Abstract
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography. To cope with the constraints, security systems must choose between time cost and security. Cyber-attack model evolution and quantum computing technologies have severely limited current cryptography uptake and imposed too much overhead to operate effectively on lightweight communication environments. Therefore, we propose a new operation mode using multiple symmetric key ciphers alternately in a regularized order. The proposed design exploits lightweight cryptography methods, reducing encryption/decryption overhead compared to a single heavy cryptography approach, as well as avoiding exhaustive key extraction attack. Since sequences can change both time cost and security performance widely, the design can be applied to various situations, from the delay-constrained communications to highly secure networks. Our cryptography design incorporates patterned cipher block (PCB) operation, an integrity verification technique to identify if a ciphertext has been forged, handshaking protocol exchanging pattern information and a key using two-round communication, and pattern optimization to maximize the cryptographic performance. We confirmed the proposed operation mode numerically, and verified the outcomes experimentally, confirming that the proposed scheme outperformed current best practice cryptography.
Original language | English |
---|---|
Article number | 9023479 |
Pages (from-to) | 44632-44642 |
Number of pages | 11 |
Journal | IEEE Access |
Volume | 8 |
DOIs | |
Publication status | Published - 2020 |
Bibliographical note
Funding Information:This work was supported in part by the National Research Foundation of Korea (NRF) Grant funded by the Korean Government (MSIT) under Grant 2020R1A2C1012389, and in part by the Human Resources Program in Energy Technology of the Korea Institute of Energy Technology Evaluation and Planning (KETEP) Granted Financial Resource from the Ministry of Trade, Industry and Energy, South Korea, under Grant 20174030201820.
Publisher Copyright:
© 2013 IEEE.
Keywords
- Authentication
- Confidentiality
- Cryptography
- Integrity
- Operation mode
- Protocol
- Symmetric key cipher
ASJC Scopus subject areas
- Engineering(all)
- Materials Science(all)
- Electrical and Electronic Engineering
- Computer Science(all)