{"title":"Dynamic S-boxes generation for IoT security enhancement: A genetic algorithm approach","authors":"Amina Msolli, Imen Hagui, Abdelhamid Helali","doi":"10.1016/j.asej.2024.103049","DOIUrl":null,"url":null,"abstract":"<div><div>We are witnessing an explosion in the concept of the Internet of Things (IoT) as smart objects become more important in our daily lives to make it easier to achieve our goals. It is obvious that the application areas of IoT are extremely diverse. Indeed, several sectors will be deeply impacted by IoT applications. Of which, security in the Internet of Things (IoT) has become a major concern due to increasing vulnerabilities and threats. Connected devices, often with limited security capabilities, have become attractive targets for attackers. Vulnerabilities in IoT devices, whether resulting from unmodified default configurations, lack of regular updates, or insecure communication protocols, expose these systems to potential risks. Cryptography, as a discipline dedicated to securing communications, uses advanced mathematical techniques to guarantee the confidentiality of electronic exchanges by making the data incomprehensible to unauthorized persons.</div><div>In this paper, we show an in-depth exploration of the generation of new S-boxes using the genetic algorithm. These new S-boxes are dynamically generated with the new genetic algorithm-based approach. This new method offers adaptive optimization, iteratively exploring the solution space to identify robust S-boxes, thereby strengthening the security of the encryption system. The study continues with the evaluation of these S-boxes through dedicated metrics, allowing an in-depth analysis of their performance in terms of resistance to cryptographic attacks and preservation of substitution properties. Finally, this evaluation extends to the incorporation of these newly generated S-boxes into the AES encryption algorithm, where different dimensions, such as cryptanalysis resistance, scene visibility, and other performance levels, will be examined.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103049"},"PeriodicalIF":6.0000,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ain Shams Engineering Journal","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2090447924004246","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
We are witnessing an explosion in the concept of the Internet of Things (IoT) as smart objects become more important in our daily lives to make it easier to achieve our goals. It is obvious that the application areas of IoT are extremely diverse. Indeed, several sectors will be deeply impacted by IoT applications. Of which, security in the Internet of Things (IoT) has become a major concern due to increasing vulnerabilities and threats. Connected devices, often with limited security capabilities, have become attractive targets for attackers. Vulnerabilities in IoT devices, whether resulting from unmodified default configurations, lack of regular updates, or insecure communication protocols, expose these systems to potential risks. Cryptography, as a discipline dedicated to securing communications, uses advanced mathematical techniques to guarantee the confidentiality of electronic exchanges by making the data incomprehensible to unauthorized persons.
In this paper, we show an in-depth exploration of the generation of new S-boxes using the genetic algorithm. These new S-boxes are dynamically generated with the new genetic algorithm-based approach. This new method offers adaptive optimization, iteratively exploring the solution space to identify robust S-boxes, thereby strengthening the security of the encryption system. The study continues with the evaluation of these S-boxes through dedicated metrics, allowing an in-depth analysis of their performance in terms of resistance to cryptographic attacks and preservation of substitution properties. Finally, this evaluation extends to the incorporation of these newly generated S-boxes into the AES encryption algorithm, where different dimensions, such as cryptanalysis resistance, scene visibility, and other performance levels, will be examined.
期刊介绍:
in Shams Engineering Journal is an international journal devoted to publication of peer reviewed original high-quality research papers and review papers in both traditional topics and those of emerging science and technology. Areas of both theoretical and fundamental interest as well as those concerning industrial applications, emerging instrumental techniques and those which have some practical application to an aspect of human endeavor, such as the preservation of the environment, health, waste disposal are welcome. The overall focus is on original and rigorous scientific research results which have generic significance.
Ain Shams Engineering Journal focuses upon aspects of mechanical engineering, electrical engineering, civil engineering, chemical engineering, petroleum engineering, environmental engineering, architectural and urban planning engineering. Papers in which knowledge from other disciplines is integrated with engineering are especially welcome like nanotechnology, material sciences, and computational methods as well as applied basic sciences: engineering mathematics, physics and chemistry.