Abstract
In recent times, there has been a significant surge in research interest in security, driven by the continuous growth of threats and cyber attacks. Recognizing that existing state-of-the-art security schemes may not adequately address the requirements for lightweight properties and enhanced security measures, the aim of this research is to contribute to the field. The focus is on the development and implementation of lightweight encryption protocols designed to bolster security measures in the face of evolving challenges. The primary objective of this endeavor is to create a secure system utilizing the 3-round Kuznyechik algorithm (SSKA). In this process we introduce key generation algorithm followed by encryption and decryption techniques. The key generation algorithm is mainly based on three-round Kuznyechik algorithm. The Kuznyechik 3-round encryption mechanism has been proven to be effective in producing an imbalanced set at the end of the round and a balanced set before to the third round by employing a set in which the first byte is active and the following bytes are passive. This encourage us to use 3-round Kuznyechik algorithm. Building upon the aforementioned findings, an effective algorithm is suggested for determining the key of the final round in the 3-round Kuznyechik algorithm, employing the integral cryptanalysis method. Based on simulation results, the proposed approach demonstrates noteworthy enhancements in comparison to baseline algorithms concerning time complexity, encryption time, throughput, decryption time, data overhead, and space complexity.
Similar content being viewed by others
Data availability
All data generated or analyzed during this study are included in this article
References
Aboushosha B, Ramadan RA, Dwivedi AD, El-Sayed A, Dessouky MM (2020) SLIM: a lightweight block Cipher for internet of health things. IEEE Access 8:203747–203757. https://doi.org/10.1109/ACCESS.2020.3036589
Alexandrovna IE, Klimentievna BL (2017) New results in a research of GOST R 34.12-2015. In: 2017 IEEE 11th international conference on application of information and communication technologies (AICT), pp 1-5, https://doi.org/10.1109/ICAICT.2017.8686920
Altawy R, Youssef AM (2015) A meet in the middle attack on reduced round Kuznyechik. IEICE Trans Fundam Electron Commun Comput Sci E98(10):2194–2198. https://doi.org/10.1587/transfun.E98.A.2194
Ashraf Z, Sohail A, Yousaf M (2023) Robust and lightweight symmetric key exchange algorithm for next-generation IoE. Internet of Things 22:100703. https://doi.org/10.1016/j.iot.2023.100703
Babenko LK, Tolomanenko EA (2021) Development of algorithms for data transmission in sensor networks based on fully homomorphic encryption using symmetric Kuznyechik algorithm. J Phys Conf Ser IOP Publish 1812(1):012034. https://doi.org/10.1088/1742-6596/1812/1/012034
Banik S, Bao Z, Isobe T, Kubo H, Liu F, Minematsu K, Sakamoto K, Shibata N, Shigeri M (2021) “WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher”, In: Dunkelman, O., Jacobson, Jr., M.J., O’Flynn, C. (eds) Selected Areas in Cryptography. SAC 2020. Lecture notes in computer science, 12804, 535-564, https://doi.org/10.1007/978-3-030-81652-0_21
Boldyreva A, Goyal V, Kumar V (2008) Identity-based encryption with efficient revocation. In: CCS ’08: Proceedings of the 15th ACM conference on computer and communications security, pp 417-426. https://doi.org/10.1145/1455770.1455823
Das R, Dash D (2022) A comprehensive survey on mobile sink-based data gathering schemes in WSNs. Adhoc Sens Wirel Netw Old city 52(1–2):1–43
Das R et al (2016) Performance analysis of various attacks under AODV in WSN & MANET using OPNET 14.5" IEEE 7th annual ubiquitous computing, Electronics & mobile communication conference (UEMCON). New York, NY, USA pp 1–9. https://doi.org/10.1109/UEMCON.2016.7777831
Deshmukh M, Rawat AS (2023) Lightweight symmetric key encryption for text using XOR operation and permutation matrix. Int J Inf Tecnol 15:3555–3562. https://doi.org/10.1007/s41870-023-01407-3
Gessner D, Olivereau A, Segura AS, Serbanati A (2012) Trustworthy infrastructure services for a secure and privacy-respecting internet of things. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications, liverpool, UK, pp 998-1003. https://doi.org/10.1109/TrustCom.2012.286
Ilkhom B, Khan A, Bakhtiyor A, Das R, Khudoykulov Z (2023) Integral cryptanalysis: a new key determination technique for 3-phase Kuznyechik encryption. Eng Res Express 5(3):035018. https://doi.org/10.1088/2631-8695/ace58f
Ishchukova E, Babenko L, Anikeev M (2016) Fast implementation and cryptanalysis of GOST R 34.12-2015 block ciphers. In: 2016 ACM 9th international conference on security of information and networks (SIN’ 16), New York, USA, pp 104-111. https://doi.org/10.1145/2947626.2947657
Ishchukova E, Babenko L, Anikeev M (2017) Two simplified versions of Kuznyechik cipher (GOST R 34.12-2015). In: 2017 ACM 10th international conference on security of information and networks (SIN’ 17), Association for Computing Machinery, New York, NY, USA, 2017, pp. 287-290. https://doi.org/10.1145/3136825.3136856
Li J, Yao W, Zhang Y, Qian H, Han J (2017) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785–796. https://doi.org/10.1109/TSC.2016.2520932
Ning H, Liu H, Yang LT (2013) Cyberentity security in the internet of things. Computer 46(4):46–53. https://doi.org/10.1109/MC.2013.74
Paar C, Poschmann A, Robshaw MJB (2008) New designs in lightweight symmetric encryption. In: Kitsos P, Zhang Y (eds) RFID Security. Springer, Boston, MA, pp 349–371. https://doi.org/10.1007/978-0-387-76481-8_14
Rajesh S, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11(2):293. https://doi.org/10.3390/sym11020293
Rathore PS, Sarkar MK, Das R (2021) A comprehensive review on secure and energy aware multi-hop routing in clustering based wireless sensor network. Telecommun Radio Eng 80(8):13–37. https://doi.org/10.1615/TelecomRadEng.2021041203
Sen S et al (2019) Encryption in MicroSD card reader or USB data storage devices. In: 9th annual information technology, Electromechanical Engineering and Microelectronics Conference (IEMECON). Jaipur, India pp 232–236. https://doi.org/10.1109/IEMECONX.2019.8877012
Sharma R et al (2018) USB level data security using cryptographic approach. In: IEEE 8th annual computing and communication workshop and conference (CCWC). Las Vegas, NV, USA pp 861–866. https://doi.org/10.1109/CCWC.2018.8301636
Singh RS, Das R, Mukherjee D (2015) RDR cube Cipher an extension to Vigenere Cipher. IOSR J Comput Eng (IOSR-JCE) 16(2):64–71
Singh M, Das R, Sarkar MK, Majumder K, Sarkar SK (2015) KT3F: A key-based two-tier trust management filtering scheme for intrusion detection in wireless sensor network. In: Proceedings of the second international conference on computer and communication technologies: IC3T 2015, vol 1, pp 679-690, https://doi.org/10.1007/978-81-322-2517-1_65
Stoyanov B, Nedzhibov G (2020) Symmetric key encryption based on rotation-translation equation. Symmetry 12(1):73. https://doi.org/10.3390/sym12010073
Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a Review. In: 2012 international conference on computer science and electronics engineering, Hangzhou, China, pp 648-651, https://doi.org/10.1109/ICCSEE.2012.373
Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2018) SIT: a lightweight encryption algorithm for secure internet of things. Int J Adv Comput Sci Appl 8:1. https://doi.org/10.48550/arXiv.1704.08688
Wang X, Wang X, Zhao J, Zhang Z (2011) Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn 63:587–597. https://doi.org/10.1007/s11071-010-9821-4
Funding
No funds, grants, or other support is related to this research. The authors have no relevant financial or non-financial interests to disclose.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Ethical approval
Not applicable
Informed consent
Not applicable
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Das, R., Khan, A., Arya, R. et al. SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication. Int J Syst Assur Eng Manag 15, 2391–2400 (2024). https://doi.org/10.1007/s13198-024-02253-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-024-02253-7