Advanced Encryption Standard With Randomized Round Keys for Communication Security in IoT Networks

Advanced Encryption Standard With Randomized Round Keys for Communication Security in IoT Networks

Ishpal Singh Gill (Namibia University of Science and Technology, Namibia) and Dharm Singh Jat (Namibia University of Science and Technology, Namibia)
Copyright: © 2019 |Pages: 9
DOI: 10.4018/978-1-5225-9246-4.ch017

Abstract

Internet of things (IoT) is a rapidly emerging architecture connecting smart devices all across the world in various fields like smart homes, smart cities, health sector, security, etc. Security is a very important aspect of IoT. As more and more devices are connecting to the Internet, it becomes a lucrative target for hackers. The communication between the various devices, nodes, and between nodes and the cloud, needs to be secured. A combination of public and private key cryptography systems is used to secure the IoT networks. The Advanced Encryption Standard (AES) is used for encrypting the data in transit. However, the AES is known to be prone to brute force attacks, side channel attacks, and other forms of cryptanalysis. This chapter proposes a more secure AES algorithm with randomised round keys, which provides better security with negligible overheads, and is ideal for use in IoT networks.
Chapter Preview
Top

Literature Review

Advanced Encryption Standard

The Advanced Encryption Standard (AES) is a symmetric cipher which works on 128 bit block data with three key size variants of 128, 192 and 256 bits. The encryption consists of repeated iterations of four operations performed on the data over 10, 12 and 14 rounds for the 128, 192 and 256 bit key variants respectively. The four operations are Sub Bytes, Shift Rows, Mix Columns and Add Round Key. For the 128 bit key version, the single 128 bit key is broken down into 11 keys of 128 bits. One key is used in the initially to XOR with the text/data and thereafter the balance 10 keys are used for each of the 10 rounds. The last round has three operations without the Mix Columns operation. The decryption is the exact reverse of the encryption process (FIPS Publication 197, 2001;Daemen & Rijmen, 1999, 2013). The AES algorithm is the strongest known symmetric algorithm. The only known attacks against AES are the brute force attack, wherein the attacker obtains the key by trying out all possible bit combinations of the key length and the side channel attacks which makes use of the incorrect or flawed implementation of the algoithm.

The high level algorithm for AES encryption is given below:-

AES_Round (Data, RoundKey[j])
{
SubBytes (Data);
ShiftRows (Data);
MixColns (Data);
AddRoundKey (Data, RoundKey[j]);
}
AES_RoundLast (Data, RoundKey[NumofRounds])
{
SubBytes (Data);
ShiftRows (Data);
AddRoundKey (Data, RoundKey[Numof Rounds]);
}

Complete Chapter List

Search this Book:
Reset