SAL – a Lightweight Symmetric Cipher for Internet-Of-Things

SAL – a Lightweight Symmetric Cipher for Internet-Of-Things

International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-11S, September 2019 SAL – A Lightweight Symmetric Cipher for Internet-of-Things Hemraj Shobharam Lamkuche, Dhanya Pramod, Vandana Onker, Shobharam Katiya, Geeta Lamkuche, Gurudevi Hiremath Abstract— The modern era of computing demands high-speed mathematical and engineering process of encoding source performance and maximizing efficiency for commercial information as plaintext into ciphertext by using a secret applications and business modules. Embedded systems and key of standard size. The scrambling of information can devices are unlike traditional computer systems. The computing be decrypted into original plaintext information by power of the embedded device is very limited to perform a specific task, it consumes little hardware footprint and operates at decrypting it using the same secret key used for the electronic high speed by minimizing clock cycles and memory encryption process (Stallings, 2010). The National management. Embedded security issues and security challenges Institute of Standards and Technology (NIST) has are a major concern resisting against advanced cryptanalytic approved lightweight cryptographic standards for attacks. In this research, we propose a new lightweight encryption algorithms specifically for low power- cryptographic algorithm SAL (Secure Advanced Lightweight). constrained devices (Kerry A. McKay, Larry Bassham, The algorithm is based on NIST (National Institute of Standards and Technology) standards and guidelines in design Meltem Sönmez Turan, 2017). The physical implementation of SAL to secure lower end of the device characteristics of lightweight block ciphers restricted up spectrum are internet of things (IoT), wireless sensors network to 1900 gate equivalents (GEs) and the performance (WSNs), aggregation network, pervasive devices, Radio characteristics of hardware implementation and software frequency identification (RFID) tags, and embedded devices. implementation should be less than 20 ns latency. SAL operates on the 64-bit block with a key size of 64-bit to 128- According to the IHS Markit report estimate, the sum of bit for 14 rounds of Feistel function. The internal structure of SAL powered with tiny 16-bit S-box using composite field connected IoT devices will increase to 125 Billion by arithmetic (CFA) technology. Our experimental results prove 2030. The IoT is impacting nearly all market areas from SAL has high efficiency and high throughput to achieve raw material to end products (Graham, 2017). The number optimum performance when compared with standard of handheld devices which includes: mobile devices, cryptographic algorithms. smart band, smart shoes, and tablets will reach up 23.14 Keywords: Lightweight Cryptography, Block Cipher, Feistel billion by the end of 2018. With an increase in the number Network, IoT, Energy Efficient, Embedded Device. of IoT devices, it will also arise security risks and challenges to handle big data, processing a massive I. INTRODUCTION amount of data, and transmit big data over a secure Over the last decade, the exploration of innovative communication channel. IoT allows us to access the lightweight block ciphers has been proposed for the object across an existing interconnection of the network Internet of Things (IoT) devices, embedded devices, and remotely. Embedded systems main characteristics are power-constrained devices. These computational devices Connectivity, Things (which includes sensors), Data, were exclusively penetrated in the everyday life of human Communication, Intelligence, Action, and Ecosystem. beings. With reference to a research investigation Each node in IoT involves transmitting information over conducted by Internet System Consortium, over 1012 the communication channel, and it also processes sensitive million active hosts are connected to the internet until data that needs to protect against intruders and malicious January 2019 (ISC, 2019). With a huge flow of adversaries. Since the IoT devices are low-resource, low information from one device to another device for power-constrained devices, limited battery to operate, and communication, it leads to major challenges in preserving limited power supply. As of late, the advancement of data security and privacy. The data security is an power-constrained devices in embedded systems, block integrated part of information security relies on encryption ciphers are important for cryptographic applications, such and decryption process. These processes involved the as embedded systems, sensor networks, RFID labels, and pervasive hubs. Embedded devices manufactured with a lower maintenance cost, higher network toughness, Revised Manuscript Received on September 10, 2019. Hemraj Shobharam Lamkuche, Research Scholar, Symbiosis stronger self-organization and broader applicability International (Deemed University) Pune, Maharshtra, India. features, which has become a crucial part of the (Email: [email protected]) networking industry. Dhanya Pramod, Director - SCIT, Symbiosis International (Deemed University) Pune, Maharshtra, India. Designing a unique block cipher is a tedious task, A (Email: [email protected]) prominent lightweight block cipher must be fast and Vandana Onker, Research Scholar, Indira Gandhi National Open University, Bhopal, Madhya Pradesh, India. Shobharam Katiya, Central Railway, Ministry of Railway, India. Geeta Lamkuche, Station Master, Central Railway, Ministry of Railway, India. Gurudevi Hiremath, Assistant Professor, Solapur, Maharashtra, India. Published By: Retrieval Number: K108809811S19/2019©BEIESP Blue Eyes Intelligence Engineering DOI: 10.35940/ijitee.K1088.09811S19 521 & Sciences Publication SAL – A Lightweight Symmetric Cipher For Internet-Of-Things secure. It must resist cryptanalytic attacks to retrieve the . Data Integrity secret key. Over past decades, many lightweight block . Data Security ciphers are introduced like AES (Daemen, Rijmen, & . Device tampering detection Leuven, 1999), CHASKEY (Mouha et al., 2014), CHAM . Security management in IoTs (Koo et al., 2017), CLEFIA (Shirai, Shibutani, Akishita, . Fault Tolerance Moriai, & Iwata, 2007), FeW (Kumar, Pal, & Panigrahi, . Firmware updates 2014), HIGHT (Hong et al., 2006), KLEIN (Gong, . Liability Nikova, & Law, 2012), LBLOCK (W. Wu & Zhang, . Monitoring Intrusion detection 2011), LED (J. Guo, Peyrin, Poschmann, & Robshaw, . Non-Repudiation 2011), MCRYPTON (Lim & Korkishko, 2006), . Protection against attacks PICCOLO (Shibutani et al., 2011), PRESENT (Leander et . Physical Protection al., 2007), RECTANGLE (Zhang et al., 2015), . Privacy ROADRUNNER (Baysal & Şahin, 2016), SKINNY . Resilience (Beierle, C., Jean, J., Kölbl, S., Leander, G., Moradi, A., . Secure Boot Peyrin, T., Sasaki, Y., Sasdrich, P. and Sim, 2016), and . Secure Communication TWINE (Suzaki, Minematsu, Morioka, & Kobayashi, . Secure source code updates 2012). Security In this paper, we have proposed a new unique . Self-Healing lightweight block cipher SAL (Secure Advanced . System Maintenance Lightweight) based on tiny compact s-box embedded with . Trust composite field arithmetic (CFA) technology to minimize C. Privacy threats in IoTs devices hardware utilization on field-programmable gate array (FPGA) board. It takes input of 64-bit plaintext along with . Threat Identification a key size of 64-bit extended to 128-bit using 14 and 16 . Localization and Tracking rounds respectively. Moreover, the lightweight . Profiling information implementation of SAL shows enormous strength against . Privacy violating interaction various cryptanalytic attacks. The SAL encryption and . Privacy violating presentation decryption algorithm are useful for smart devices and . Lifecycle transitions power-constrained devices like the Internet of Things, . Inventory attacks Embedded devices and Radio frequency identification . Linkage (RFID) tags. There is no single step security solution for IoT devices. Security prerequisites must consider over the II. IOTS: SECURITY CHALLENGES AND expenditure of a security catastrophe, the risk of cyber- REQUIREMENTS attacks, accessible attack vectors, and the expense of actualizing a security arrangement. Security is the The IoT devices are specifically developed to perform a essential enabling factor of most pervasive system specific task for a long time. These devices are different applications. from traditional computer system devices, it consumes less area for hardware implementation, it provides high III. SAL: A LIGHTWEIGHT BLOCK CIPHER hardware utilization to gain performance and it can provide resistance against known cryptographic attacks. SAL is a 64-bit lightweight block cipher operates on The IoT devices operate on high electronic speed by Feistel structure which takes input as the plaintext of 64- minimizing the clock cycles and memory management. bit and key size of 64-bit to produce ciphertext of 64-bit. We have listed out security challenges, security The key size can be extended from 64-bit to 128-bit by requirements for IoT devices and privacy threats which increasing the number of rounds in the Feistel network of were more criticized for the IoT devices SAL. The Feistel structure of SAL operates for 14 rounds simultaneously using composite field arithmetic S-box A. Security challenges in IoTs function which is superimposed with a new unique . Critical functionality in IoTs inverter H function. In each round of Feistel function, . Replication there is various mathematical

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us