Skip to main content

A Federated Algorithm for the Lightweight Generation of High-Entropy Keys in Distributed Computing Systems

  • Conference paper
  • First Online:
Information Systems and Technologies (WorldCIST 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 801))

Included in the following conference series:

  • 67 Accesses

Abstract

To build robust secure channels for information exchange, distributed computing systems must generate and handle high-entropy secret keys. However, solutions to generate those high-entropy keys such as Physical Unclonable Functions or sensing devices are very dependent on the environment and the hardware performance. Thus, keys may not achieve the expected entropy or show uncontrolled behaviors that may prevent communicating remote nodes to synchronize with a shared key. Therefore, new solutions are needed to enable distributed computing nodes to generate high-entropy keys in a lightweight, consistent, and robust manner. In this paper we propose a federated algorithm to address this challenge. Remote nodes are provided with different physical devices to initialize with a random configuration a Fibonacci random number generator. The parameter set describing the configuration of the key generator is locally encoded using a gradient function and sent to an edge computing manager where different encoded configurations coming from different remote nodes are collected. The edge computing manager combines all these configurations considering different weights and an optimization target function based on the definition of mutual information. An experimental validation is also provided. Simulation tools are employed, and results show the long-term average entropy increases up to 23% when using the proposed solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bordel, B., Alcarria, R., Morales, A., Castillo, I.: A framework for enhancing mobile workflow execution through injection of flexible security controls. Analog Integr. Circ. Sig. Process 96(2), 303–316 (2018)

    Article  Google Scholar 

  2. Robles, T., Bordel, B., Alcarria, R., Sánchez-de-Rivera, D.: Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design. Int. J. Distrib. Sens. Netw. 16(5), 1550147720912110 (2020)

    Article  Google Scholar 

  3. Bordel, B., Alcarria, R., Robles, T., Sánchez-Picot, Á.: Stochastic and information theory techniques to reduce large datasets and detect cyberattacks in ambient intelligence environments. IEEE Access 6, 34896–34910 (2018)

    Article  Google Scholar 

  4. Bordel, B., Orúe, A.B., Alcarria, R., Sánchez-De-Rivera, D.: An intra-slice security solution for emerging 5G networks based on pseudo-random number generators. IEEE Access 6, 16149–16164 (2018)

    Article  Google Scholar 

  5. Lara-Nino, C.A., Diaz-Perez, A., Morales-Sandoval, M.: Elliptic curve lightweight cryptography: a survey. IEEE Access 6, 72514–72550 (2018)

    Article  Google Scholar 

  6. Meng, Z., Wang, Y.: Asymmetric encryption algorithms: primitives and applications. In: 2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI), pp. 876–881. IEEE, May 2022

    Google Scholar 

  7. Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I., Manifavas, C.: A review of lightweight block ciphers. J. Cryptogr. Eng. 8(2), 141–184 (2018)

    Article  Google Scholar 

  8. Bordel, B., Alcarria, R., Robles, T.: Lightweight encryption for short-range wireless biometric authentication systems in Industry 4.0. Integr. Comput.-Aided Eng., 1–21 (2022, Preprint)

    Google Scholar 

  9. Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft. Comput. 24(5), 3829–3848 (2020)

    Article  Google Scholar 

  10. Bordel, B., Alcarria, R., De Andrés, D.M., You, I.: Securing Internet-of-Things systems through implicit and explicit reputation models. IEEE Access 6, 47472–47488 (2018)

    Article  Google Scholar 

  11. Yu, F., Li, L., Tang, Q., Cai, S., Song, Y., Xu, Q.: A survey on true random number generators based on chaos. Discrete Dyn. Nat. Soc. (2019)

    Google Scholar 

  12. Pérez-Jiménez, M., Sánchez, B.B., Migliorini, A., Alcarria, R.: Protecting private communications in cyber-physical systems through physical unclonable functions. Electronics 8(4), 390 (2019)

    Article  Google Scholar 

  13. Rontani, D., Choi, D., Chang, C.Y., Locquet, A., Citrin, D.S.: Compressive sensing with optical chaos. Sci. Rep. 6(1), 1–7 (2016)

    Article  Google Scholar 

  14. Kate, A., Goldberg, I.: Distributed private-key generators for identity-based cryptography. In: Garay, J.A., De Prisco, R. (eds.) Security and Cryptography for Networks. LNCS, vol. 6280, pp. 436–453. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15317-4_27

    Chapter  Google Scholar 

  15. Wariki, K., et al.: Malicious Private Key Generators in Identity-Based Authenticated Key Exchange (2022)

    Google Scholar 

  16. Wu, Y., Qiu, B.: Transforming a pattern identifier into biometric key generators. In: 2010 IEEE International Conference on Multimedia and Expo, pp. 78–82. IEEE, July 2010

    Google Scholar 

  17. Mohammed, N.Q., Hussein, Q.M., Sana, A.M., Khalil, L.A.: A hybrid approach to design key generator of cryptosystem. J. Comput. Theor. Nanosci. 16(3), 971–977 (2019)

    Article  Google Scholar 

  18. Kumar, T.M., Reddy, K.S., Rinaldi, S., Parameshachari, B.D., Arunachalam, K.: A low area high speed FPGA implementation of AES architecture for cryptography application. Electronics 10(16), 2023 (2021)

    Article  Google Scholar 

  19. Goswami, J., Paul, M.: Symmetric key cryptography using digital circuit based on one right shift. Rev. Comput. Eng. Stud. 4(2), 57–61 (2017)

    Google Scholar 

  20. Bordel, B., Alcarria, R., Sánchez-de-Rivera, D., Robles, T.: Protecting industry 4.0 systems against the malicious effects of cyber-physical attacks. In: Ochoa, S.F., Singh, P., Bravo, J. (eds.) Ubiquitous computing and ambient intelligence. LNCS, vol. 10586, pp. 161–171. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67585-5_17

    Chapter  Google Scholar 

  21. Gao, Y., Al-Sarawi, S.F., Abbott, D.: Physical unclonable functions. Nat. Electron. 3(2), 81–91 (2020)

    Article  Google Scholar 

  22. Zerrouki, F., Ouchani, S., Bouarfa, H.: A low-cost authentication protocol using Arbiter-PUF. In: Attiogbé, C., Ben Yahia, S. (eds.) Model and Data Engineering. LNCS, vol. 12732, pp. 101–116. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-78428-7_9

    Chapter  Google Scholar 

  23. Chen, B., Ignatenko, T., Willems, F.M., Maes, R., van der Sluis, E., Selimis, G.: A robust SRAM-PUF key generation scheme based on polar codes. In: GLOBECOM 2017–2017 IEEE Global Communications Conference, pp. 1–6. IEEE, December 2017

    Google Scholar 

  24. Gao, Y., Su, Y., Yang, W., Chen, S., Nepal, S., Ranasinghe, D.C.: Building secure SRAM PUF key generators on resource constrained devices. In: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 912–917. IEEE, March 2019

    Google Scholar 

  25. Delvaux, J., Verbauwhede, I.: Attacking PUF-based pattern matching key generators via helper data manipulation. In: Benaloh, J. (ed.) Topics in Cryptology – CT-RSA 2014. LNCS, vol. 8366, pp. 106–131. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04852-9_6

    Chapter  Google Scholar 

  26. Abd EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Phys. A Stat. Mech. Appl. 547, 123869 (2020)

    Google Scholar 

  27. Ayubi, P., Setayeshi, S., Rahmani, A.M.: Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application. J. Inf. Secur. Appl. 52, 102472 (2020)

    Google Scholar 

  28. Sahari, M.L., Boukemara, I.: A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption. Nonlinear Dyn. 94(1), 723–744 (2018)

    Article  Google Scholar 

  29. Cang, S., Kang, Z., Wang, Z.: Pseudo-random number generator based on a generalized conservative Sprott-A system. Nonlinear Dyn. 104(1), 827–844 (2021)

    Article  Google Scholar 

  30. Mareca, P., Bordel, B.: Robust hardware-supported chaotic cryptosystems for streaming commutations among reduced computing power nodes. Analog Integr. Circ. Sig. Process 98(1), 11–26 (2019)

    Article  Google Scholar 

  31. Karunamurthi, S., Natarajan, V.K.: VLSI implementation of reversible logic gates cryptography with LFSR key. Microprocess. Microsyst. 69, 68–78 (2019)

    Article  Google Scholar 

  32. Raffaelli, F., Sibson, P., Kennard, J.E., Mahler, D.H., Thompson, M.G., Matthews, J.C.: Generation of random numbers by measuring phase fluctuations from a laser diode with a silicon-on-insulator chip. Opt. Express 26(16), 19730–19741 (2018)

    Article  Google Scholar 

  33. Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) Wireless Sensor Networks. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-77690-1_19

    Chapter  Google Scholar 

Download references

Acknowledgments

The research leading to these results has received funding from the Ministry of Science, Innovation and Universities through the COGNOS project. (PID2019-105484RB-I00).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Borja Bordel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bordel, B., Alcarria, R., Robles, T. (2024). A Federated Algorithm for the Lightweight Generation of High-Entropy Keys in Distributed Computing Systems. In: Rocha, A., Adeli, H., Dzemyda, G., Moreira, F., Colla, V. (eds) Information Systems and Technologies. WorldCIST 2023. Lecture Notes in Networks and Systems, vol 801. Springer, Cham. https://doi.org/10.1007/978-3-031-45648-0_9

Download citation

Publish with us

Policies and ethics