Skip to main content

Abstract

The number of portable digital devices is escalating day by day with the advancement of technology. As the number of digital devices users is expanding, the security concer for the privacy of their shared information is also thriving. Cyber criminals wait for the opportunities to steal and tamper with the secret information shared by the users. To protect the cyber world from these criminals by ensuring the secured communication channel between users in an affordable cost is now a big challenge for researchers. Considering these concerns, the target of this research is to develop an encryption algorithm for portable devices which will be less costly and energy proficient. For that purpose, a low-cost energy efficient algorithm has been proposed which needs two private keys of sender and receiver and one global public key. A shared symmetric key is generated by mixing those keys in both sender and receiver sides. For different sets of public and private keys, the generated shared symmetric key is dissimilar. This symmetric key can be used for encrypting the plain text and decrypting the cipher text. Lastly, a performance analysis has been performed which shows that the algorithm is resilient against the brute force attack and takes less computational time to execute in comparison with the existing Diffie–Hellman Algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kuppuswamy P, Shanmugasundaram JR (2020) A novel approach of designing e-commerce authentication scheme using hybrid cryptography based on simple symmetric key and extended linear block cipher algorithm, pp 1–6. https://doi.org/10.1109/ICCIT-144147971.2020.9213815

  2. Ali S, Ashraf H, Khan I, Saqlain S, Ghani A, Jalil Z, Ramzan MS, Alzahrani B (2020) An efficient cryptographic technique using modified Diffie-Hellman in wireless sensor network. Int J Distrib Sens Netw 16:1–24. https://doi.org/10.1177/1550147720925772

  3. Amalarethinam G, Leena H (2018) A comparative study on various symmetric key algorithms for enhancing data security in cloud environment. Int J Pure Appl Math 85–94

    Google Scholar 

  4. Biswas M et al (2021) Accu3rate: a mobile health application rating scale based on user reviews. PloS One 16(12):e0258050

    Article  Google Scholar 

  5. Chiang WK, Chen JH (2011) Tw-keap: an efficient four-party key exchange protocol for end-to-end communications. In: Proceedings of the 4th international conference on security of information and networks, pp 167–174. SIN ’11, Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/2070425.2070452

  6. Chunka C, Goswami R, Banerjee S (2019) A novel approach to generate symmetric key in cryptography using genetic algorithm (GA): proceedings of IEMIS 2018, vol 1, pp. 713–724. https://doi.org/10.1007/978-981-13-1951-8_64

  7. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654. https://doi.org/10.1109/TIT.1976.1055638

    Article  MathSciNet  MATH  Google Scholar 

  8. Esha NH et al (2021) Trust IoHt: a trust management model for internet of healthcare things. In: Proceedings of the ICDSA, pp 47–57

    Google Scholar 

  9. Farhin F, Kaiser MS, Mahmud M (2020) Towards secured service provisioning for the internet of healthcare things. In: Proceedings of the AICT, pp 1–6

    Google Scholar 

  10. Farhin F, Kaiser MS, Mahmud M (2021) Secured smart healthcare system: blockchain and Bayesian inference based approach. In: Proceedings of the TCCE, pp 455–465 (2021)

    Google Scholar 

  11. Farhin F, Sultana I, Islam N, Kaiser MS, Rahman MS, Mahmud M (2020) Attack detection in internet of things using software defined network and fuzzy neural network. In: Proceedings of the ICIEV and icIVPR, pp 1–6

    Google Scholar 

  12. Geetha R, Padmavathy T, Thilagam T, Lallithasree A (2020) Tamilian cryptography: an efficient hybrid symmetric key encryption algorithm. Wireless Personal Commun 112(1):21–36

    Google Scholar 

  13. González-Manzano L, de Fuentes JM, Peris-Lopez P, Camara C (2017) Encryption by heart (EBH)-using ECG for time-invariant symmetric key generation. Future Gener Comput Syst 77:136–148. https://doi.org/10.1016/j.future.2017.07.018

  14. Kaiser MS et al (2021) 6g access network for intelligent internet of healthcare things: opportunity, challenges, and research directions. In: Proceedings of the TCCE, pp 317–328

    Google Scholar 

  15. Kako N, Sadeeq H, Abrahim A (2020) New symmetric key cipher capable of digraph to single letter conversion utilizing binary system. Indonesian J Electr Eng Comput Sci 18:1028. https://doi.org/10.11591/ijeecs.v18.i2.pp1028-1034

  16. Keserwani P, Govil M (2020) A hybrid symmetric key cryptography method to provide secure data transmission, pp 461–474. https://doi.org/10.1007/978-981-15-6318-8_38

  17. Kumari P, Anjali T (2018) Symmetric-key generation protocol (sgenp) for body sensor network. In: 2018 IEEE international conference on communications workshops (ICC workshops), pp 1–6. https://doi.org/10.1109/ICCW.2018.8403548

  18. Li C, Lin D, Lü J, Hao F (2018) Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multi Media 25(4):46–56. https://doi.org/10.1109/MMUL.2018.2873472

    Article  Google Scholar 

  19. Li Z, Wang H, Fang H (2017) Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet Things J 4(6):1955–1963. https://doi.org/10.1109/JIOT.2017.2761700

    Article  Google Scholar 

  20. Purohit K, Kumar A, Upadhyay M, Kumar K (2020) Symmetric key generation and distribution using Diffie-Hellman algorithm, pp 135–141. https://doi.org/10.1007/978-981-15-4032-5_14

  21. Rajesh S, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11(2). https://doi.org/10.3390/sym11020293

  22. Sahin C, Katz B, Dandekar KR (2016) Secure and robust symmetric key generation using physical layer techniques under various wireless environments. In: 2016 IEEE radio and wireless symposium (RWS), pp 211–214. https://doi.org/10.1109/RWS.2016.7444407

  23. Sarkar A, Singh BK (2018) Cryptographic key generation from cancelable fingerprint templates. In: 2018 4th international conference on recent advances in information technology (RAIT), pp 1–6. https://doi.org/10.1109/RAIT.2018.8389007

  24. Sindhuja K, Devi SP (2014) A symmetric key encryption technique using genetic algorithm. Int J Comput Sci Inform Technol 5(1):414–416

    Google Scholar 

  25. Vyakaranal S, Kengond S (2018) Performance analysis of symmetric key cryptographic algorithms. In: 2018 international conference on communication and signal processing (ICCSP), pp 0411–0415. https://doi.org/10.1109/ICCSP.2018.8524373

  26. Yuki T, Rajopadhye S (2013) Folklore confirmed: compiling for speed: compiling for energy. In: International workshop on languages and compilers for parallel computing. Springer, pp 169–184

    Google Scholar 

  27. Zaman S et al (2021) Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey. IEEE Access 9:94668–94690

    Article  Google Scholar 

  28. Zhang X, Wang X (2018) Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access 6:70025–70034. https://doi.org/10.1109/ACCESS.2018.2879844

    Article  Google Scholar 

Download references

Acknowledgements

This is to acknowledge that, Information and Communication Tecnology (ICT) Division, Government of the People’s Republic of Bangladesh has awarded masters fellowship for this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abrar Fahim Alam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alam, A.F., Kaiser, M.S. (2023). Low-Cost Energy Efficient Encryption Algorithm for Portable Device. In: Kaiser, M.S., Waheed, S., Bandyopadhyay, A., Mahmud, M., Ray, K. (eds) Proceedings of the Fourth International Conference on Trends in Computational and Cognitive Engineering. Lecture Notes in Networks and Systems, vol 618. Springer, Singapore. https://doi.org/10.1007/978-981-19-9483-8_30

Download citation

Publish with us

Policies and ethics