Visible to the public Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices

TitleLightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices
Publication TypeConference Paper
Year of Publication2019
AuthorsNoura, Hassan, Chehab, Ali, Couturier, Raphael
Conference Name2019 IEEE Wireless Communications and Networking Conference (WCNC)
Keywordscipher variants, Ciphers, computer network security, Conferences, confidentiality attacks, cryptography, data confidentiality, dynamic cryptographic primitives, dynamic key approach, dynamic Operation mode, flexible cipher scheme, flexible lightweight cipher, Heuristic algorithms, input message, Internet of Things, Internet of Things systems, IoT devices, IoT systems, lightweight cipher scheme, Lightweight Ciphers, lightweight cryptographic algorithms, Lightweight flexible key dependent cipher scheme, plaintext messages, pubcrawl, Radio frequency, Resiliency, Scalability, security and performance analysis, security attacks, simple round function, symmetric-key algorithm

Security attacks against Internet of Things (IoT) are on the rise and they lead to drastic consequences. Data confidentiality is typically based on a strong symmetric-key algorithm to guard against confidentiality attacks. However, there is a need to design an efficient lightweight cipher scheme for a number of applications for IoT systems. Recently, a set of lightweight cryptographic algorithms have been presented and they are based on the dynamic key approach, requiring a small number of rounds to minimize the computation and resource overhead, without degrading the security level. This paper follows this logic and provides a new flexible lightweight cipher, with or without chaining operation mode, with a simple round function and a dynamic key for each input message. Consequently, the proposed cipher scheme can be utilized for real-time applications and/or devices with limited resources such as Multimedia Internet of Things (MIoT) systems. The importance of the proposed solution is that it produces dynamic cryptographic primitives and it performs the mixing of selected blocks in a dynamic pseudo-random manner. Accordingly, different plaintext messages are encrypted differently, and the avalanche effect is also preserved. Finally, security and performance analysis are presented to validate the efficiency and robustness of the proposed cipher variants.

Citation Keynoura_lightweight_2019