Matrix Encryption Walks for Lightweight Cryptography

IF 1.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Cryptography Pub Date : 2023-08-16 DOI:10.3390/cryptography7030041
Aeryn Dunmore, Juliet Samandari, Julian Jang-Jaccard
{"title":"Matrix Encryption Walks for Lightweight Cryptography","authors":"Aeryn Dunmore, Juliet Samandari, Julian Jang-Jaccard","doi":"10.3390/cryptography7030041","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer example Key Matrices and show the efficiency of the proposed method, which operates in linear complexity with an extremely large key space and low-resource requirements. We also provide the Proof of Concept code for the encryption algorithm and a detailed analysis of the security of our proposed MEW. The MEW algorithm is designed for low-resource environments such as IoT or smart devices and is therefore intended to be simple in operation. The encryption, decryption, and key generation time, along with the bytes required to store the key, are all discussed, and similar proposed algorithms are examined and compared. We further discuss the avalanche effect, key space, frequency analysis, Shannon entropy, and chosen/known plaintext-ciphertext attacks, and how MEW remains robust against these attacks. We have also discussed the potential for future research into algorithms such as MEW, which make use of alternative structures and graphic methods for improving encryption models.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.8000,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/cryptography7030041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 1

Abstract

In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer example Key Matrices and show the efficiency of the proposed method, which operates in linear complexity with an extremely large key space and low-resource requirements. We also provide the Proof of Concept code for the encryption algorithm and a detailed analysis of the security of our proposed MEW. The MEW algorithm is designed for low-resource environments such as IoT or smart devices and is therefore intended to be simple in operation. The encryption, decryption, and key generation time, along with the bytes required to store the key, are all discussed, and similar proposed algorithms are examined and compared. We further discuss the avalanche effect, key space, frequency analysis, Shannon entropy, and chosen/known plaintext-ciphertext attacks, and how MEW remains robust against these attacks. We have also discussed the potential for future research into algorithms such as MEW, which make use of alternative structures and graphic methods for improving encryption models.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
轻量级密码学的矩阵加密漫游
在本文中,我们提出了一种新的基于图遍历和二维矩阵的对称流密码加密算法,称为矩阵加密遍历(MEW)。我们提供了一个密钥矩阵的例子,并展示了所提出的方法的有效性,该方法在线性复杂度下运行,具有非常大的密钥空间和较低的资源需求。我们还提供了加密算法的概念验证代码,并对我们提出的MEW的安全性进行了详细分析。MEW算法是为物联网或智能设备等低资源环境设计的,因此操作简单。对加密、解密和密钥生成时间,以及存储密钥所需的字节进行了讨论,并对类似的算法进行了检查和比较。我们进一步讨论了雪崩效应、密钥空间、频率分析、香农熵和选择/已知明文密文攻击,以及MEW如何保持对这些攻击的鲁棒性。我们还讨论了未来研究MEW等算法的潜力,这些算法利用替代结构和图形方法来改进加密模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Cryptography
Cryptography Mathematics-Applied Mathematics
CiteScore
3.80
自引率
6.20%
发文量
53
审稿时长
11 weeks
期刊最新文献
Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles Improve Parallel Resistance of Hashcash Tree Public Key Protocols from Twisted-Skew Group Rings
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1