Cybersecurity | |
RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment | |
Research | |
Joarder Kamruzzaman1  M. Rubaiyat Hossain Mondal2  Sohel Rana2  | |
[1] Centre for Smart Analytics, Federation University Australia, 3842, Gippsland, VIC, Australia;Institute of Information and Communication Technology, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh; | |
关键词: Avalanche effects; Block ciphers; Butterfly architecture; Edge computing; FELICS; IoT; Lightweight cryptosystems; MATLAB; | |
DOI : 10.1186/s42400-022-00136-7 | |
received in 2022-10-25, accepted in 2022-12-26, 发布年份 2022 | |
来源: Springer | |
【 摘 要 】
Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data processing is handled by the edge server, sensitive data is generated and stored by the IoT devices, which are subject to attack. Since most IoT devices have limited resources, standard security algorithms such as AES, DES, and RSA hamper their ability to run properly. In this paper, a lightweight symmetric key cipher termed randomized butterfly architecture of fast Fourier transform for key (RBFK) cipher is proposed for resource-constrained IoT devices in the edge computing environment. The butterfly architecture is used in the key scheduling system to produce strong round keys for five rounds of the encryption method. The RBFK cipher has two key sizes: 64 and 128 bits, with a block size of 64 bits. The RBFK ciphers have a larger avalanche effect due to the butterfly architecture ensuring strong security. The proposed cipher satisfies the Shannon characteristics of confusion and diffusion. The memory usage and execution cycle of the RBFK cipher are assessed using the fair evaluation of the lightweight cryptographic systems (FELICS) tool. The proposed ciphers were also implemented using MATLAB 2021a to test key sensitivity by analyzing the histogram, correlation graph, and entropy of encrypted and decrypted images. Since the RBFK ciphers with minimal computational complexity provide better security than recently proposed competing ciphers, these are suitable for IoT devices in an edge computing environment.
【 授权许可】
CC BY
© The Author(s) 2023
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO202305156584644ZK.pdf | 3215KB | download | |
40517_2023_248_Article_IEq12.gif | 1KB | Image | download |
40517_2023_248_Article_IEq20.gif | 1KB | Image | download |
40517_2023_248_Article_IEq22.gif | 1KB | Image | download |
40854_2023_456_Article_IEq6.gif | 1KB | Image | download |
40517_2023_248_Article_IEq25.gif | 1KB | Image | download |
40517_2023_248_Article_IEq28.gif | 1KB | Image | download |
40517_2023_248_Article_IEq31.gif | 1KB | Image | download |
40517_2023_248_Article_IEq33.gif | 1KB | Image | download |
40517_2023_248_Article_IEq35.gif | 1KB | Image | download |
Fig. 1 | 354KB | Image | download |
40517_2023_248_Article_IEq37.gif | 1KB | Image | download |
40517_2023_248_Article_IEq40.gif | 1KB | Image | download |
40854_2022_419_Article_IEq5.gif | 1KB | Image | download |
40854_2023_456_Article_IEq31.gif | 1KB | Image | download |
Fig. 1 | 1688KB | Image | download |
Fig. 1 | 524KB | Image | download |
MediaObjects/42004_2023_833_MOESM3_ESM.docx | 240017KB | Other | download |
Fig. 5 | 1599KB | Image | download |
【 图 表 】
Fig. 5
Fig. 1
Fig. 1
40854_2023_456_Article_IEq31.gif
40854_2022_419_Article_IEq5.gif
40517_2023_248_Article_IEq40.gif
40517_2023_248_Article_IEq37.gif
Fig. 1
40517_2023_248_Article_IEq35.gif
40517_2023_248_Article_IEq33.gif
40517_2023_248_Article_IEq31.gif
40517_2023_248_Article_IEq28.gif
40517_2023_248_Article_IEq25.gif
40854_2023_456_Article_IEq6.gif
40517_2023_248_Article_IEq22.gif
40517_2023_248_Article_IEq20.gif
40517_2023_248_Article_IEq12.gif
【 参考文献 】
- [1]
- [2]
- [3]
- [4]
- [5]
- [6]
- [7]
- [8]
- [9]
- [10]
- [11]
- [12]
- [13]
- [14]
- [15]
- [16]
- [17]
- [18]
- [19]
- [20]
- [21]
- [22]
- [23]
- [24]
- [25]
- [26]
- [27]
- [28]
- [29]
- [30]
- [31]
- [32]
- [33]