Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security

11/22/2021
by   Ziaur Rahman, et al.
0

Several efforts have been seen claiming the lightweight block ciphers as a necessarily suitable substitute in securing the Internet of Things. Currently, it has been able to envisage as a pervasive frame of reference almost all across the privacy preserving of smart and sensor-oriented appliances. Different approaches are likely to be inefficient, bringing desired degree of security considering the easiness and surely the process of simplicity but security. Strengthening the well-known symmetric key and block dependent algorithm using either chaos motivated logistic map or elliptic curve has shown a far-reaching potential to be a discretion in secure real-time communication. The popular feature of logistic maps, such as the un-foreseeability and randomness often expected to be used in dynamic key-propagation in sync with chaos and scheduling technique towards data integrity. As a bit alternation in keys, able to come up with oversize deviation, also would have consequence to leverage data confidentiality. Henceforth it may have proximity to time consumption, which may lead to a challenge to make sure instant data exchange between participating node entities. In consideration of delay latency required to both secure encryption and decryption, the proposed approach suggests a modification on the key-origination matrix along with S-box. It has plausibly been taken us to this point that the time required proportionate to the plain-text sent while the plain-text disproportionate to the probability happening a letter on the message made. In line with that the effort so far sought how apparent chaos escalates the desired key-initiation before message transmission.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/30/2022

Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home

The Internet of Things (IoT) has brought new ways for humans and machine...
research
02/26/2021

Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices

Security is one of the main issues in Internet of Things (IoT). Encrypti...
research
04/30/2020

A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

The study of sending and receiving secret messages is called cryptograph...
research
10/28/2022

LAKEE: A Lightweight Authenticated Key Exchange Protocol for Power Constrained Devices

The rapid development of IoT networks has led to a research trend in des...
research
09/25/2021

Implementing ECC on Data Link Layer of the OSI Reference Model

The Internet, a rapidly expanding communication infrastructure, poses si...
research
07/03/2019

An Encoding-Decoding algorithm based on Padovan numbers

In this paper, we propose a new of coding/decoding algorithm using Padov...
research
12/11/2022

Cryptanalysis and designing chaos-based irreversible and parallel key expansion module over Galois field

From the security criteria of irreversibility, parallelizability and ind...

Please sign up or login with your details

Forgot password? Click here to reset