Skip to main content

Extended Protocol Using Keyless Encryption Based on Memristors

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1230))

Included in the following conference series:

Abstract

The growing interest for keyless encryption calls for new cryptographic solutions with real keyless schemes. This paper introduces an extended protocol using keyless encryption, which is hash-based and generic in cryptography. The sender side and the receiver side will be contained in the protocol. The sender will encrypt a plaintext and then send the cipher to the receiver side, and the cipher used in the protocol will be based on memristor arrays. We will use values of blocks of the plaintext to sort the cipher, which will improve the difficulty of being deciphered. Then, the receiver will receive the cipher and use it to decrypt the plaintext. The method of implementation is thoroughly detailed in this paper, and the security of the protocol is evaluated by testing random plaintexts thousands of times.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Baracaldo, N., Bathen, L.A.D., Ozugha, R.O., Engel, R., Tata, S., Ludwig, H.: Securing data provenance in Internet of Things (IoT) systems. In: International Conference on Service-Oriented Computing, pp. 92–98. Springer (2016)

    Google Scholar 

  2. Boutin, C.: NIST releases SHA-3 cryptographic hash standard. NIST information technology laboratory (2015)

    Google Scholar 

  3. Cambou, B., Orlowski, M.: Design of PUFs with RERAM and ternary states. In: Proceedings of the 11th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, USA, pp. 5–7 (2016)

    Google Scholar 

  4. Cambou, B.: A XOR data compiler: combined with physical unclonable function for true random number generation, pp. 819–827, July 2017

    Google Scholar 

  5. Cambou, B., Assiri, S., Hely, D.: Memristors to design keyless encrypting devices. ACM J. Emerg. Technol. Comput. Syst. (JETC) (2018, submitted)

    Google Scholar 

  6. Cambou, B.F.: Design of true random numbers generators with ternary physical unclonable functions. Adv. Sci. Technol. Eng. Syst. J. 3, 15–29 (2018)

    Article  Google Scholar 

  7. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  8. Han, J.-W., Park, C.-S., Ryu, D.-H., Kim, E.-S.: Optical image encryption based on XOR operations. Opt. Eng. 38, 47–54 (1999)

    Article  Google Scholar 

  9. Kahate, A.: Cryptography and Network Security. Tata McGraw-Hill Education, New York (2013)

    Google Scholar 

  10. Kaushik, A., Kumar, A., Barnela, M.: Block encryption standard for transfer of data. In: 2010 International Conference on Networking and Information Technology, pp. 381–385. IEEE (2010)

    Google Scholar 

  11. Kocher, P., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. J. Cryptograph. Eng. 1(1), 5–27 (2011)

    Article  Google Scholar 

  12. Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.-T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1–2), 23–30 (2007)

    Article  Google Scholar 

  13. Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. Computer 9, 51–58 (2011)

    Article  Google Scholar 

  14. Williams, R.S.: How we found the missing memristor. In: Chaos, CNN, Memristors and Beyond: A Festschrift for Leon Chua With DVD-ROM, Composed by Eleonora Bilotta, pp. 483–489. World Scientific (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yuxuan Zhu , Bertrand Cambou , David Hely or Sareh Assiri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhu, Y., Cambou, B., Hely, D., Assiri, S. (2020). Extended Protocol Using Keyless Encryption Based on Memristors. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_36

Download citation

Publish with us

Policies and ethics