Abstract
To build robust secure channels for information exchange, distributed computing systems must generate and handle high-entropy secret keys. However, solutions to generate those high-entropy keys such as Physical Unclonable Functions or sensing devices are very dependent on the environment and the hardware performance. Thus, keys may not achieve the expected entropy or show uncontrolled behaviors that may prevent communicating remote nodes to synchronize with a shared key. Therefore, new solutions are needed to enable distributed computing nodes to generate high-entropy keys in a lightweight, consistent, and robust manner. In this paper we propose a federated algorithm to address this challenge. Remote nodes are provided with different physical devices to initialize with a random configuration a Fibonacci random number generator. The parameter set describing the configuration of the key generator is locally encoded using a gradient function and sent to an edge computing manager where different encoded configurations coming from different remote nodes are collected. The edge computing manager combines all these configurations considering different weights and an optimization target function based on the definition of mutual information. An experimental validation is also provided. Simulation tools are employed, and results show the long-term average entropy increases up to 23% when using the proposed solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bordel, B., Alcarria, R., Morales, A., Castillo, I.: A framework for enhancing mobile workflow execution through injection of flexible security controls. Analog Integr. Circ. Sig. Process 96(2), 303–316 (2018)
Robles, T., Bordel, B., Alcarria, R., Sánchez-de-Rivera, D.: Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design. Int. J. Distrib. Sens. Netw. 16(5), 1550147720912110 (2020)
Bordel, B., Alcarria, R., Robles, T., Sánchez-Picot, Á.: Stochastic and information theory techniques to reduce large datasets and detect cyberattacks in ambient intelligence environments. IEEE Access 6, 34896–34910 (2018)
Bordel, B., Orúe, A.B., Alcarria, R., Sánchez-De-Rivera, D.: An intra-slice security solution for emerging 5G networks based on pseudo-random number generators. IEEE Access 6, 16149–16164 (2018)
Lara-Nino, C.A., Diaz-Perez, A., Morales-Sandoval, M.: Elliptic curve lightweight cryptography: a survey. IEEE Access 6, 72514–72550 (2018)
Meng, Z., Wang, Y.: Asymmetric encryption algorithms: primitives and applications. In: 2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI), pp. 876–881. IEEE, May 2022
Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I., Manifavas, C.: A review of lightweight block ciphers. J. Cryptogr. Eng. 8(2), 141–184 (2018)
Bordel, B., Alcarria, R., Robles, T.: Lightweight encryption for short-range wireless biometric authentication systems in Industry 4.0. Integr. Comput.-Aided Eng., 1–21 (2022, Preprint)
Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft. Comput. 24(5), 3829–3848 (2020)
Bordel, B., Alcarria, R., De Andrés, D.M., You, I.: Securing Internet-of-Things systems through implicit and explicit reputation models. IEEE Access 6, 47472–47488 (2018)
Yu, F., Li, L., Tang, Q., Cai, S., Song, Y., Xu, Q.: A survey on true random number generators based on chaos. Discrete Dyn. Nat. Soc. (2019)
Pérez-Jiménez, M., Sánchez, B.B., Migliorini, A., Alcarria, R.: Protecting private communications in cyber-physical systems through physical unclonable functions. Electronics 8(4), 390 (2019)
Rontani, D., Choi, D., Chang, C.Y., Locquet, A., Citrin, D.S.: Compressive sensing with optical chaos. Sci. Rep. 6(1), 1–7 (2016)
Kate, A., Goldberg, I.: Distributed private-key generators for identity-based cryptography. In: Garay, J.A., De Prisco, R. (eds.) Security and Cryptography for Networks. LNCS, vol. 6280, pp. 436–453. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15317-4_27
Wariki, K., et al.: Malicious Private Key Generators in Identity-Based Authenticated Key Exchange (2022)
Wu, Y., Qiu, B.: Transforming a pattern identifier into biometric key generators. In: 2010 IEEE International Conference on Multimedia and Expo, pp. 78–82. IEEE, July 2010
Mohammed, N.Q., Hussein, Q.M., Sana, A.M., Khalil, L.A.: A hybrid approach to design key generator of cryptosystem. J. Comput. Theor. Nanosci. 16(3), 971–977 (2019)
Kumar, T.M., Reddy, K.S., Rinaldi, S., Parameshachari, B.D., Arunachalam, K.: A low area high speed FPGA implementation of AES architecture for cryptography application. Electronics 10(16), 2023 (2021)
Goswami, J., Paul, M.: Symmetric key cryptography using digital circuit based on one right shift. Rev. Comput. Eng. Stud. 4(2), 57–61 (2017)
Bordel, B., Alcarria, R., Sánchez-de-Rivera, D., Robles, T.: Protecting industry 4.0 systems against the malicious effects of cyber-physical attacks. In: Ochoa, S.F., Singh, P., Bravo, J. (eds.) Ubiquitous computing and ambient intelligence. LNCS, vol. 10586, pp. 161–171. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67585-5_17
Gao, Y., Al-Sarawi, S.F., Abbott, D.: Physical unclonable functions. Nat. Electron. 3(2), 81–91 (2020)
Zerrouki, F., Ouchani, S., Bouarfa, H.: A low-cost authentication protocol using Arbiter-PUF. In: Attiogbé, C., Ben Yahia, S. (eds.) Model and Data Engineering. LNCS, vol. 12732, pp. 101–116. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-78428-7_9
Chen, B., Ignatenko, T., Willems, F.M., Maes, R., van der Sluis, E., Selimis, G.: A robust SRAM-PUF key generation scheme based on polar codes. In: GLOBECOM 2017–2017 IEEE Global Communications Conference, pp. 1–6. IEEE, December 2017
Gao, Y., Su, Y., Yang, W., Chen, S., Nepal, S., Ranasinghe, D.C.: Building secure SRAM PUF key generators on resource constrained devices. In: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 912–917. IEEE, March 2019
Delvaux, J., Verbauwhede, I.: Attacking PUF-based pattern matching key generators via helper data manipulation. In: Benaloh, J. (ed.) Topics in Cryptology – CT-RSA 2014. LNCS, vol. 8366, pp. 106–131. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04852-9_6
Abd EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Phys. A Stat. Mech. Appl. 547, 123869 (2020)
Ayubi, P., Setayeshi, S., Rahmani, A.M.: Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application. J. Inf. Secur. Appl. 52, 102472 (2020)
Sahari, M.L., Boukemara, I.: A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption. Nonlinear Dyn. 94(1), 723–744 (2018)
Cang, S., Kang, Z., Wang, Z.: Pseudo-random number generator based on a generalized conservative Sprott-A system. Nonlinear Dyn. 104(1), 827–844 (2021)
Mareca, P., Bordel, B.: Robust hardware-supported chaotic cryptosystems for streaming commutations among reduced computing power nodes. Analog Integr. Circ. Sig. Process 98(1), 11–26 (2019)
Karunamurthi, S., Natarajan, V.K.: VLSI implementation of reversible logic gates cryptography with LFSR key. Microprocess. Microsyst. 69, 68–78 (2019)
Raffaelli, F., Sibson, P., Kennard, J.E., Mahler, D.H., Thompson, M.G., Matthews, J.C.: Generation of random numbers by measuring phase fluctuations from a laser diode with a silicon-on-insulator chip. Opt. Express 26(16), 19730–19741 (2018)
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) Wireless Sensor Networks. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-77690-1_19
Acknowledgments
The research leading to these results has received funding from the Ministry of Science, Innovation and Universities through the COGNOS project. (PID2019-105484RB-I00).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Bordel, B., Alcarria, R., Robles, T. (2024). A Federated Algorithm for the Lightweight Generation of High-Entropy Keys in Distributed Computing Systems. In: Rocha, A., Adeli, H., Dzemyda, G., Moreira, F., Colla, V. (eds) Information Systems and Technologies. WorldCIST 2023. Lecture Notes in Networks and Systems, vol 801. Springer, Cham. https://doi.org/10.1007/978-3-031-45648-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-45648-0_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45647-3
Online ISBN: 978-3-031-45648-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)