Redirigiendo al acceso original de articulo en 17 segundos...
Inicio  /  Future Internet  /  Vol: 14 Par: 2 (2022)  /  Artículo
ARTÍCULO
TITULO

Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm

Khumbelo Muthavhine and Mbuyu Sumbwanyambe    

Resumen

Cryptographic algorithms installed on Internet of Things (IoT) devices suffer many attacks. Some of these attacks include the differential linear attack (DL). The DL attack depends on the computation of the probability of differential-linear characteristics, which yields a Differential-Linear Connectivity Table (DLCT). The DLCT is a probability table that provides an attacker many possibilities of guessing the cryptographic keys of any algorithm such as Serpent. In essence, the attacker firstly constructs a DLCT by using building blocks such as Substitution Boxes (S-Boxes) found in many algorithms? architectures. In depth, this study focuses on securing IoT devices against DL attacks used on Serpent algorithms by using three magic numbers mapped on a newly developed mathematical function called Blocker, which will be added on Serpent?s infrastructure before being installed in IoT devices. The new S-Boxes with 32-bit output were generated to replace the original Serpent?s S-Boxes with 4-bit output. The new S-Boxes were also inserted in Serpent?s architecture. This novel approach of using magic numbers and the Blocker Function worked successfully in this study. The results demonstrated an algorithm for which its S-Box is composed of a 4-bit-output that is more vulnerable to being attacked than an algorithm in which its S-Box comprises 32-bit outputs. The novel approach of using a Blocker, developed by three magic numbers and 32-bits output S-Boxes, successfully blocked the construction of DLCT and DL attacks. This approach managed to secure the Serpent algorithm installed on IoT devices against DL attacks.

 Artículos similares

       
 
Nikos Fotiou, Vasilios A. Siris, George Xylomenos and George C. Polyzos    
Many IoT use cases can benefit from group communication, where a user requests an IoT resource and this request can be handled by multiple IoT devices, each of which may respond back to the user. IoT group communication involves one-to-many requests and ... ver más
Revista: Future Internet

 
Pranav Gangwani, Alexander Perez-Pons, Tushar Bhardwaj, Himanshu Upadhyay, Santosh Joshi and Leonel Lagos    
The demand for the digital monitoring of environmental ecosystems is high and growing rapidly as a means of protecting the public and managing the environment. However, before data, algorithms, and models can be mobilized at scale, there are considerable... ver más
Revista: Future Internet

 
Andrii Shalaginov and Muhammad Ajmal Azad    
In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improv... ver más
Revista: Future Internet

 
Bander Alzahrani and Nikos Fotiou    
IoT group communication allows users to control multiple IoT devices simultaneously. A convenient method for implementing this communication paradigm is by leveraging software-defined networking (SDN) and allowing IoT endpoints to ?advertise? the resourc... ver más
Revista: Future Internet

 
Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani and Lo?ai Tawalbeh    
Today, deep learning approaches are widely used to build Intrusion Detection Systems for securing IoT environments. However, the models? hidden and complex nature raises various concerns, such as trusting the model output and understanding why the model ... ver más
Revista: Future Internet