MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption

Author(s):  
Jie Li ◽  
Jianliang Zheng

Nowadays, data keeps increasing; this in turn makes big data one of the hot topics in the modern era of technology. The biggest challenge, however, is big data security and cryptography is one of the most secure techniques. In this proposed model, we use this technique to secure data via a proposed new stream cipher technique to process more than one block by dividing the total size of the block into two parts, and swapping them then, combine and apply XOR operation with key and make some of mathematical operation. This operation is of fifteen rounds which make it very difficult for attacks to guess the plaintext.


Author(s):  
Keith M. Martin

In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers. We focus on two extremely important and influential block cipher algorithms, the Data Encryption Standard and the Advanced Encryption Standard, discussing the history of their development as well as their basic design. We then introduce the modes of operation of a block cipher, explaining why different modes have been proposed. We examine in detail four of the most well-established modes of operation and their core properties, as well as classifying other modes of operation.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Wei Zhang ◽  
Shanyu Tang ◽  
Liping Zhang ◽  
Zhao Ma ◽  
Jun Song

Intelligent transportation systems (ITS) are advanced applications in which the transportation industry is adapted to the information technology revolution. As an important development direction of ITS, the electronic toll collection (ETC) subsystem, which enables an efficient and speedy toll collection, has gained widespread popularity in the world. In an ETC system, toll transaction data are transmitted over intelligent transportation networks, which is vulnerable to eavesdropping, interfering, and tampering attacks. To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. The proposed cryptographic scheme allowed ITS to achieve key negotiation and data encryption between sensor nodes in the WSN, whileas reduced computational costs and power consumption. Security analysis and experimental results showed that the proposed scheme could protect data transmission between wireless sensor nodes from being attacked, and significantly reduced the communication overhead for the whole system compared to the existing ECC_AES scheme, thus satisfying the real-time data transmission requirement of ITS.


2021 ◽  
Vol 6 (2) ◽  
pp. 94-102
Author(s):  
Muslih Muslih ◽  
Abdussalam Abdussalam ◽  
Elkaf Rahmawan Pramudya

The main purpose of using cryptography is to provide the following four basic information security services. One of the purposes of cryptography is secrecy. Confidentiality is the fundamental security service provided by cryptography. This is a security service that stores information from unauthorized persons. Confidentiality can be achieved through a variety of ways ranging from physical security to the use of mathematical algorithms for data encryption. Vernam cipher is a stream cipher where the original data or plain with 8x8 block operation. Experimental results prove that RC4 can perform encryption and decryption with a fast execution process. In this study used a processor with 8GB of RAM. The encryption result of the text used yields the average encryption time and decryption average of 2 second.


2011 ◽  
Vol 216 ◽  
pp. 609-612
Author(s):  
Tian Yun Yan ◽  
Kai Kuo Xu ◽  
Min Wei ◽  
Jia He

The theory and technology of cryptography including the block cipher, stream cipher and public-key cryptosystem. The usual cryptographic algorithms, such as DES, RSA, AES and message digest algorithms are discussed. Basing on these studies, a design of secure communication is presented. It combines the data encryption with the authentication, can be applied to principal and subordinate system. It can provide a reliable protection for the secure communications for embedded devices. Finally, the core source code is shown.


Author(s):  
Dana Khwailleh ◽  
Firas Al-balas

The rapid growth of internet of things (IoT) in multiple areas brings research challenges closely linked to the nature of IoT technology. Therefore, there has been a need to secure the collected data from IoT sensors in an efficient and dynamic way taking into consideration the nature of collected data due to its importance. So, in this paper, a dynamic algorithm has been developed to distinguish the importance of data collected and apply the suitable security approach for each type of data collected. This was done by using hybrid system that combines block cipher and stream cipher systems. After data classification using machine learning classifiers the less important data are encrypted using stream cipher (SC) that use rivest cipher 4 algorithm, and more important data encrypted using block cipher (BC) that use advanced encryption standard algorithm. By applying a performance evaluation using simulation, the proposed method guarantees that it encrypts the data with less central processing unit (CPU) time with improvement in the security over the data by using the proposed hybrid system.


Author(s):  
Zaiton Muda ◽  
Abdeladeem Ab. Ahfaidha ◽  
Nur Izura Udzir ◽  
Ramlan Mahmod

Author(s):  
Subhadeep Banik ◽  
Vasily Mikhalev ◽  
Frederik Armknecht ◽  
Takanori Isobe ◽  
Willi Meier ◽  
...  

Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciphers drain less battery, they are invaluable components of devices that operate on a tight energy budget such as handheld devices or RFID tags. At Asiacrypt 2015, Banik et al. presented the block cipher family Midori which was designed to optimize the energy consumed per encryption and which reduces the energy consumption by more than 30% compared to previous block ciphers. However, if one has to encrypt/decrypt longer streams of data, i.e. for bulk data encryption/decryption, it is expected that a stream cipher should perform even better than block ciphers in terms of energy required to encrypt. In this paper, we address the question of designing low energy stream ciphers. To this end, we analyze for common stream cipher design components their impact on the energy consumption. Based on this, we give arguments why indeed stream ciphers allow for encrypting long data streams with less energy than block ciphers and validate our findings by implementations. Afterwards, we use the analysis results to identify energy minimizing design principles for stream ciphers.


Sign in / Sign up

Export Citation Format

Share Document