BRISK: Dynamic Encryption Based Cipher for Long Term Security

Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal. The majority of standard cryptographic algorithms do not fit with these constrained dev...

Full description

Bibliographic Details
Main Author: Ashutosh Dhar Dwivedi
Format: Article
Language:English
Published: MDPI AG 2021-08-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/21/17/5744
id doaj-971fa19a6e2b4ef5a4d535ad1e7bdc43
record_format Article
spelling doaj-971fa19a6e2b4ef5a4d535ad1e7bdc432021-09-09T13:56:03ZengMDPI AGSensors1424-82202021-08-01215744574410.3390/s21175744BRISK: Dynamic Encryption Based Cipher for Long Term SecurityAshutosh Dhar Dwivedi0Cyber Security Section, Department of Applied Mathematics and Computer Science, Technical University of Denmark, 2800 Kgs. Lyngby, DenmarkSeveral emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal. The majority of standard cryptographic algorithms do not fit with these constrained devices due to heavy cryptographic components. In this paper, a new block cipher, BRISK, is proposed with a block size of 32-bit. The cipher design is straightforward due to simple round operations, and these operations can be efficiently run in hardware and suitable for software. Another major concept used with this cipher is dynamism during encryption for each session; that is, instead of using the same encryption algorithm, participants use different ciphers for each session. Professor Lars R. Knudsen initially proposed dynamic encryption in 2015, where the sender picks a cipher from a large pool of ciphers to encrypt the data and send it along with the encrypted message. The receiver does not know about the encryption technique used before receiving the cipher along with the message. However, in the proposed algorithm, instead of choosing a new cipher, the process uses the same cipher for each session, but varies the cipher specifications from a given small pool, e.g., the number of rounds, cipher components, etc. Therefore, the dynamism concept is used here in a different way.https://www.mdpi.com/1424-8220/21/17/5744lightweight cryptographyInternet of Things (IoT)dynamic encryptionblock cipherfast encryption
collection DOAJ
language English
format Article
sources DOAJ
author Ashutosh Dhar Dwivedi
spellingShingle Ashutosh Dhar Dwivedi
BRISK: Dynamic Encryption Based Cipher for Long Term Security
Sensors
lightweight cryptography
Internet of Things (IoT)
dynamic encryption
block cipher
fast encryption
author_facet Ashutosh Dhar Dwivedi
author_sort Ashutosh Dhar Dwivedi
title BRISK: Dynamic Encryption Based Cipher for Long Term Security
title_short BRISK: Dynamic Encryption Based Cipher for Long Term Security
title_full BRISK: Dynamic Encryption Based Cipher for Long Term Security
title_fullStr BRISK: Dynamic Encryption Based Cipher for Long Term Security
title_full_unstemmed BRISK: Dynamic Encryption Based Cipher for Long Term Security
title_sort brisk: dynamic encryption based cipher for long term security
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2021-08-01
description Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal. The majority of standard cryptographic algorithms do not fit with these constrained devices due to heavy cryptographic components. In this paper, a new block cipher, BRISK, is proposed with a block size of 32-bit. The cipher design is straightforward due to simple round operations, and these operations can be efficiently run in hardware and suitable for software. Another major concept used with this cipher is dynamism during encryption for each session; that is, instead of using the same encryption algorithm, participants use different ciphers for each session. Professor Lars R. Knudsen initially proposed dynamic encryption in 2015, where the sender picks a cipher from a large pool of ciphers to encrypt the data and send it along with the encrypted message. The receiver does not know about the encryption technique used before receiving the cipher along with the message. However, in the proposed algorithm, instead of choosing a new cipher, the process uses the same cipher for each session, but varies the cipher specifications from a given small pool, e.g., the number of rounds, cipher components, etc. Therefore, the dynamism concept is used here in a different way.
topic lightweight cryptography
Internet of Things (IoT)
dynamic encryption
block cipher
fast encryption
url https://www.mdpi.com/1424-8220/21/17/5744
work_keys_str_mv AT ashutoshdhardwivedi briskdynamicencryptionbasedcipherforlongtermsecurity
_version_ 1717759431660273664