A novel approach of asymmetric key generation in symmetric AES via ECDH
- PDF / 814,796 Bytes
- 10 Pages / 595.276 x 790.866 pts Page_size
- 75 Downloads / 451 Views
ORIGINAL ARTICLE
A novel approach of asymmetric key generation in symmetric AES via ECDH Sameer Farooq1
•
Priyanka Chawla1
Received: 4 September 2019 / Revised: 11 February 2020 The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2020
Abstract AES and ECC are considered as the best encryption algorithms, both are approved by NIST and are regarded as next generation algorithm. It is believed that they are quantum computer resistant. The compact ciphertext size of ECC and AES makes them the best choice for cloud computing, sensor networks or small devices where we want resource-saving without compromising the security of the system. But the main issue with AES is key sharing, which is dependent on the secured channel and if that channel gets compromised the communication will also get compromised. To overcome this issue, we are proposing the novel concept, which is generating keys for both AES and ECC using the proposed methodology given in the paper. The algorithm does not need a secured channel at any level as it is inheriting properties of the ECDH algorithm and adding novel concepts with it for key generation. We have observed from the experimental results that our proposed algorithm generates 16-byte key which is inheriting ECC property, so it can with stand with prime factorization attack and QC. The other property is that the key generation algorithm is lesser complex as compared to the existing related algorithms. Keywords Cloud computing Fog IoT ECDH AES ECC NGE QCR
& Priyanka Chawla [email protected] Sameer Farooq [email protected] 1
Lovely Professional University, Phagwara, India
Abbreviations ECDH Elliptic curve Diffie Hellman ECC Elliptic curve cryptography NGE Next-generation algorithm QCR Quantum computing resistant DH Diffie-Hellman
1 Introduction This work is part of a novel cloud security framework proposed by the author under the name of ‘‘Novel Hybrid Encryption Framework to Secure Data Transmission between IoT and Fog systems’’. As we know the AES and ECC both are the best encryption algorithm that we have today in the list of symmetric and asymmetric algorithms respectively. The less complexity of the algorithms in terms of the algorithm code and ciphertext makes them the most attractive choice among the cryptographers. In the various fields of IT viz, Wireless sensor networks, wireless body area networks, Cloud computing, Fog computing, etc. where we want the better security of the data with limited resources. The security administrators prefer small compact sized algorithms like ECC and AES which can use fewer resources and provide better security. The resources may include CPU execution time, battery usage, storage memory, network bandwidth, etc. Although the AES algorithm is the best algorithm, still it is not used widely by the security administrators. The reason is its need, of the secured channel for key sharing which creates
Data Loading...