期刊论文详细信息
Cybersecurity
RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment
Research
Joarder Kamruzzaman1  M. Rubaiyat Hossain Mondal2  Sohel Rana2 
[1] Centre for Smart Analytics, Federation University Australia, 3842, Gippsland, VIC, Australia;Institute of Information and Communication Technology, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh;
关键词: Avalanche effects;    Block ciphers;    Butterfly architecture;    Edge computing;    FELICS;    IoT;    Lightweight cryptosystems;    MATLAB;   
DOI  :  10.1186/s42400-022-00136-7
 received in 2022-10-25, accepted in 2022-12-26,  发布年份 2022
来源: Springer
PDF
【 摘 要 】

Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data processing is handled by the edge server, sensitive data is generated and stored by the IoT devices, which are subject to attack. Since most IoT devices have limited resources, standard security algorithms such as AES, DES, and RSA hamper their ability to run properly. In this paper, a lightweight symmetric key cipher termed randomized butterfly architecture of fast Fourier transform for key (RBFK) cipher is proposed for resource-constrained IoT devices in the edge computing environment. The butterfly architecture is used in the key scheduling system to produce strong round keys for five rounds of the encryption method. The RBFK cipher has two key sizes: 64 and 128 bits, with a block size of 64 bits. The RBFK ciphers have a larger avalanche effect due to the butterfly architecture ensuring strong security. The proposed cipher satisfies the Shannon characteristics of confusion and diffusion. The memory usage and execution cycle of the RBFK cipher are assessed using the fair evaluation of the lightweight cryptographic systems (FELICS) tool. The proposed ciphers were also implemented using MATLAB 2021a to test key sensitivity by analyzing the histogram, correlation graph, and entropy of encrypted and decrypted images. Since the RBFK ciphers with minimal computational complexity provide better security than recently proposed competing ciphers, these are suitable for IoT devices in an edge computing environment.

【 授权许可】

CC BY   
© The Author(s) 2023

【 预 览 】
附件列表
Files Size Format View
RO202305156584644ZK.pdf 3215KB PDF download
40517_2023_248_Article_IEq12.gif 1KB Image download
40517_2023_248_Article_IEq20.gif 1KB Image download
40517_2023_248_Article_IEq22.gif 1KB Image download
40854_2023_456_Article_IEq6.gif 1KB Image download
40517_2023_248_Article_IEq25.gif 1KB Image download
40517_2023_248_Article_IEq28.gif 1KB Image download
40517_2023_248_Article_IEq31.gif 1KB Image download
40517_2023_248_Article_IEq33.gif 1KB Image download
40517_2023_248_Article_IEq35.gif 1KB Image download
Fig. 1 354KB Image download
40517_2023_248_Article_IEq37.gif 1KB Image download
40517_2023_248_Article_IEq40.gif 1KB Image download
40854_2022_419_Article_IEq5.gif 1KB Image download
40854_2023_456_Article_IEq31.gif 1KB Image download
Fig. 1 1688KB Image download
Fig. 1 524KB Image download
MediaObjects/42004_2023_833_MOESM3_ESM.docx 240017KB Other download
Fig. 5 1599KB Image download
【 图 表 】

Fig. 5

Fig. 1

Fig. 1

40854_2023_456_Article_IEq31.gif

40854_2022_419_Article_IEq5.gif

40517_2023_248_Article_IEq40.gif

40517_2023_248_Article_IEq37.gif

Fig. 1

40517_2023_248_Article_IEq35.gif

40517_2023_248_Article_IEq33.gif

40517_2023_248_Article_IEq31.gif

40517_2023_248_Article_IEq28.gif

40517_2023_248_Article_IEq25.gif

40854_2023_456_Article_IEq6.gif

40517_2023_248_Article_IEq22.gif

40517_2023_248_Article_IEq20.gif

40517_2023_248_Article_IEq12.gif

【 参考文献 】
  • [1]
  • [2]
  • [3]
  • [4]
  • [5]
  • [6]
  • [7]
  • [8]
  • [9]
  • [10]
  • [11]
  • [12]
  • [13]
  • [14]
  • [15]
  • [16]
  • [17]
  • [18]
  • [19]
  • [20]
  • [21]
  • [22]
  • [23]
  • [24]
  • [25]
  • [26]
  • [27]
  • [28]
  • [29]
  • [30]
  • [31]
  • [32]
  • [33]
  文献评价指标  
  下载次数:15次 浏览次数:4次