Cryptosystem design based on Hermitian curves for IoT security

  • PDF / 1,471,269 Bytes
  • 24 Pages / 439.37 x 666.142 pts Page_size
  • 22 Downloads / 215 Views

DOWNLOAD

REPORT


Cryptosystem design based on Hermitian curves for IoT security Omar A. Alzubi1 · Jafar A. Alzubi1   · Osama Dorgham1 · Mohammad Alsayyed1

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract The ultimate goal of modern cryptography is to protect the information resource and make it absolutely unbreakable and beyond compromise. However, throughout the history of cryptography, thousands of cryptosystems emerged and believed to be invincible and yet attackers were able to break and compromise their security. The main objective of this paper is to design a robust cryptosystem that will be suitable to be implemented in Internet of Things. The proposed cryptosystem is based on algebraic geometric curves, more specifically on Hermitian curves. The new cryptosystem design is called Hermitian-based cryptosystem (HBC). During the development of the HBC design, Kerckhoffs’s desideratum was the main guidance principle, which has been satisfied by choosing the Hermitian curves as the core of the proposed design. The proposed HBC inherits all the advantageous characteristics of Hermitian curve which are large number of points that satisfy the curve and high genus curves. The aforementioned characteristics play a crucial role in generating a large size encryption key for HBC and determine the block size of plaintext. Due to the fact that HBC used algebraic geometric codes over Hermitian curve, it has the ability to perform error correction in addition to data encryption. The error correction is another advantage of HBC compared with many existing cryptosystems such as McEliece cryptosystem. The number of errors that can be corrected by HBC is larger (high data rate) than other algebraic geometric codes such as elliptic and hyperelliptic curves. It also uses non-binary representation which increases its attack resistance. In this paper, the proposed HBC has been mathematically compared with elliptic curve cryptosystem. The results show that HBC has many advantages over the elliptic curves in terms of number of points and genus of the curve. Keywords  Security · Internet of Things · Encryption · Hermitian curves · Elliptic curves · Error correction · Networks

* Jafar A. Alzubi [email protected] Extended author information available on the last page of the article

13

Vol.:(0123456789)



O. A. Alzubi et al.

1 Introduction Today, computational devices are becoming faster and faster and also became widely used. High performance and fast computation led to reconsider many existing encryption algorithms that required a fast computational machine to break it [1]. By considering Kerckhoffs’s principle, cryptosystem should be strong, the encryption and decryption algorithms should be known to the public, and the security of the algorithm should solely rely on the secrecy of the key [2, 3]. This leads to the main target of an attacker to deduce the key that a message was encrypted by. As a matter of fact, a modern cryptosystems design using number theory and error correction code plays an important role in de