- Title
- RBFK cipher : a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment
- Creator
- Rana, Sohel; Mondal, Mondal; Kamruzzaman, Joarder
- Date
- 2023
- Type
- Text; Journal article
- Identifier
- http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/199469
- Identifier
- vital:19222
- Identifier
-
https://doi.org/10.1186/s42400-022-00136-7
- Identifier
- ISSN:2096-4862 (ISSN)
- Abstract
- Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data processing is handled by the edge server, sensitive data is generated and stored by the IoT devices, which are subject to attack. Since most IoT devices have limited resources, standard security algorithms such as AES, DES, and RSA hamper their ability to run properly. In this paper, a lightweight symmetric key cipher termed randomized butterfly architecture of fast Fourier transform for key (RBFK) cipher is proposed for resource-constrained IoT devices in the edge computing environment. The butterfly architecture is used in the key scheduling system to produce strong round keys for five rounds of the encryption method. The RBFK cipher has two key sizes: 64 and 128 bits, with a block size of 64 bits. The RBFK ciphers have a larger avalanche effect due to the butterfly architecture ensuring strong security. The proposed cipher satisfies the Shannon characteristics of confusion and diffusion. The memory usage and execution cycle of the RBFK cipher are assessed using the fair evaluation of the lightweight cryptographic systems (FELICS) tool. The proposed ciphers were also implemented using MATLAB 2021a to test key sensitivity by analyzing the histogram, correlation graph, and entropy of encrypted and decrypted images. Since the RBFK ciphers with minimal computational complexity provide better security than recently proposed competing ciphers, these are suitable for IoT devices in an edge computing environment. © 2023, The Author(s).
- Publisher
- Springer Science and Business Media B.V.
- Relation
- Cybersecurity Vol. 6, no. 1 (2023), p.
- Rights
- All metadata describing materials held in, or linked to, the repository is freely available under a CC0 licence
- Rights
- http://creativecommons.org/licenses/by/4.0/
- Rights
- Copyright © 2023, The Author(s)
- Rights
- Open Access
- Subject
- 4604 Cybersecurity and privacy; Avalanche effects; Block ciphers; Butterfly architecture; Edge computing; FELICS; IoT; Lightweight cryptosystems; MATLAB
- Full Text
- Reviewed
- Funder
- Institute of Information and Communication Technology, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
- Hits: 75
- Visitors: 75
- Downloads: 2
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE1 | Published version | 3 MB | Adobe Acrobat PDF | View Details Download |