You can view the full text of this article for free using the link below.

Title: A new encryption system for IoT devices using embedded key cryptosystem

Authors: Shadi R. Masadeh

Addresses: Faculty of Information Technology, Department of Cyber Security, Isra University, Amman, Jordan

Abstract: IoT constrained devices have special phenomena of constrained resources such as power source, memory and processing power. Besides, it is vital to achieve an acceptable level of security and privacy while preserving the IoT device resources. In this paper, a new cryptographic algorithm is developed that would be suitable for securing IoT devices using embedded key cryptosystem. The encryption/decryption processes are achieved by segmenting the message into blocks of certain length. Each block is encrypted/decrypted using a key that is generated according to the segment itself, i.e., the keys are embedded into the blocks. The algorithm adopts two tables: one for the intended character set and the other for the key elements generation. The secrecy of these tables is responsible for securing the key strength. Experimental implementation proves the algorithm feasibility and strength against hackers and intruders.

Keywords: symmetric cryptosystems; key embedding; IoT security; network security.

DOI: 10.1504/IJESDF.2023.127748

International Journal of Electronic Security and Digital Forensics, 2023 Vol.15 No.1, pp.56 - 65

Received: 13 Jan 2022
Accepted: 18 Feb 2022

Published online: 15 Dec 2022 *

Full-text access for editors Full-text access for subscribers Free access Comment on this article