Design of Effective Seeker Optimized Quantum Lightweight Cryptography Using Hybrid Redundant Quantum Key Distribution

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 12
Year of Publication : 2024
Authors : K.U.V. Padma, E. Neelima
pdf
How to Cite?

K.U.V. Padma, E. Neelima, "Design of Effective Seeker Optimized Quantum Lightweight Cryptography Using Hybrid Redundant Quantum Key Distribution," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 12, pp. 171-188, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I12P117

Abstract:

Ultra Lightweight Cryptography (ULWC) is a critical field of research with a primary focus on developing cryptographic algorithms tailored for resource-constrained devices and applications. The challenge in such environments is to ensure robust security and efficient performance, as conventional security protocols often fail to meet these dual objectives. To address these issues, this work explores a hybrid approach, specifically Optimized Quantum Lightweight Cryptography (OQLC), which guarantees secure data transmission and protection in resource-constrained settings. The heart of OQLC lies in the fusion of the ULWC-based Efficient Randomized-Grain (ERG)-128 algorithm and the Redundant Quantum Key Distribution (RQKD-QC) framework. An Effective Seeker Optimization (ESO) technique is employed to maximise the performance of these two algorithms. ESO harnesses the inherent parallelism and adaptability of natural seekers to optimize various parameters of the OQLC algorithm, including key scheduling, round functions, and other cryptographic primitives. Integrating ESO with the hybrid ERG-128 and RQKD-QC algorithm enhances the overall performance and efficiency of the cryptographic system. This equilibrium balances lightweight implementation, post-quantum security, and improved performance, thereby addressing the unique demands of resource-constrained environments. In a comparative analysis of encryption and decryption times, the proposed OQLC method demonstrates impressive efficiency. It accomplishes encryption in a mere 0.00101 seconds, while decryption is achieved in a mere 0.00023 seconds.

Keywords:

Effective seeker optimization, Quantum cryptography, Redundant quantum key distribution, Ultra lightweight cryptography, Optimized quantum lightweight cryptography.

References:

[1] Rana Abbas Al-Kaabi, and Alharith A. Abdullah, “A Survey: Medical Health Record Data Security Based on Interplanetary File System and Blockchain Technologies,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 1, pp. 586-597, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Jan Carlo T. Arroyo et al., “An Enhanced Playfair Algorithm with Dynamic Matrix Using the Novel Multidimensional Element-in-Grid Sequencer (MEGS),” International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 132-139, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Neha Sharma, Chinmay Chakraborty, and Rajeev Kumar, “Optimized Multimedia Data through Computationally Intelligent Algorithms,” Multimedia Systems, vol. 29, no. 5, pp. 2961-2977, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Nasir N. Hurrah, Ekram Khan, and Uzma Khan, “CADEN: Cellular Automata and DNA Based Secure Framework for Privacy Preserving in IoT Based Healthcare,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 3, pp. 2631-2643, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Joseph B. Awotunde et al., “An IoMT-Based Steganography Model for Securing Medical Information,” International Journal of Healthcare Technology and Management, vol. 19, no. 3-4, pp. 218-236, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Swetha Pesaru, Naresh K. Mallenahalli, and B. Vishnu Vardhan, “Light Weight Cryptography-Based Data Hiding System for Internet of Medical Things,” International Journal of Healthcare Management, pp. 1-14, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Zied Guitouni, Mohammed Ali Ghaieb, and Mohsen Machhout, “Security Analysis of Medical Image Encryption Using AES Modes for IoMT Systems,” International Journal of Computer Applications, vol. 185, no. 2, pp. 15-21, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Wadood Abdul, “Security of Medical Images Over Insecure Communication Channels Using Zero-Steganography,” International Journal of Distributed Sensor Networks, vol. 18, no. 2, pp. 1-10, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Suyel Namasudra, “A Secure Cryptosystem Using DNA Cryptography and DNA Steganography for the Cloud Based IoT Infrastructure,” Computers and Electrical Engineering, vol. 104, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Oluwakemi Christiana Abikoye et al., “Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme,” Future Internet, vol. 15, no. 3, pp. 1-33, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Wajih El Hadj Youssef et al., “An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security,” Security and Communication Networks, vol. 2022, no. 1, pp. 1-17, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Chengjian Liu et al., “Ensuring the Security and Performance of IoT Communication by Improving Encryption and Decryption with the Lightweight Cipher uBlock,” IEEE Systems Journal, vol. 16, no. 4, pp. 5489-5500, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] V. Panchami, and Mahima Mary Mathews, “A Substitution Box for Lightweight Ciphers to Secure Internet of Things,” Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 4, pp. 75-89, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mohammed El-hajj, Hussien Mousawi, and Ahmad Fadlallah, “Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform,” Future Internet, vol. 15, no. 2, pp. 1-29, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] P. Prakasam et al., “Low Latency, Area and Optimal Power Hybrid Lightweight Cryptography Authentication Scheme for Internet of Things Applications,” Wireless Personal Communications, vol. 126, no. 1, pp. 351-365, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Susila Windarta et al., “Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions,” IEEE Access, vol. 10, pp. 82272-82294, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Agus Winarno, and Riri Fitri Sari, “A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher,” Applied Sciences, vol. 12, no. 17, pp. 1-19, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Suhair Alshehri, and Omaimah Bamasag, “AAC-IoT: Attribute Access Control Scheme for IoT Using Lightweight Cryptography and Hyperledger Fabric Blockchain,” Applied Sciences, vol. 12, no. 16, pp. 1-20, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Rizki Agus Zandra Kurniawan, Sri Wahjuni, and Shelvie Nidya Neyman, “Secure Communication Protocol for Arduino-Based IoT Using Lightweight Cryptography,” International Journal on Advanced Science, Engineering and Information Technology, vol. 12, no. 2, pp. 453-459, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Mounika Jammula, Venkata Mani Vakamulla, and Sai Krishna Kondoju, “Hybrid Lightweight Cryptography with Attribute-Based Encryption Standard for Secure and Scalable IoT System,” Connection Science, vol. 34, no. 1, pp. 2431-2447, 2022. [CrossRef] [Google Scholar] [Publisher Link]
[21] Soline Blanc et al., “Benchmarking of Lightweight Cryptographic Algorithms for Wireless IoT Networks,” Wireless Networks, vol. 28, no. 8, pp. 3453-3476, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Kyriaki Tsantikidou, and Nicolas Sklavos, “Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare,” Cryptography, vol. 6, no. 3, pp. 1-13, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Israa Ezzat Salem, Haider Rasheed Abdulshaheed, and Hassan Muwafaq Gheni, “A Secure Telemedicine Electronic Platform Based on Lightweight Cryptographic Approach,” Telecommunication Computing Electronics and Control, vol. 20, no. 5, pp. 988-995, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Tarun Kumar Goyal, Vineet Sahula, and Deepak Kumawat, “Energy Efficient Lightweight Cryptography Algorithms for IoT Devices,” IETE Journal of Research, vol. 68, no. 3, pp. 1722-1735, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Adel A. Ahmed, and Omar M. Barukab, “Unforgeable Digital Signature Integrated into Lightweight Encryption Based on Effective ECDH for Cybersecurity Mechanism in Internet of Things,” Processes, vol. 10, no. 12, pp. 1-27, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Hakeem Imad Mhaibes, May Hattim Abood, and Alaa Kadhim Farhan, “Simple Lightweight Cryptographic Algorithm to Secure Imbedded IoT Devices,” International Journal of Interactive Mobile Technologies, vol. 16, no. 20, pp. 98-113, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Nari Im, Soyeon Choi, and Hoyoung Yoo, “S-Box Attack Using FPGA Reverse Engineering for Lightweight Cryptography,” IEEE Internet of Things Journal, vol. 9, no. 24, pp. 25165-25180, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Hussein M. Mohammad, and Alharith A. Abdullah, “Enhancement Process of AES: A Lightweight Cryptography Algorithm-AES for Constrained Devices,” Telecommunication Computing Electronics and Control, vol. 20, no. 3, pp. 551-560, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Ana Goulart et al., “On Wide-Area IoT Networks, Lightweight Security and Their Applications-A Practical Review,” Electronics, vol. 11, no. 11, pp. 1-40, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Shubham Gupta, and Sandeep Saxena, Lightweight Cryptographic Techniques and Protocols for IoT, Internet of Things, pp. 55-77, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Hemant Mahajan, and K.T.V. Reddy, “Secure Gene Profile Data Processing Using Lightweight Cryptography and Blockchain,” Cluster Computing, vol. 27, no. 3, pp. 2785-2803, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Mohammed El-Hajj, Hussien Mousawi, and Ahmad Fadlallah, “Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform,” Future Internet, vol. 15, no. 2, pp. 1-29, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Vishal A. Thakor et al., “A Novel 5-Bit S-Box Design for Lightweight Cryptography Algorithms,” Journal of Information Security and Applications, vol. 73, pp. 1-11, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Jonas Gava et al., “Assessment of Radiation-Induced Soft Errors on Lightweight Cryptography Algorithms Running on a Resource-Constrained Device,” IEEE Transactions on Nuclear Science, vol. 70, no. 8, pp. 1805-1813, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Issam W. Damaj, Hadi Al-Mubasher, and Mahmoud Saadeh, “An Extended Analytical Framework for Heterogeneous Implementations of Light Cryptographic Algorithms,” Future Generation Computer Systems, vol. 141, pp. 154-172, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Jizheng Xue et al., “Side-Channel Attack of Lightweight Cryptography Based on MixColumn: Case Study of PRINCE,” Electronics, vol. 12, no. 3, pp. 1-21, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Navdeep Lata, and Raman Kumar, “DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IOT Communication,” International Journal of Image and Graphics, vol. 23, no. 4, pp. 1-22, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Nahla Ibrahim, and Johnson Agbinya, “Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices,” Applied Sciences, vol. 13, no. 7, pp. 1-17, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Gamil R.S. Qaid, and Nadhem Sultan Ebrahim, “A Lightweight Cryptographic Algorithm Based on DNA Computing for IoT Devices,” Security and Communication Networks, vol. 2023, no. 1, pp. 1-12, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Muntaser Al-Moselly, and Ali Al-Haj, “High-Performance Hardware Implementation of the KATAN Lightweight Cryptographic Cipher,” Journal of Circuits, Systems and Computers, vol. 32, no. 1, 2023.
[CrossRef] [Google Scholar] [Publisher Link]