Affiliation:
1. School of Cyberspace Security, Hainan University, Haikou 570228, China
2. Key Laboratory of Internet Information Retrieval of Hainan Province, Haikou 570228, China
Abstract
With the rapid proliferation of the Internet of Things (IoT) in recent years, the number of IoT devices has surged exponentially. These devices collect and transmit vast amounts of data, including sensitive information. Encrypting data is a crucial means to prevent unauthorized access and potential misuse. However, the traditional cryptographic schemes offering robust security demand substantial device resources and are unsuitable for lightweight deployments, particularly in resource-constrained IoT devices. On the other hand, with the automotive industry making strides in autonomous driving, self-driving vehicles are beginning to integrate into people’s daily lives. Ensuring the security of autonomous driving systems, particularly in preventing hacker infiltrations, is a paramount challenge currently facing the industry. An emerging lightweight sequence cipher—aiming to strike a balance between security and resource efficiency—has been proposed in this paper based on S-box substitution and arithmetic addition. The designed security threshold is 280. It has been verified that with a slight performance disadvantage, it can reduce memory usage while ensuring the security threshold. The key stream generated by this structure exhibits excellent pseudo-randomness.
Funder
National Natural Science Foundation of China
Science Project of Hainan University
Reference27 articles.
1. Luo, Y., Chai, Q., Gong, G., and Lai, X. (2010, January 6–10). A lightweight stream cipher WG-7 for RFID encryption and authentication. Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Piscataway, NJ, USA.
2. Abdelraheem, M.A., Borghoff, J., Zenner, E., and David, M. (2011, January 12–15). Cryptanalysis of the light-weight cipher A2U2. Proceedings of the Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK.
3. Grain: A stream cipher for constrained environments;Hell;Int. J. Wirel. Mob. Comput.,2007
4. De Canniere, C. (2006). Trivium: A stream cipher construction inspired by block cipher design principles. International Conference on Information Security, Springer.
5. Babbage, S., and Dodd, M. (2024, August 05). The Stream Cipher MICKEY 2.0. ECRYPT Stream Cipher, pp. 191–209. Available online: https://www.ecrypt.eu.org/stream/p3ciphers/mickey/mickey_p3.pdf.