Using a Hybrid Pseudorandom Number Generator for Cryptography in the Internet of Things

The rapid growth of mobile phones, telecommunication networks, and the internet resulted in the advent of the Internet of Things (IoT). As a result, the need for security algorithms to keep up with these advances is becoming more pressing. One method of symmetric encryption is a stream cipher, which...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA) s. 264 - 269
Hlavní autoři: Jassim, Sameeh Abdulghafour, Farhan, Alaa K., Radie, A. Hussien
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 21.09.2021
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:The rapid growth of mobile phones, telecommunication networks, and the internet resulted in the advent of the Internet of Things (IoT). As a result, the need for security algorithms to keep up with these advances is becoming more pressing. One method of symmetric encryption is a stream cipher, which encrypts one bit or one byte of the digital data stream at a time. The cipher is unbreakable if the cryptographic keystream is random. However, the keystream must be delivered to all users in advance through a separated and protected channel. The solution proposed in this paper is based on the combine of both logistic maps and Geffe generator techniques by using an intelligent master key to generate a random key of stream cipher. The suggestion is easy to implement in hardware. It provides a high degree of protection. Additionally, the suggested method was compared with the other algorithms by utilizing the same 512-bits plaintext as well as the same master key as input parameters. The proposed cipher's findings are successful in the statistical NIST test, despite the failure of some test results for some comparative algorithms. Also, the suggestion was evaluated by other different tests including, histogram and correlation coefficient analysis, Shannon entropy analyses, and keyspace and key sensitivity. The tests results proved that the proposed method is effective in security issues.
DOI:10.1109/IICETA51758.2021.9717775