Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices
Title | Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Noura, Hassan, Chehab, Ali, Couturier, Raphael |
Conference Name | 2019 IEEE Wireless Communications and Networking Conference (WCNC) |
Keywords | cipher variants, Ciphers, computer network security, Conferences, confidentiality attacks, cryptography, data confidentiality, dynamic cryptographic primitives, dynamic key approach, dynamic Operation mode, flexible cipher scheme, flexible lightweight cipher, Heuristic algorithms, input message, Internet of Things, Internet of Things systems, IoT devices, IoT systems, lightweight cipher scheme, Lightweight Ciphers, lightweight cryptographic algorithms, Lightweight flexible key dependent cipher scheme, plaintext messages, pubcrawl, Radio frequency, Resiliency, Scalability, security and performance analysis, security attacks, simple round function, symmetric-key algorithm |
Abstract | Security attacks against Internet of Things (IoT) are on the rise and they lead to drastic consequences. Data confidentiality is typically based on a strong symmetric-key algorithm to guard against confidentiality attacks. However, there is a need to design an efficient lightweight cipher scheme for a number of applications for IoT systems. Recently, a set of lightweight cryptographic algorithms have been presented and they are based on the dynamic key approach, requiring a small number of rounds to minimize the computation and resource overhead, without degrading the security level. This paper follows this logic and provides a new flexible lightweight cipher, with or without chaining operation mode, with a simple round function and a dynamic key for each input message. Consequently, the proposed cipher scheme can be utilized for real-time applications and/or devices with limited resources such as Multimedia Internet of Things (MIoT) systems. The importance of the proposed solution is that it produces dynamic cryptographic primitives and it performs the mixing of selected blocks in a dynamic pseudo-random manner. Accordingly, different plaintext messages are encrypted differently, and the avalanche effect is also preserved. Finally, security and performance analysis are presented to validate the efficiency and robustness of the proposed cipher variants. |
DOI | 10.1109/WCNC.2019.8885976 |
Citation Key | noura_lightweight_2019 |
- Internet of Things systems
- symmetric-key algorithm
- simple round function
- security attacks
- security and performance analysis
- Scalability
- Resiliency
- Radio frequency
- pubcrawl
- plaintext messages
- Lightweight flexible key dependent cipher scheme
- lightweight cryptographic algorithms
- Lightweight Ciphers
- lightweight cipher scheme
- IoT systems
- IoT devices
- cipher variants
- Internet of Things
- input message
- Heuristic algorithms
- flexible lightweight cipher
- flexible cipher scheme
- dynamic Operation mode
- dynamic key approach
- dynamic cryptographic primitives
- data confidentiality
- Cryptography
- confidentiality attacks
- Conferences
- computer network security
- Ciphers