Skip to main content

A Secure Self-Encryption Scheme for Resource Limited Mobile Devices

  • Conference paper
  • First Online:
IT Convergence and Security 2012

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 215))

Abstract

Recently, IT and mobile technology are developed rapidly. Mobile devices such as a smartphone and tablet PC have become widely popular, and many people store their private information into the devices. However, the portability and mobility of devices take risks such as being lost or stolen. These devices are the one of main cause to leak the sensitive and confidential information. To protect the information leakage from devices, the encryption algorithm is required. The existing encryption algorithms take long delay time and heavy battery consumption in mobile devices with restricted resources. Previously, the Self-Encryption (SE) which is a lightweight encryption algorithm for mobile devices was proposed, which had critical weaknesses. This paper proposes a novel SE scheme with a random permutation and bit-flipping process. Our proposed scheme derives the keystream from the plaintext itself, but the statistical correlations are effectively removed from the novel randomization process. It gives a solution to overcome weaknesses of the original SE scheme and the complexity to make adversaries it difficult to launch a brute force attack, and satisfies a 0/1 uniformity of key and cipher stream, which is an important property of the secure stream cipher. Moreover, it is faster and more energy-efficient than other ciphers such as AES and RC4. The evaluation is performed by the Android platform. The delay time and the battery consumption are measured and analyzed, which show that the proposed scheme is secure and best suited to the mobile platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    If ∆ is too small, the security strength is weaken. Although higher ∆ means more strong security, computational overhead also increases. If \( \Updelta = 1 \), our self-encryption becomes equivalent to the one-time pad which provides unconditional secrecy [4].

  2. 2.

    P(\( {\mathbb{S}}_{m} \), s, j) can be implemented by random shuffling algorithms like Pisher-Yates [5] and Sattolo's [6] shuffle.

References

  1. Chen Y, Ku WS (2009) Self-encryption scheme for data security in mobile devices. In: IEEE consumer communication and networking conference (CCNC)

    Google Scholar 

  2. Gasti P, Chen Y (2010) Breaking and fixing the self-encryption scheme for data security in mobile devices. In: Proceedings of the 18th Euromicro conference on parallel, distributed and network-based processing (PDP)

    Google Scholar 

  3. 3GPP Std. TS33.220 v11.3.0 (2012) Generic authentication architecture (GAA); generic bootstrapping architecture (GBA)

    Google Scholar 

  4. Stallings W (2003) Cryptography and network security, 3 edn. Prentice Hall, Philadelphia, pp 43–44, 66–67, 192–194

    Google Scholar 

  5. Knuth DE (1998) The art of computer programming. Seminumerical algorithms, vol 2. Addison-Weseley

    Google Scholar 

  6. Wilson MC (2005) Overview of sattolo’s algorithm. Technical Report 5542, INRIA

    Google Scholar 

  7. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  MathSciNet  MATH  Google Scholar 

  8. Katz J, Lindell Y (2007) Introduction to modern cryptography. Chapman and Hall/CRC, Boca Raton

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MEST). (No. 2012-0005390).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyunsoo Yoon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Shin, Y., Shin, S., Kim, M., Yoon, H. (2013). A Secure Self-Encryption Scheme for Resource Limited Mobile Devices. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5860-5_15

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5859-9

  • Online ISBN: 978-94-007-5860-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics