A new symmetric encryption model for enhanced security is designed for the data of any size and type. It is envisaged that the proposed encryption model would enable a range of IoT devices to transfer data or to communicate more securely over open/insecure communication channel and also to provide enhanced data integrity. The model keeps the size of output cipher text unchanged by XORing the parity bits to avoid the overhead and making it lightweight. The chaotic dynamical system was used for key scheming to produce highly sensitive cipher text. Further, the key is dynamically updated using the same parity to increase the reliance of output cipher text on the input plain text. The key with 128-bit length is used for data complexity which is widely known and proven to withstand any kind of brute force attack. Finally, diffusion process was implemented to ensure the effect of any change is retained and carried throughout the process. The simulation results yield average NPCR value to be 99.7113, which demonstrates the potential of the model to be used for IoT based devices and systems where high complexity for data security is required. Different simulation exercises were carried out for change in key, plain text and cipher text and the results are discussed in the paper.
[1]
Manish Kumar,et al.
A cryptographic model based on logistic map and a 3-D matrix
,
2017,
J. Inf. Secur. Appl..
[2]
K. Wong,et al.
A fast chaotic cryptographic scheme with dynamic look-up table
,
2002
.
[3]
Vinod Patidar,et al.
Block cipher using 1D and 2D chaotic maps
,
2010,
Int. J. Inf. Commun. Technol..
[4]
Zhenfeng Zhang,et al.
Chaotic encryption algorithm based on alternant of stream cipher and block cipher
,
2011
.
[5]
M. Baptista.
Cryptography with chaos
,
1998
.
[6]
Vinod Patidar,et al.
Discrete chaotic cryptography using external key
,
2003
.
[7]
R. Lozi.
UN ATTRACTEUR ÉTRANGE (?) DU TYPE ATTRACTEUR DE HÉNON
,
1978
.
[8]
Sunil Kumar,et al.
Intertwining logistic map and Cellular Automata based color image encryption model
,
2016,
2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).
[9]
E. Alvarez,et al.
New approach to chaotic encryption
,
1999
.
[10]
Vinod Patidar,et al.
Cryptography using multiple one-dimensional chaotic maps
,
2005
.