Abstract

Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal. The majority of standard cryptographic algorithms do not fit with these constrained devices due to heavy cryptographic components. In this paper, a new block cipher, BRISK, is proposed with a block size of 32-bit. The cipher design is straightforward due to simple round operations, and these operations can be efficiently run in hardware and suitable for software. Another major concept used with this cipher is dynamism during encryption for each session; that is, instead of using the same encryption algorithm, participants use different ciphers for each session. Professor Lars R. Knudsen initially proposed dynamic encryption in 2015, where the sender picks a cipher from a large pool of ciphers to encrypt the data and send it along with the encrypted message. The receiver does not know about the encryption technique used before receiving the cipher along with the message. However, in the proposed algorithm, instead of choosing a new cipher, the process uses the same cipher for each session, but varies the cipher specifications from a given small pool, e.g., the number of rounds, cipher components, etc. Therefore, the dynamism concept is used here in a different way.

Highlights

  • Computer devices nowadays are continuously developing, and the performance of these new devices is better than before with powerful resources

  • The secret key changes its values in each communication, but the encryption algorithm remains the same, and the security completely relies on secret keys

  • In BRISK, a dynamism concept is used where the key changes its value, but the encryption algorithm changes its components in each communication and, extra security is provided to the system

Read more

Summary

Introduction

Computer devices nowadays are continuously developing, and the performance of these new devices is better than before with powerful resources. The Internet of Things has become popular These resource-constrained devices are increasingly used in various applications, such as wireless sensor networks and Radio Frequency Identification (RFID). Knudsen in 2015, where for each session, the sender use different ciphers from a large pool to encrypt the data In such situations, it is hard for the attacker to break the system, or it is difficult to make an attack. This approach can be applied to private as well as public-key cryptography Such a level of dynamism has a major disadvantage in IoT based ciphers, creating an extra burden for IoT devices. In BRISK, a dynamism concept is used where the key changes its value, but the encryption algorithm changes its components in each communication and, extra security is provided to the system

Background
Cryptology
Lightweight Ciphers
Contribution
Specifications of BRISK
Round Function
Key Schedule
Key Exchange Protocol
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call