Graph-Based Symmetric Crypto-System for Data Confidentiality

被引:0
作者
Mishra, Alekha Kumar [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ]
Puthal, Deepak [5 ]
Tripathy, Asis Kumar [6 ]
Choo, Kim-Kwang Raymond [7 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Jamshedpur, Bihar, India
[2] Nazarbayev Univ, ECE Dept, Astana, Kazakhstan
[3] Univ Jordan, King Abdullah II Sch IT, Amman, Jordan
[4] USTB, Beijing, Peoples R China
[5] Univ Technol Sydney, Fac Engn & Informat Technol, Sydney, NSW, Australia
[6] VIT Vellore, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
[7] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
来源
2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2018年
关键词
Data confidentiality; cyber security; graph-based encryption; SECURITY; INTERNET;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of cryptography systems in cyber security domain has become a primary focus to maintain data confidentiality. Several cryptography solutions exist for protecting data against confidentiality attack. Due to the advancement of computing infrastructure, there is always a need for novel security solution to protect data and introduce more complexity to the intruder. In this paper, a novel graph-based crypto-system is proposed to provide data confidentiality during communication between users and devices. The proposed crypto-system uses a set of graphs of order n along with an operation defined over it to form a group algebraic structure. Using this group, plaintext, ciphertext, and secret key are represented as a graph. The encryption and decryption processes are performed over the graphs using the operation defined in the group. It is then demonstrated that the proposed crypto-system is valid, and for a large n value, brute-forcing attempts to derive the key from plaintext or ciphertext is computationally infeasible.
引用
收藏
页数:6
相关论文
共 20 条
  • [1] Eslami M, 2017, IEEE INT CONF BIG DA, P4741, DOI 10.1109/BigData.2017.8258527
  • [2] Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03): : 1294 - 1312
  • [3] Haynberg R., 2013, 2013 INT C SEC CRYPT, P1
  • [4] A Software Watermarking Method Based on Public-Key Cryptography and Graph Coloring
    Jiang, Zetao
    Zhong, Rubing
    Zheng, Bina
    [J]. THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 433 - 437
  • [5] Klisowski Michal, 2010, Proceedings 2010 International Multiconference on Computer Science and Information Technology (IMCSIT 2010), P303
  • [6] Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs
    Lauter, Kristin
    [J]. IEEE SECURITY & PRIVACY, 2017, 15 (04) : 22 - 27
  • [7] Leicht L., 2017, IEEE T BIOMED CIRC S, P1
  • [8] Mittenthal L, 2007, LECT NOTES COMPUT SC, V4893, P70
  • [9] Nanda A., 2018, IEEE CONSUMER ELECT
  • [10] OBAIDAT M.S., 2007, Security of e-systems and computer networks