A Juxtapose of Symmetric Block Cipher Algorithms to Control, Analyse and Augment Efficiency of IoT Enabled Devices

Authors

  • K. Savima, M.V.Srinath

Keywords:

Block Cipher, Encryption, Decryption, Internet of Things (IoT), Light-weight cryptography, Pseudorandom permutation, Reverse cipher, Caesar Cipher, Columnar-Transpositional encoding

Abstract

The neoteric times have contrived the utilization of automated functionalities and Internet of Things (IoT) enabled devices for quotidian working. With the increase in engaging physical entities with the virtual technologies, and the collaborative conjunction that has augmented the quality of life, it is quite natural for individuals to implement a paradigm shift in terms of upgrading to IoT enabled entities. Nonetheless, while it creates facile resolutions, the security of devices and data are under enormous risk. Hacking and data pilferage are most often evinced due to the incapability of IoT devices to sufficiently manage storage, integration, communication and the computational complexity that persists between the devices. Block cipher cryptography is a swift-developing domain that enhances the integrity of resources and mitigates intricacy in integrating the diverse operations, along with enhancing the security of functions that is usually carelessly neglected by the conventional processing devices. The previous studies relevant to this field of interest have incorporated the use of hardware services and the functionality of block ciphers to analyse their compatibility with IoT devices. However, this paper focuses to elaborate on a comparative algorithmic implementation of block ciphers to render a scrutinization from three algorithmic processes that dissect the efficiency of security. Rivest-Shamir-Adleman (RSA) algorithm with asymmetric cryptography, and an enhanced key generation of multiples of 256 is incorporated with base 64 encryption and decryption. The processing time in relevance to the encryption methods, and the effective utilization of Pseudorandom Permutational (PRP) technique that further complements the resilience of IoT devices is meticulously employed in this study. The cryptanalysis performed with Reverse, Caesar cipher and columnar- transpositional encoding mechanisms aid to analyse the efficacy of encryption and decryption to supplement competent protection of IoT devices. The simulations for the proposed study is implemented in Python, and the results are successfully procured.

Downloads

Download data is not yet available.

References

Fatemeh Babaeian, Nemai Chandra Karmakar, “Time and Frequency Domains Analysis of Chipless RFID Back-Scattered Tag Reflection”, IoT 2020, 1(1), 109-127; doi.org/10.3390/iot1010007

Qusay Idrees Sarhan, “Internet of Things: A Survey of Challenges and Issues”, January 2018, International Journal of Internet of Things and Cyber-Assurance, DOI:10.1504/IJITCA.2018.10011246

Hengameh Delfan Azari, Dr. Prashant V Joshi, “An Efficient Implementation of Present Cipher Model With 80-Bit and 128-Bit Key over FPGA Based Hardware Architecture”, International Journal of Pure and Applied Mathematics Volume 119 No. 14 2018, 1825-1832.

Deepti Sehrawat and Nasib Singh Gill, “Lightweight Block Ciphers for IoT based applications: A Review”, International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 13, Number 5 (2018) pp. 2258-2270.

Muhned Hussam, Ghassan H. Abdul-majeed, Haider K. Hooomod, “New Lightweight Hybrid Encryption Algorithm for Cloud Computing (LMGHA-128bit) by using new 5-D hyperchaos system”, Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021), 2531-2540.

Mohammed Nazeh Abdul Wahid, Abdulrahman Ali, Babak Esparham and Mohamed Marwan, “A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention”, Journal of Computer Science Applications and Information Technology, ISSN Online: 2474-9257, Aug 2018.

C.G. Thorat, V.S. Inamdar, “Implementation of new hybrid lightweight cryptosystem”, Applied Computing and Informatic, 2018, https://doi.org/10.1016/j.aci.2018.05.001, 2210-8327.

Zaid M. Jawad Kubba1 and Haider K. Hoomod, “Modified PRESENT Encryption algorithm based on new 5D Chaotic system”, IOP Conf. Series: Materials Science and Engineering 928 (2020) 032023 IOP Publishing doi:10.1088/1757-899X/928/3/032023.

Sreeja Rajesh, Varghese Paul, Varun G. Menon and Mohammad R. Khosravi, “A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices”, February 2019, doi:10.3390/sym11020293.

Rogaway P., Bellare M and Black J, “OCB: A block-cipher mode of operation for efficient authenticated encryption”, ACM Transactions on Information and System Security (TISSEC), 6(3), pp.365-403.

Soleimany, H., “Self-similarity cryptanalysis of the block cipher”, IET Information Security, 9(3), pp.179-184.

Yogesh K, Rajiv M, Harsh S, “Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures”, International Journal of Computer Science and Management Studies. 2011;11(3):60-63.

Preetha M, Nithya M, “A study and performance analysis of RSA algorithm”, International Journal of Computer Science and Mobile Computing. 2013;2(6):126-139.

Lavanya R, Karpagam M, Jaikumar R, “A Comparative Study on the Implementation of Block Cipher Algorithms on FPGA”, 2017 IJSRST, Volume 3, Issue 8, ISSN: 2395-6011.

Wojciech Muła, Daniel Lemire, “Base64 encoding and decoding at almost the speed of a memory copy”, arXiv:1910.05109v1, DOI: https://doi.org/10.1002/spe.2777, Oct 2019

Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An Ultra-Lightweight Block Cipher”, September 2007 DOI: 10.1007/978-3- 540-74735-2_31

Eslam w. afify, Abeer T. Khalil, Wageda I. El sobky, Reda Abo Alez, “Performance Analysis of Advanced Encryption Standard (AES) S-boxes”, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-9, Issue-1, May 2020, DOI:10.35940/ijrte.F9712.059120

Syiham Mohd Lokman, Chuah Chai Wen, Nurul Hidayah Binti Ab. Rahman, Isredza Rahmi Binti A. Hamid, “A Study of Caesar Cipher and Transposition Cipher In Jawi Messages”, Journal of Computational and Theoretical Nanoscience, March 2018 DOI: 10.1166/asl.2018.11130

Priti V. Bhagat, Kaustubh S. Satpute, Vikas R. Palekar, “Reverse Encryption Algorithm: A Technique for Encryption & Decryption”, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 2 Issue 1 January 2013, ISSN: 2278-621X

[20] Riad Saidi, Tarek Bentahar, Atef Bentahar, “Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes”, International Journal on Electrical Engineering and Informatics, December 2020, DOI: 10.15676/ijeei.2020.12.4.13.

Yasir Nawaz and Lei Wang, “Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation”, December 2019, Journal of Symmetry 2019, 11, 1485; doi:10.3390/sym11121485

Rubesh Anand Asari, Vidhyacharan Bhaskar, Gaurav Bajpai, Godwin Norense Osarumwense Asemota, “On the Generation of Random Numbers for Symmetric Cryptography Utilizing Astronomical Data” , Advanced Materials Research, October 2011 DOI:10.4028/www.scientific.net/AMR.367.185G. Brandli and M. Dick, “Alternating current fed power supply,” U.S. Patent 4 084 217, Nov. 4, 1978.

Downloads

Published

02.06.2024

How to Cite

K. Savima. (2024). A Juxtapose of Symmetric Block Cipher Algorithms to Control, Analyse and Augment Efficiency of IoT Enabled Devices. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 4087–4092. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6112

Issue

Section

Research Article