An improved chacha algorithm for securing data on IoT devices

Author:

Mahdi Mohammed Salih,Hassan Nidaa Falih,Abdul-Majeed Ghassan H.ORCID

Abstract

AbstractIn recent years, revolution of development was exceedingly quick in the Internet. Nevertheless, instead of only linking personal computers, mobiles and wearable equipment's, Internet growths from a web binding to true world physical substances that is indicated to novel connotation, which is labeled as Internet of Things (IoT). This concept is utilized in many scopes like education, health care, agriculture and commerce. IoT devices are presented with batteries to have independence from electric current; consequently, their working time is specified by the total time of the power of these batteries. In many IoT applications, data of IoT devices are extremely critical and should be encrypted. Current encryption approaches are created with a high complexity of an arithmetical process to provide a high level of security. However, these arithmetical processes lead to troubles concerning the efficiency and power consumption. ChaCha cipher is one of these approaches, which recently attracted attention due to its deployment in several applications by Google. In the present study, a new stream cipher procedure is proposed (called Super ChaCha), which performs low duty cycles for securing data on IoT devices. The proposed algorithm represents an improved revision to the standard ChaCha algorithm by increasing resistance to cryptanalysis. The modification focuses on rotation procedure which has been changed from a fixed constant to a variable constant based on random value. Also, the inputs of the cipher are changing in the columns form followed by diagonals form to zigzag form and then by alternate form to provide improved diffusion in comparison with the standard ChaCha. Results regarding the security illustrate that Super ChaCha needs 2512 probable keys to break by brute-force attack. Furthermore, the randomness of Super ChaCha successfully passed the five benchmark and NIST test.

Publisher

Springer Science and Business Media LLC

Subject

General Earth and Planetary Sciences,General Physics and Astronomy,General Engineering,General Environmental Science,General Materials Science,General Chemical Engineering

Reference34 articles.

1. Hafner K, Lyon M (1998) Where wizards stay up late: the origins of the Internet. Simon and Schuster. https://www.amazon.com/Where-Wizards-Stay-Up-Late/dp/0684832674

2. Sundmaeker H, Guillemin P, Friess P, Woelfflé S (2010) Vision and challenges for realising the Internet of things. Eurpean Research Projects, March. http://www.internet-of-things-research.eu/pdf/IoT_Clusterbook_March_2010.pdf.

3. Panagiotou P, Sklavos N, Darra E, Zaharakis ID (2020) Cryptographic system for data applications, in the context of internet of things. Microprocess Microsyst 72:102921. https://doi.org/10.1016/j.micpro.2019.102921

4. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805. https://doi.org/10.1016/j.comnet.2010.05.010

5. Theodorou S, Sklavos N (2019) Blockchain based security and privacy in smart cities. In: DB Rawat, K Ayhan, Z Ghafoor (eds) Chapter in the book: smart cities cybersecurity and privacy. Elsevier Press, 2019 ISBN: 9780128150320.

Cited by 15 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications;Computers in Human Behavior;2024-04

2. Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices;Multimedia Tools and Applications;2024-02-20

3. Improving File Storage Security by Authenticating the Cipher Text;Lecture Notes in Networks and Systems;2024

4. Secure Rolling Code Generation for Remote Keyless Entry Systems Using AES-CTR, Encryption with ChaCha20;2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON);2023-12-29

5. Securing the Skies: Enhancing Communication Security for Unmanned Aerial Vehicles;2023 17th International Conference on Open Source Systems and Technologies (ICOSST);2023-12-20

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3