Color Image Encryption Using Lightweight Cryptography and Genetic Algorithm for Secure Internet of Things
International Journal of Electrical and Electronics Engineering |
© 2024 by SSRG - IJEEE Journal |
Volume 11 Issue 7 |
Year of Publication : 2024 |
Authors : Manoja Kumar Nayak, Prasanta Kumar Swain |
How to Cite?
Manoja Kumar Nayak, Prasanta Kumar Swain, "Color Image Encryption Using Lightweight Cryptography and Genetic Algorithm for Secure Internet of Things," SSRG International Journal of Electrical and Electronics Engineering, vol. 11, no. 7, pp. 271-279, 2024. Crossref, https://doi.org/10.14445/23488379/IJEEE-V11I7P124
Abstract:
Image encryption based on a lightweight algorithm is an emerging area of research for the Internet of Things (IoT), where the ubiquity of sensors and intelligence of devices are key fields for maintaining communication. The development of an efficient, lightweight, and secure color image encryption technique becomes essential to maintain security in IoT communication. Existing image encryption techniques, such as RSA and AES, are complicated and with a higher number of rounds, making them computationally expensive and requiring large amounts of memory. Here, an efficient color image encryption algorithm based on a newly developed lightweight key generation procedure is suggested, which uses two major techniques: the genetic as well as the encryption-decryption algorithm. Here, an image is encrypted by applying (>) left shift or right shift and (+2) binary modulo 2 function, which performs bitwise. For performing encryption operation, a 64-bit block cipher with a 64-bit key is used along with the (>) right shift and (+2) functions. The proposed lightweight algorithm favors reducing the required number of rounds to bring off the lightweight property. Experimental results clearly demonstrate that our procedure is effective by considering correlation, entropy, and image histogram.
Keywords:
Encryption, IoT, Genetic Algorithm, Decryption, Key.
References:
[1] Daqiang Zhang et al., “NextMe: Localization Using Cellular Traces in Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 11, no. 2, pp. 302-312, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Deepti Sehrawat, and Nasib Singh Gill, “Lightweight Block Ciphers for IoT Based Applications: A Review,” International Journal of Applied Engineering Research, vol. 13, no. 5, pp. 2258-2270, 2018.
[Google Scholar] [Publisher Link]
[3] Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Delhi, India, 2007.
[Google Scholar]
[4] Sezer Toprak et al., “LWE: An Energy-Efficient Lightweight Encryption Algorithm for Medical Sensors and IoT Devices,” Electrica, vol. 20, no. 1, pp. 71-80, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Sohel Rana et al., “An Effective Lightweight Cryptographic Algorithm to Secure Resource-constrained Devices,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 9, no. 11, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Seddiq Abd Al-Rahman, Ali Sagheer, and Omar Dawood, “NVLC: New Variant Lightweight Cryptography Algorithm for Internet of Things,” 2018 1st Annual International Conference on Information and Sciences (AiCIS), Fallujah, Iraq, pp. 176-181, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Mickaël Cazorla, Kevin Marquet, and Marine Minier, “Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks,” 2013 International Conference on Security and Cryptography (SECRYPT), Reykjavik, Iceland, pp. 1-6, 2013.
[Google Scholar] [Publisher Link]
[8] Joan Daemen, and Vincent Rijmen, “AES Proposal: Rijndael,” AES Proposal, pp. 1-45, 1999.
[Google Scholar] [Publisher Link]
[9] Eli Biham, Alex Biryukov, and Adi Shamir, “Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials,” Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, vol. 1592, pp. 12-23, 1999.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Alex Biryukov, and Eyal Kushilevitz, “Improved Cryptanalysis of RC5,” Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, vol. 1403, pp. 85-99, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Yeping He, and Sihan Qing, “Square Attack on Reduced Camellia Cipher,” Proceedings of the International Conference on Information and Communications Security, Springer, Berlin, Heidelberg, vol. 2229, pp. 238-245, 2001.
[CrossRef] [Publisher Link]
[12] V.K. Jha, “Cryptanalysis of Lightweight Block Ciphers,” Master’s Thesis, Computer Science and Engineering, Science Degree Programme, Aalto University School and Technology, 2011.
[13] A. Bogdanov et al., “PRESENT: An Ultra-lightweight Block Cipher,” Proceedings of the International Workshop on Crypto Graphic Hardware and Embedded Systems Springer, Berlin, Heidelberg, vol. 4727, pp. 450-466, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Matt Blaze et al., “Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security,” Information Assurance Technology Analysis Centre Falls Church VA, Technical Report, 1996.
[Google Scholar] [Publisher Link]
[15] Hongjun Liu, and Xingyuan Wang, “Color Image Encryption Based on One-Time Keys and Robust Chaotic Maps,” Computers & Mathematics with Applications, vol. 59, no. 10, pp. 3320-3327, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Muhammad Usman et al., “SIT: a Lightweight Encryption Algorithm for Secure Internet of Things,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 1, pp. 402-411, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Paulo S.L.M. Barreto, and Vincent Rijmen, “The Khazad Legacy-level Block Cipher,” Primitive Submitted to NESSIE, vol. 97, no. 106, pp. 1-20, 2000.
[Google Scholar]
[18] Chang'e Dong, “Color Image Encryption Using One-Time Keys and Coupled Chaotic Systems,” Signal Processing Image Communications, vol. 29, no.5, pp. 628-640, 2014.
[CrossRef] [Google Scholar] [Publisher Link]