Unpredictable cryptographic primitives for the Robust Wireless Network Security

被引:0
|
作者
Asimi, Younes [1 ,2 ]
Asimi, Ahmed [1 ,2 ,3 ]
Guezzaz, Azidine [1 ,3 ]
Tbatou, Zakariae [1 ,3 ]
Sadqi, Yassine [4 ]
机构
[1] SCCAM Team, LaBSiV Lab, Agadir, Morocco
[2] Ibn Zohr Univ, Technol High Sch Guelmim, Agadir, Morocco
[3] Ibn Zohr Univ, Fac Sci, Agadir, Morocco
[4] Sultan Moulay Slimane Univ, Polydisciplinairy Fac, Beni Mellal, Morocco
关键词
Robust stream cipher algorithm; robust wireless network security; strong encryption; unpredictable cryptographic primitives; dynamic integrity check code and primitive polynomials;
D O I
10.1016/j.procs.2018.07.178
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A robust stream cipher algorithm is defined as unpredictable and random generator of the keystreams under minimal perturbations over its inputs. It provides too strong encryption resisting to the attacks founded on the correlation of the regenerated keystreams. The robustness of a wireless network security requires efficient cryptographic primitives and security protocols able to prove the integrity, authentication and confidentiality of the sensitive information. In this paper, we aim to enhance the data confidentiality and integrity of the wireless network. To highlight the data integrity, we introduce a dynamic integrity check code that calculates a checksum from primitive polynomials generator. In our contribution, we focus on the dynamist, unpredictability and non-traceability of sensitive information. We progress our system by a process of regeneration of the primitive polynomials proper to any communication session without touching the internal behavior of the habitual systems. We aim also to introduce a solution Which influences by any minimal perturbation on the sensitive elements. It inspires its robustness by its aptitude to regenerate lightweight, dynamic and robust cryptographic primitives able to ensure robust wireless network security. (C) 2018 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/) Peer-review under responsibility of the scientific committee of the 13th International Conference on Future Networks and Communications, FNC-2018 and the 15th International Conference on Mobile Systems and Pervasive Computing, MobiSPC 2018.
引用
收藏
页码:316 / 321
页数:6
相关论文
共 50 条
  • [21] A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01): : 577 - 601
  • [22] An Image Encryption Algorithm Based on Chaotic Selection of Robust Cryptographic Primitives
    Muhammad, Zahir Muhammad Ziad
    Ozkaynak, Fatih
    IEEE ACCESS, 2020, 8 (08): : 56581 - 56589
  • [23] SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives
    Abidalrahman Moh’d
    Nauman Aslam
    William Phillips
    William Robertson
    Hosein Marzi
    Personal and Ubiquitous Computing, 2013, 17 : 1051 - 1059
  • [24] SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives
    Moh'd, Abidalrahman
    Aslam, Nauman
    Phillips, William
    Robertson, William
    Marzi, Hosein
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 1051 - 1059
  • [25] Cryptographic Primitives with Hinting Property
    Alamati, Navid
    Patranabis, Sikhar
    JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [26] Verse: An EDSL for Cryptographic Primitives
    Dang, Abhishek
    Kurur, Piyush P.
    PPDP'18: PROCEEDINGS OF THE 20TH INTERNATIONAL SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING, 2018,
  • [27] Making cryptographic primitives harder
    Hasegawa, Shingo
    Hatanaka, Hiroyuki
    Isobe, Shuji
    Koizumi, Eisuke
    Shizuya, Hiroki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 330 - 337
  • [28] Feebly secure cryptographic primitives
    Hirsch E.A.
    Melanich O.
    Nikolenko S.I.
    Journal of Mathematical Sciences, 2013, 188 (1) : 17 - 34
  • [29] Cryptographic Primitives with Hinting Property
    Alamati, Navid
    Patranabis, Sikhar
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 33 - 62
  • [30] Implementation and characterization of flash-based hardware security primitives for cryptographic key generation
    Oh, Mi-Kyung
    Lee, Sangjae
    Kang, Yousung
    Choi, Dooho
    ETRI JOURNAL, 2023, 45 (02) : 346 - 357