Hussam, Ghassan H. Abdul-majeed, Haider K. Hooomod, “New Lightweight Hybrid Encryption Algorithm for Cloud Computing (LMGHA-128bit) by using new 5-D hyperchaos system”, Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021), 2531-2540.
Mohammed Nazeh Abdul Wahid, Abdulrahman Ali, Babak Esparham and Mohamed Marwan, “A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention”, Journal of Computer Science Applications and Information Technology, ISSN Online: 2474-9257, Aug 2018.
C.G. Thorat, V.S. Inamdar, “Implementation of new hybrid lightweight cryptosystem”, Applied Computing and Informatic, 2018, https://doi.org/10.1016/j.aci.2018.05.001, 2210-8327.
Zaid M. Jawad Kubba1 and Haider K. Hoomod, “Modified PRESENT Encryption algorithm based on new 5D Chaotic system”, IOP Conf. Series: Materials Science and Engineering 928 (2020) 032023 IOP Publishing doi:10.1088/1757-899X/928/3/032023.
Sreeja Rajesh, Varghese Paul, Varun G. Menon and Mohammad R. Khosravi, “A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices”, February 2019, doi:10.3390/sym11020293.
Rogaway P., Bellare M and Black J, “OCB: A block-cipher mode of operation for efficient authenticated encryption”, ACM Transactions on Information and System Security (TISSEC), 6(3), pp.365-403.
Soleimany, H., “Self-similarity cryptanalysis of the block cipher”, IET Information Security, 9(3), pp.179-184.
Yogesh K, Rajiv M, Harsh S, “Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures”, International Journal of Computer Science and Management Studies. 2011;11(3):60-63.
Preetha M, Nithya M, “A study and performance analysis of RSA algorithm”, International Journal of Computer Science and Mobile Computing. 2013;2(6):126-139.
Lavanya R, Karpagam M, Jaikumar R, “A Comparative Study on the Implementation of Block Cipher Algorithms on FPGA”, 2017 IJSRST, Volume 3, Issue 8, ISSN: 2395-6011.
Wojciech Muła, Daniel Lemire, “Base64 encoding and decoding at almost the speed of a memory copy”, arXiv:1910.05109v1, DOI: https://doi.org/10.1002/spe.2777, Oct 2019
Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An Ultra-Lightweight Block Cipher”, September 2007 DOI: 10.1007/978-3- 540-74735-2_31
Eslam w. afify, Abeer T. Khalil, Wageda I. El sobky, Reda Abo Alez, “Performance Analysis of Advanced Encryption Standard (AES) S-boxes”, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-9, Issue-1, May 2020, DOI:10.35940/ijrte.F9712.059120
Syiham Mohd Lokman, Chuah Chai Wen, Nurul Hidayah Binti Ab. Rahman, Isredza Rahmi Binti A. Hamid, “A Study of Caesar Cipher and Transposition Cipher In Jawi Messages”, Journal of Computational and Theoretical Nanoscience, March 2018 DOI: 10.1166/asl.2018.11130
Priti V. Bhagat, Kaustubh S. Satpute, Vikas R. Palekar, “Reverse Encryption Algorithm: A Technique for Encryption & Decryption”, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 2 Issue 1 January 2013, ISSN: 2278-621X
[20] Riad Saidi, Tarek Bentahar, Atef Bentahar, “Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes”, International Journal on Electrical Engineering and Informatics, December 2020, DOI: 10.15676/ijeei.2020.12.4.13.
Yasir Nawaz and Lei Wang, “Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation”, December 2019, Journal of Symmetry 2019, 11, 1485; doi:10.3390/sym11121485
Rubesh Anand Asari, Vidhyacharan Bhaskar, Gaurav Bajpai, Godwin Norense Osarumwense Asemota, “On the Generation of Random Numbers for Symmetric Cryptography Utilizing Astronomical Data” , Advanced Materials Research, October 2011 DOI:10.4028/www.scientific.net/AMR.367.185G. Brandli and M. Dick, “Alternating current fed power supply,” U.S. Patent 4 084 217, Nov. 4, 1978.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.