Abstract
The number of portable digital devices is escalating day by day with the advancement of technology. As the number of digital devices users is expanding, the security concer for the privacy of their shared information is also thriving. Cyber criminals wait for the opportunities to steal and tamper with the secret information shared by the users. To protect the cyber world from these criminals by ensuring the secured communication channel between users in an affordable cost is now a big challenge for researchers. Considering these concerns, the target of this research is to develop an encryption algorithm for portable devices which will be less costly and energy proficient. For that purpose, a low-cost energy efficient algorithm has been proposed which needs two private keys of sender and receiver and one global public key. A shared symmetric key is generated by mixing those keys in both sender and receiver sides. For different sets of public and private keys, the generated shared symmetric key is dissimilar. This symmetric key can be used for encrypting the plain text and decrypting the cipher text. Lastly, a performance analysis has been performed which shows that the algorithm is resilient against the brute force attack and takes less computational time to execute in comparison with the existing Diffie–Hellman Algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kuppuswamy P, Shanmugasundaram JR (2020) A novel approach of designing e-commerce authentication scheme using hybrid cryptography based on simple symmetric key and extended linear block cipher algorithm, pp 1–6. https://doi.org/10.1109/ICCIT-144147971.2020.9213815
Ali S, Ashraf H, Khan I, Saqlain S, Ghani A, Jalil Z, Ramzan MS, Alzahrani B (2020) An efficient cryptographic technique using modified Diffie-Hellman in wireless sensor network. Int J Distrib Sens Netw 16:1–24. https://doi.org/10.1177/1550147720925772
Amalarethinam G, Leena H (2018) A comparative study on various symmetric key algorithms for enhancing data security in cloud environment. Int J Pure Appl Math 85–94
Biswas M et al (2021) Accu3rate: a mobile health application rating scale based on user reviews. PloS One 16(12):e0258050
Chiang WK, Chen JH (2011) Tw-keap: an efficient four-party key exchange protocol for end-to-end communications. In: Proceedings of the 4th international conference on security of information and networks, pp 167–174. SIN ’11, Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/2070425.2070452
Chunka C, Goswami R, Banerjee S (2019) A novel approach to generate symmetric key in cryptography using genetic algorithm (GA): proceedings of IEMIS 2018, vol 1, pp. 713–724. https://doi.org/10.1007/978-981-13-1951-8_64
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654. https://doi.org/10.1109/TIT.1976.1055638
Esha NH et al (2021) Trust IoHt: a trust management model for internet of healthcare things. In: Proceedings of the ICDSA, pp 47–57
Farhin F, Kaiser MS, Mahmud M (2020) Towards secured service provisioning for the internet of healthcare things. In: Proceedings of the AICT, pp 1–6
Farhin F, Kaiser MS, Mahmud M (2021) Secured smart healthcare system: blockchain and Bayesian inference based approach. In: Proceedings of the TCCE, pp 455–465 (2021)
Farhin F, Sultana I, Islam N, Kaiser MS, Rahman MS, Mahmud M (2020) Attack detection in internet of things using software defined network and fuzzy neural network. In: Proceedings of the ICIEV and icIVPR, pp 1–6
Geetha R, Padmavathy T, Thilagam T, Lallithasree A (2020) Tamilian cryptography: an efficient hybrid symmetric key encryption algorithm. Wireless Personal Commun 112(1):21–36
González-Manzano L, de Fuentes JM, Peris-Lopez P, Camara C (2017) Encryption by heart (EBH)-using ECG for time-invariant symmetric key generation. Future Gener Comput Syst 77:136–148. https://doi.org/10.1016/j.future.2017.07.018
Kaiser MS et al (2021) 6g access network for intelligent internet of healthcare things: opportunity, challenges, and research directions. In: Proceedings of the TCCE, pp 317–328
Kako N, Sadeeq H, Abrahim A (2020) New symmetric key cipher capable of digraph to single letter conversion utilizing binary system. Indonesian J Electr Eng Comput Sci 18:1028. https://doi.org/10.11591/ijeecs.v18.i2.pp1028-1034
Keserwani P, Govil M (2020) A hybrid symmetric key cryptography method to provide secure data transmission, pp 461–474. https://doi.org/10.1007/978-981-15-6318-8_38
Kumari P, Anjali T (2018) Symmetric-key generation protocol (sgenp) for body sensor network. In: 2018 IEEE international conference on communications workshops (ICC workshops), pp 1–6. https://doi.org/10.1109/ICCW.2018.8403548
Li C, Lin D, Lü J, Hao F (2018) Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multi Media 25(4):46–56. https://doi.org/10.1109/MMUL.2018.2873472
Li Z, Wang H, Fang H (2017) Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet Things J 4(6):1955–1963. https://doi.org/10.1109/JIOT.2017.2761700
Purohit K, Kumar A, Upadhyay M, Kumar K (2020) Symmetric key generation and distribution using Diffie-Hellman algorithm, pp 135–141. https://doi.org/10.1007/978-981-15-4032-5_14
Rajesh S, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11(2). https://doi.org/10.3390/sym11020293
Sahin C, Katz B, Dandekar KR (2016) Secure and robust symmetric key generation using physical layer techniques under various wireless environments. In: 2016 IEEE radio and wireless symposium (RWS), pp 211–214. https://doi.org/10.1109/RWS.2016.7444407
Sarkar A, Singh BK (2018) Cryptographic key generation from cancelable fingerprint templates. In: 2018 4th international conference on recent advances in information technology (RAIT), pp 1–6. https://doi.org/10.1109/RAIT.2018.8389007
Sindhuja K, Devi SP (2014) A symmetric key encryption technique using genetic algorithm. Int J Comput Sci Inform Technol 5(1):414–416
Vyakaranal S, Kengond S (2018) Performance analysis of symmetric key cryptographic algorithms. In: 2018 international conference on communication and signal processing (ICCSP), pp 0411–0415. https://doi.org/10.1109/ICCSP.2018.8524373
Yuki T, Rajopadhye S (2013) Folklore confirmed: compiling for speed: compiling for energy. In: International workshop on languages and compilers for parallel computing. Springer, pp 169–184
Zaman S et al (2021) Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey. IEEE Access 9:94668–94690
Zhang X, Wang X (2018) Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access 6:70025–70034. https://doi.org/10.1109/ACCESS.2018.2879844
Acknowledgements
This is to acknowledge that, Information and Communication Tecnology (ICT) Division, Government of the People’s Republic of Bangladesh has awarded masters fellowship for this research work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Alam, A.F., Kaiser, M.S. (2023). Low-Cost Energy Efficient Encryption Algorithm for Portable Device. In: Kaiser, M.S., Waheed, S., Bandyopadhyay, A., Mahmud, M., Ray, K. (eds) Proceedings of the Fourth International Conference on Trends in Computational and Cognitive Engineering. Lecture Notes in Networks and Systems, vol 618. Springer, Singapore. https://doi.org/10.1007/978-981-19-9483-8_30
Download citation
DOI: https://doi.org/10.1007/978-981-19-9483-8_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9482-1
Online ISBN: 978-981-19-9483-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)