Unpredictable cryptographic primitives for the Robust Wireless Network Security

被引:0
|
作者
Asimi, Younes [1 ,2 ]
Asimi, Ahmed [1 ,2 ,3 ]
Guezzaz, Azidine [1 ,3 ]
Tbatou, Zakariae [1 ,3 ]
Sadqi, Yassine [4 ]
机构
[1] SCCAM Team, LaBSiV Lab, Agadir, Morocco
[2] Ibn Zohr Univ, Technol High Sch Guelmim, Agadir, Morocco
[3] Ibn Zohr Univ, Fac Sci, Agadir, Morocco
[4] Sultan Moulay Slimane Univ, Polydisciplinairy Fac, Beni Mellal, Morocco
关键词
Robust stream cipher algorithm; robust wireless network security; strong encryption; unpredictable cryptographic primitives; dynamic integrity check code and primitive polynomials;
D O I
10.1016/j.procs.2018.07.178
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A robust stream cipher algorithm is defined as unpredictable and random generator of the keystreams under minimal perturbations over its inputs. It provides too strong encryption resisting to the attacks founded on the correlation of the regenerated keystreams. The robustness of a wireless network security requires efficient cryptographic primitives and security protocols able to prove the integrity, authentication and confidentiality of the sensitive information. In this paper, we aim to enhance the data confidentiality and integrity of the wireless network. To highlight the data integrity, we introduce a dynamic integrity check code that calculates a checksum from primitive polynomials generator. In our contribution, we focus on the dynamist, unpredictability and non-traceability of sensitive information. We progress our system by a process of regeneration of the primitive polynomials proper to any communication session without touching the internal behavior of the habitual systems. We aim also to introduce a solution Which influences by any minimal perturbation on the sensitive elements. It inspires its robustness by its aptitude to regenerate lightweight, dynamic and robust cryptographic primitives able to ensure robust wireless network security. (C) 2018 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/) Peer-review under responsibility of the scientific committee of the 13th International Conference on Future Networks and Communications, FNC-2018 and the 15th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2018.
引用
收藏
页码:316 / 321
页数:6
相关论文
共 50 条
  • [1] On the Bit Security of Cryptographic Primitives
    Micciancio, Daniele
    Walter, Michael
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 3 - 28
  • [2] Security Amplification for Interactive Cryptographic Primitives
    Dodis, Yevgeniy
    Impagliazzo, Russell
    Jaiswal, Ragesh
    Kabanets, Valentine
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 128 - +
  • [3] Cryptographic Data Security for Reliable Wireless Sensor Network
    Urooj, Shabana
    Lata, Sonam
    Ahmad, Shahnawaz
    Mehfuz, Shabana
    Kalathil, S.
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2023, 72 : 37 - 50
  • [4] On Bitcoin Security in the Presence of Broken Cryptographic Primitives
    Giechaskiel, Ilias
    Cremers, Cas
    Rasmussen, Kasper B.
    [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 201 - 222
  • [5] A limitation on security evaluation of cryptographic primitives with fixed keys
    Kawai, Yutaka
    Hanaoka, Goichiro
    Ohta, Kazuo
    Kunihiro, Noboru
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1663 - 1675
  • [6] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [7] Cryptographic primitives
    Garrett, P
    [J]. PUBLIC-KEY CRYPTOGRAPHY, 2005, 62 : 1 - 62
  • [8] A Robust Mechanism for Wireless Sensor Network Security
    Wang, Hongfa
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3844 - 3847
  • [9] Evaluation of Cryptographic Primitives Security Based on Proximity to the Latin Square
    Palagushin, Vladimir V.
    Khomonenko, Anatoly D.
    Adadurov, Sergey E.
    [J]. 2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 266 - 271
  • [10] Combining cryptographic primitives to prevent jamming attacks in wireless networks
    Singh, Ngangbam Herojit
    Kayalvizhi, A.
    [J]. 2013 International Conference on Information Communication and Embedded Systems, ICICES 2013, 2013, : 251 - 255