Self-Encryption Scheme for Data Security in Mobile Devices

The pervasive use of wireless networks and mobile devices has been changing our living style significantly. Along with great convenience and efficiency, there are new challenges in protecting sensitive and/or private data carried in these devices. The most challenging part lies in a dilemma: while it should be computationally infeasible for adversaries to decrypt the data, the cryptographic operation should be efficient for legitimate users and minimize battery drain. This paper proposes a novel data encryption and storage scheme to address this challenge. Treating the data as a binary bit stream, our self-encryption (SE) scheme generates a keystream by randomly extracting bits from the stream. The length of the keystream depends on the user's security requirements. The bit stream is encrypted and the ciphertext is stored on the mobile device, whereas the keystream is stored separately. This makes it computationally not feasible to recover the original data stream from the ciphertext alone.

[1]  Amitava Mukherjee,et al.  Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.

[2]  Alex Biryukov,et al.  Block Ciphers and Stream Ciphers: The State of the Art , 2004, IACR Cryptol. ePrint Arch..

[3]  D. E. Denning,et al.  A taxonomy for key escrow encryption systems : How to use key escrow , 1996 .

[4]  Jovan Dj. Golic,et al.  Cryptanalysis of Alleged A5 Stream Cipher , 1997, EUROCRYPT.

[5]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[6]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[7]  Leonid A. Levin,et al.  A hard-core predicate for all one-way functions , 1989, STOC '89.

[8]  Xuemin Shen,et al.  Multiple Key Sharing and Distribution Scheme With$(n,t)$Threshold for NEMO Group Communications , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[10]  Alex Biryukov,et al.  Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.

[11]  Giuseppe Persiano,et al.  Distributed Certified Information Access for Mobile Devices , 2007, WISTP.

[12]  Johan Håstad,et al.  Improved Analysis of the BMGL Keystream Generator , 2001 .

[13]  Brian D. Noble,et al.  Mobile Device Security Using Transient Authentication , 2006, IEEE Transactions on Mobile Computing.

[14]  Yongdae Kim,et al.  Securing distributed storage: challenges, techniques, and systems , 2005, StorageSS '05.

[15]  Dieter Schmalstieg,et al.  Towards Massively Multi-user Augmented Reality on Handheld Devices , 2005, Pervasive.

[16]  Marine Minier,et al.  Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks , 2007, WISTP.

[17]  Alan O. Freier,et al.  The SSL Protocol Version 3.0 , 1996 .

[18]  Adi Shamir Stream Ciphers: Dead or Alive? , 2004, ASIACRYPT.

[19]  Dorothy E. Denning,et al.  A taxonomy for key escrow encryption systems , 1996, CACM.

[20]  David A. Basin,et al.  Securing the Distribution and Storage of Secrets with Trusted Platform Modules , 2007, WISTP.

[21]  Roy H. Campbell,et al.  A lightweight reconfigurable security mechanism for 3G/4G mobile devices , 2001, IEEE Wirel. Commun..

[22]  Erik Zenner Why IV Setup for Stream Ciphers is Difficult , 2007, Symmetric Cryptography.