A Lightweight Cryptographic Algorithm using Pseudo Stream Cipher and Trigonometric Technique with Dynamic Key
Bhaskar Prakash Kosta1, Pasala Sanyasi Naidu2
1Bhaskar Prakash Kosta, Research Scholar, Department of CSE, GIT, GITAM Deemed to be University, Visakhapatnam, AP, India.
2Pasala Sanyasi Naidu, Assoc Professor, Department of CSE, GIT, GITAM Deemed to be University, Visakhapatnam , AP, India.
Manuscript received on March 15, 2020. | Revised Manuscript received on March 24, 2020. | Manuscript published on March 30, 2020. | PP: 4623-4630 | Volume-8 Issue-6, March 2020. | Retrieval Number: F8749038620/2020©BEIESP | DOI: 10.35940/ijrte.F8749.038620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: IoT(Internet of things) equipments is used heavily, but they are poor in security issue and security can be pierced. Also the message that the IoT device transmit is the main cause for their security lapse. that the IoT devices send may lead to the breach of users’ privacy. To make the communication secure between IoT nodes and servers, a lightweight cryptographic algorithm using pseudo stream and trigonometric function with dynamic key is proposed. This algorithm works in different phases, the first is mutual authentication followed by key synchronization and then a trigonometry function for encryption and decryption, with updation of key after specific time period. The algorithm assures that the IoT node will not be overloaded and the security is enhanced by reducing the chance of cryptanalysis. The mutual authentication, session key synchronization and updation of session key are completed through several encrypted communication. Here, the key length and update cycle are variable to prevent attack. We compare the security and performance for mutual authentication, with some light weight authentication scheme and performance of encryption algorithm are compared to other algorithm like Hill Cipher, RC4, RSA. According to analysis the proposed mutual authentication and secret key for session synchronization can provide more security features with low over head of communication which is suitable for protect communication security of IoT with limited resource and power. The encryption decryption algorithm provides better performance. Trigonometric concept is used in the design of encryption decryption algorithm.
Keywords: Lightweight Cryptographic Scheme, Internet Of Things, Pseudo Stream Cipher.
Scope of the Article: High Performance Computing.