BRISK: Dynamic Encryption Based Cipher for Long Term Security
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal. The majority of standard cryptographic algorithms do not fit with these constrained dev...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-08-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/21/17/5744 |
id |
doaj-971fa19a6e2b4ef5a4d535ad1e7bdc43 |
---|---|
record_format |
Article |
spelling |
doaj-971fa19a6e2b4ef5a4d535ad1e7bdc432021-09-09T13:56:03ZengMDPI AGSensors1424-82202021-08-01215744574410.3390/s21175744BRISK: Dynamic Encryption Based Cipher for Long Term SecurityAshutosh Dhar Dwivedi0Cyber Security Section, Department of Applied Mathematics and Computer Science, Technical University of Denmark, 2800 Kgs. Lyngby, DenmarkSeveral emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal. The majority of standard cryptographic algorithms do not fit with these constrained devices due to heavy cryptographic components. In this paper, a new block cipher, BRISK, is proposed with a block size of 32-bit. The cipher design is straightforward due to simple round operations, and these operations can be efficiently run in hardware and suitable for software. Another major concept used with this cipher is dynamism during encryption for each session; that is, instead of using the same encryption algorithm, participants use different ciphers for each session. Professor Lars R. Knudsen initially proposed dynamic encryption in 2015, where the sender picks a cipher from a large pool of ciphers to encrypt the data and send it along with the encrypted message. The receiver does not know about the encryption technique used before receiving the cipher along with the message. However, in the proposed algorithm, instead of choosing a new cipher, the process uses the same cipher for each session, but varies the cipher specifications from a given small pool, e.g., the number of rounds, cipher components, etc. Therefore, the dynamism concept is used here in a different way.https://www.mdpi.com/1424-8220/21/17/5744lightweight cryptographyInternet of Things (IoT)dynamic encryptionblock cipherfast encryption |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ashutosh Dhar Dwivedi |
spellingShingle |
Ashutosh Dhar Dwivedi BRISK: Dynamic Encryption Based Cipher for Long Term Security Sensors lightweight cryptography Internet of Things (IoT) dynamic encryption block cipher fast encryption |
author_facet |
Ashutosh Dhar Dwivedi |
author_sort |
Ashutosh Dhar Dwivedi |
title |
BRISK: Dynamic Encryption Based Cipher for Long Term Security |
title_short |
BRISK: Dynamic Encryption Based Cipher for Long Term Security |
title_full |
BRISK: Dynamic Encryption Based Cipher for Long Term Security |
title_fullStr |
BRISK: Dynamic Encryption Based Cipher for Long Term Security |
title_full_unstemmed |
BRISK: Dynamic Encryption Based Cipher for Long Term Security |
title_sort |
brisk: dynamic encryption based cipher for long term security |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2021-08-01 |
description |
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal. The majority of standard cryptographic algorithms do not fit with these constrained devices due to heavy cryptographic components. In this paper, a new block cipher, BRISK, is proposed with a block size of 32-bit. The cipher design is straightforward due to simple round operations, and these operations can be efficiently run in hardware and suitable for software. Another major concept used with this cipher is dynamism during encryption for each session; that is, instead of using the same encryption algorithm, participants use different ciphers for each session. Professor Lars R. Knudsen initially proposed dynamic encryption in 2015, where the sender picks a cipher from a large pool of ciphers to encrypt the data and send it along with the encrypted message. The receiver does not know about the encryption technique used before receiving the cipher along with the message. However, in the proposed algorithm, instead of choosing a new cipher, the process uses the same cipher for each session, but varies the cipher specifications from a given small pool, e.g., the number of rounds, cipher components, etc. Therefore, the dynamism concept is used here in a different way. |
topic |
lightweight cryptography Internet of Things (IoT) dynamic encryption block cipher fast encryption |
url |
https://www.mdpi.com/1424-8220/21/17/5744 |
work_keys_str_mv |
AT ashutoshdhardwivedi briskdynamicencryptionbasedcipherforlongtermsecurity |
_version_ |
1717759431660273664 |