Abstract
So far, many cryptography systems adapted to Internet of Things (IoT) paradigm have been introduced. However, in these approaches, the constraint of images exchange has not been taken into consideration. In fact, image content is characterized by the correlation between its elements e.g. pixels. Correlation impacts negatively the security. Actually, using correlation, one can disclose data content once he/she has recognized a part of it. In this paper, we introduce a new cryptography system that takes into consideration correlation issue. Furthermore, our system allows reducing significantly memory use and time consumption, which are critical factor in IoT dedicated cryptosystems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74735-2_31
Izadi, M., Sadeghiyan, B., Sadeghian, S.S., Khanooki, H.A.: MIBS: a new lightweight block cipher. In: Garay, Juan A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 334–348. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10433-6_22
Zhang, W., Bao, Z., Lin, D., Rijmen, V., Bohan, Y., Ingrid, V.: RECTANGLE: a bit-slice ultra-lightweight block cipher suitable for multiple platforms. IACR Cryptol. ePrint Arch. 2014, 84 (2014)
Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326–341. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23951-9_22
Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: TWINE: a lightweight block cipher for multiple platforms. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 339–354. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35999-6_22
Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher clefia (extended abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181–195. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74619-5_12
Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T., Regazzoni, F.: Midori: a block cipher for low energy. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9453, pp. 411–436. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48800-3_17
Baysal, A., Şahin, S.: RoadRunneR: a small and fast bitslice block cipher for low cost 8-bit processors. In: Güneysu, T., Leander, G., Moradi, A. (eds.) LightSec 2015. LNCS, vol. 9542, pp. 58–76. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29078-2_4
Yang, G., Zhu, B., Suder, V., Aagaard, Mark D., Gong, G.: The Simeck family of lightweight block ciphers. In: Güneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 307–329. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48324-4_16
Kölbl, S., Roy, A.: A brief comparison of simon and simeck. IACR Cryptology ePrint Archive (2015)
Claude, G.: Initiation aux Methodes Statistiques en Sciences Sociales. Chapitre6 (1998). available at http://grasland.script.univ-paris-diderot.fr/STAT98/stat98_6/stat98_6.htm. Accessed 01 July 2016
Stéphane, J.: Protection cryptographique des bases de données: conception et cryptanalyse. PhD. Dissertation, Université Pierre et Marie Curie - Paris VI, (2012)
Soleymani, A., Nordin, M.J., Sundararajan, E.A.: Chaotic cryptosystem for image based on Henon and arnold cat map. Sci. World J. 2014, 21 (2014)
Rijmen, V.: Efficient Implementation of the Rijndael S-box. J. Katholieke Universiteit Leuven (2000)
Skórski, M.: Shannon entropy versus renyi entropy from a cryptographic viewpoint. In: Groth, J. (ed.) IMACC 2015. LNCS, vol. 9496, pp. 257–274. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27239-9_16
Ahmad, M., Alsharari, H.D., Nizam, M.: Security improvement of an image encryption based on mPixel-chaotic-shuffle and pixel-chaotic-diffusion. Eur. J. Sci. Res. (2013)
Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A.: A fast chaotic encryptions cheme based on piece wise nonlinear chaotic maps. Phys. Lett. A 366, 391–396 (2007)
Jean, D.D.N.: Evaluation d’un algorithme de cryptage chaotique des images basé sur le modèle du perceptron, Report, Université de Ngoundéré (2012)
Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI Randomness Tests for Image Encryption. J. Sel. Areas Telecommun. (JSAT) 1, 31–38 (2011)
Manifavas, C., Hatzivasilis, G., Fysarakis, K., Rantos, K.: Lightweight cryptography for embedded systems – a comparative analysis. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, William M. (eds.) DPM/SETOP-2013. LNCS, vol. 8247, pp. 333–349. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54568-9_21
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Omrani, T., Sliman, L. (2019). A New Lightweight Encryption Approach for Correlated Content Exchange in Internet of Things. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2019. Communications in Computer and Information Science, vol 1113. Springer, Cham. https://doi.org/10.1007/978-3-030-34353-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-34353-8_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34352-1
Online ISBN: 978-3-030-34353-8
eBook Packages: Computer ScienceComputer Science (R0)