Abstract
The growing interest for keyless encryption calls for new cryptographic solutions with real keyless schemes. This paper introduces an extended protocol using keyless encryption, which is hash-based and generic in cryptography. The sender side and the receiver side will be contained in the protocol. The sender will encrypt a plaintext and then send the cipher to the receiver side, and the cipher used in the protocol will be based on memristor arrays. We will use values of blocks of the plaintext to sort the cipher, which will improve the difficulty of being deciphered. Then, the receiver will receive the cipher and use it to decrypt the plaintext. The method of implementation is thoroughly detailed in this paper, and the security of the protocol is evaluated by testing random plaintexts thousands of times.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baracaldo, N., Bathen, L.A.D., Ozugha, R.O., Engel, R., Tata, S., Ludwig, H.: Securing data provenance in Internet of Things (IoT) systems. In: International Conference on Service-Oriented Computing, pp. 92–98. Springer (2016)
Boutin, C.: NIST releases SHA-3 cryptographic hash standard. NIST information technology laboratory (2015)
Cambou, B., Orlowski, M.: Design of PUFs with RERAM and ternary states. In: Proceedings of the 11th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, USA, pp. 5–7 (2016)
Cambou, B.: A XOR data compiler: combined with physical unclonable function for true random number generation, pp. 819–827, July 2017
Cambou, B., Assiri, S., Hely, D.: Memristors to design keyless encrypting devices. ACM J. Emerg. Technol. Comput. Syst. (JETC) (2018, submitted)
Cambou, B.F.: Design of true random numbers generators with ternary physical unclonable functions. Adv. Sci. Technol. Eng. Syst. J. 3, 15–29 (2018)
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Han, J.-W., Park, C.-S., Ryu, D.-H., Kim, E.-S.: Optical image encryption based on XOR operations. Opt. Eng. 38, 47–54 (1999)
Kahate, A.: Cryptography and Network Security. Tata McGraw-Hill Education, New York (2013)
Kaushik, A., Kumar, A., Barnela, M.: Block encryption standard for transfer of data. In: 2010 International Conference on Networking and Information Technology, pp. 381–385. IEEE (2010)
Kocher, P., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. J. Cryptograph. Eng. 1(1), 5–27 (2011)
Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.-T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1–2), 23–30 (2007)
Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. Computer 9, 51–58 (2011)
Williams, R.S.: How we found the missing memristor. In: Chaos, CNN, Memristors and Beyond: A Festschrift for Leon Chua With DVD-ROM, Composed by Eleonora Bilotta, pp. 483–489. World Scientific (2013)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhu, Y., Cambou, B., Hely, D., Assiri, S. (2020). Extended Protocol Using Keyless Encryption Based on Memristors. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_36
Download citation
DOI: https://doi.org/10.1007/978-3-030-52243-8_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52242-1
Online ISBN: 978-3-030-52243-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)