Design and implementation of a customized encryption algorithm for authentication and secure communication between devices

Bhavana Daddala, Hong Wang, A. Javaid
{"title":"Design and implementation of a customized encryption algorithm for authentication and secure communication between devices","authors":"Bhavana Daddala, Hong Wang, A. Javaid","doi":"10.1109/NAECON.2017.8268781","DOIUrl":null,"url":null,"abstract":"In the current world, encryption plays a significant role in securing relevant information from attackers. The applications of such protocols fall under numerous categories ranging from internet banking to Internet of Things (IoT). Many standards and developed encryption protocols are available as resources and are used based on the requirements. If the attacker has access to shared keys between devices, it doesn't take long to decrypt the information by using any of the standard encryption algorithms. Therefore, there is a necessity to build strong and complex encryption algorithms. In this paper, we propose a customized encryption algorithm and an authentication scheme to safely transfer information. This algorithm is a variation of Advanced Encryption Standard (AES) and devises a new protocol for key establishment. The implementation of communication protocol between two devices, with a prospect of working with multiple devices using a centralized server is presented. The outcome is to establish a different approach towards encryption and enhance security by providing protection against Man-in-the-Middle attacks. The customized algorithms are implemented using Python.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.2017.8268781","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

In the current world, encryption plays a significant role in securing relevant information from attackers. The applications of such protocols fall under numerous categories ranging from internet banking to Internet of Things (IoT). Many standards and developed encryption protocols are available as resources and are used based on the requirements. If the attacker has access to shared keys between devices, it doesn't take long to decrypt the information by using any of the standard encryption algorithms. Therefore, there is a necessity to build strong and complex encryption algorithms. In this paper, we propose a customized encryption algorithm and an authentication scheme to safely transfer information. This algorithm is a variation of Advanced Encryption Standard (AES) and devises a new protocol for key establishment. The implementation of communication protocol between two devices, with a prospect of working with multiple devices using a centralized server is presented. The outcome is to establish a different approach towards encryption and enhance security by providing protection against Man-in-the-Middle attacks. The customized algorithms are implemented using Python.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
设计和实现一种自定义的加密算法,用于设备之间的认证和安全通信
在当今世界,加密在保护相关信息不受攻击者攻击方面发挥着重要作用。这些协议的应用分为从网上银行到物联网(IoT)的许多类别。许多标准和开发的加密协议都可以作为资源使用,并根据需求进行使用。如果攻击者可以访问设备之间的共享密钥,那么使用任何标准加密算法都不会花很长时间来解密信息。因此,有必要构建强大而复杂的加密算法。在本文中,我们提出了一种定制的加密算法和认证方案来安全传输信息。该算法是对高级加密标准AES (Advanced Encryption Standard)的改进,设计了一种新的密钥建立协议。介绍了两台设备间通信协议的实现,并展望了使用集中式服务器与多台设备协同工作的前景。其结果是建立一种不同的加密方法,并通过提供针对中间人攻击的保护来增强安全性。自定义算法是使用Python实现的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design and analysis of wafer-level vacuum-encapsulated disk resonator gyroscope using a commercial MEMS process Visible but transparent hardware Trojans in clock generation circuits Memristor crossbar based implementation of a multilayer perceptron Design of tunable shunt and series interdigital capacitors based on vanadium dioxide thin film A novel hybrid delay based physical unclonable function immune to machine learning attacks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1