Using a Hybrid Pseudorandom Number Generator for Cryptography in the Internet of Things

The rapid growth of mobile phones, telecommunication networks, and the internet resulted in the advent of the Internet of Things (IoT). As a result, the need for security algorithms to keep up with these advances is becoming more pressing. One method of symmetric encryption is a stream cipher, which...

Full description

Saved in:
Bibliographic Details
Published in:2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA) pp. 264 - 269
Main Authors: Jassim, Sameeh Abdulghafour, Farhan, Alaa K., Radie, A. Hussien
Format: Conference Proceeding
Language:English
Published: IEEE 21.09.2021
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The rapid growth of mobile phones, telecommunication networks, and the internet resulted in the advent of the Internet of Things (IoT). As a result, the need for security algorithms to keep up with these advances is becoming more pressing. One method of symmetric encryption is a stream cipher, which encrypts one bit or one byte of the digital data stream at a time. The cipher is unbreakable if the cryptographic keystream is random. However, the keystream must be delivered to all users in advance through a separated and protected channel. The solution proposed in this paper is based on the combine of both logistic maps and Geffe generator techniques by using an intelligent master key to generate a random key of stream cipher. The suggestion is easy to implement in hardware. It provides a high degree of protection. Additionally, the suggested method was compared with the other algorithms by utilizing the same 512-bits plaintext as well as the same master key as input parameters. The proposed cipher's findings are successful in the statistical NIST test, despite the failure of some test results for some comparative algorithms. Also, the suggestion was evaluated by other different tests including, histogram and correlation coefficient analysis, Shannon entropy analyses, and keyspace and key sensitivity. The tests results proved that the proposed method is effective in security issues.
DOI:10.1109/IICETA51758.2021.9717775