An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices

In recent years, small computing devices like embedded devices, wireless sensors, RFID tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly. They are expected to generate massive amount of sensitive data for controlling and monitoring purposes. But their resources and capabilities are limited. Those also work with valuable private data thus making security of those devices of paramount importance. Therefore, a secure encryption algorithm should be there to protect those vulnerable devices. Conventional encryption ciphers like RSA or AES are computationally expensive; require large memory but hinder performances of those devices. Simple encryption techniques, on the other hand are easy to crack, compromising security. In this paper a secure and efficient lightweight cryptographic algorithm for small computing devices has been proposed. It is a symmetric key block cipher, employing custom substitution-permutation (SP) network and a modified Feistel architecture. Two basic concepts from Genetic algorithm are used. A Linux based benchmark tool, FELICS is used for the measurement and MATLAB for the purpose of encryption quality testing. An improvement over the existing algorithm, the proposed algorithm reduces the use of processing cycles but at the same time provides sufficient security.

[1]  Sathish Alampalayam Kumar,et al.  Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[2]  Vikash Kumar Jha Cryptanalysis of Lightweight Block Ciphers , 2012 .

[3]  Xiaojun Wang,et al.  Application of Environmental Internet of Things on water quality management of urban scenic river , 2013 .

[4]  Sharad Jash,et al.  A Cryptography Algorithm Using the Operations of Genetic Algorithm & Pseudo Random Sequence Generating Functions , 2014 .

[5]  Theodore Tryfonas,et al.  The Internet of Things: a security point of view , 2016, Internet Res..

[6]  Namhi Kang,et al.  Fine-Grained Support of Security Services for Resource Constrained Internet of Things , 2016, Int. J. Distributed Sens. Networks.

[7]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[8]  Muhammad Usman,et al.  SIT: A Lightweight Encryption Algorithm for Secure Internet of Things , 2017, ArXiv.

[9]  Shreyank N. Gowda,et al.  Innovative enhancement of the Caesar cipher algorithm for cryptography , 2016, 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Fall).

[10]  Alex Biryukov,et al.  FELICS - Fair Evaluation of Lightweight Cryptographic Systems , 2015 .

[11]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[12]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[13]  Athanasios T. Karygiannis,et al.  SP 800-98. Guidelines for Securing Radio Frequency Identification (RFID) Systems , 2007 .

[14]  Yacine Challal,et al.  On security issues in embedded systems: challenges and solutions , 2008, Int. J. Inf. Comput. Secur..

[15]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .