Lightweight Encryption Algorithm Containing SPN Structure for IoT

With the development of information technology, the Internet of Things has increasingly entered all aspects of people’s work and life. In the IoT environment, in order to provide better and faster services, while ensuring data integrity, confidentiality and privacy, people put forward higher requirements for the efficiency of encryption algorithms. However, although the traditional encryption algorithm can guarantee the security, it is not suitable for the security of the Internet of Things in terms of encryption efficiency and energy consumption. In this paper, we propose a lightweight packet encryption algorithm based on the Substitution Permutation Network (SPN) structure. The algorithm consists of several P-boxes and S-boxes. It avoids the problems of high energy consumption and low efficiency caused by the large number of rounds of AES algorithm. Based on the SPN-based block cipher, it introduces the S-box and P-box and the multiple-pass authentication encryption scheme. As well, by proving its block cipher variance and linear analysis, the proposed solution is effective and provides sufficient security through authentication and encryption. This algorithm can be used for low-energy and IoT information transmission processes that require only moderate security.

[1]  Tao Li,et al.  Socially-conforming cooperative computation in cloud networks , 2017, J. Parallel Distributed Comput..

[2]  Pulak Mishra,et al.  Mergers, Acquisitions and Export Competitive- ness: Experience of Indian Manufacturing Sector , 2012 .

[3]  Serge Vaudenay,et al.  FOX : A New Family of Block Ciphers , 2004, Selected Areas in Cryptography.

[4]  Hao Wang,et al.  Social rational secure multi‐party computation , 2014, Concurr. Comput. Pract. Exp..

[5]  Alex Biryukov,et al.  Distinguisher and Related-Key Attack on the Full AES-256 , 2009, CRYPTO.

[6]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[7]  Jiqiang Lu Cryptanalysis of Block Ciphers , 2008 .

[8]  Zhe Liu,et al.  Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks , 2015, Mob. Inf. Syst..

[9]  Seungjoo Kim,et al.  Differential and linear cryptanalysis for 2-round SPNs , 2003, Inf. Process. Lett..

[10]  Omar Dawood,et al.  NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things , 2018, 2018 1st Annual International Conference on Information and Sciences (AiCIS).

[11]  Jongsung Kim,et al.  Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 , 2007, FSE.

[12]  Shancang Li,et al.  Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems , 2018, IEEE Transactions on Computational Social Systems.

[13]  William J Buchanan,et al.  Lightweight cryptography methods , 2017 .

[14]  Mitsuru Matsui,et al.  Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis , 2000, Selected Areas in Cryptography.

[15]  Bruce Schneier,et al.  Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.

[16]  Khoongming Khoo,et al.  New Applications of Differential Bounds of the SDS Structure , 2008, ISC.

[17]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.