loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Muhammad Shaiful Azrin Md Alimon 1 ; L.M. Kamarudin 2 ; Azizi Harun 1 ; Ammar Zakaria 1 and Shaufikah Shukri 1

Affiliations: 1 Center of Excellence in Advanced Sensor Technology and University Malaysia Perlis, Malaysia ; 2 Center of Excellence in Advanced Sensor Technology, University Malaysia Perlis, School of Computer & Communication Engineering and University Malaysia Perlis, Malaysia

Keyword(s): 8-bit Cipher, Cryptography, WSN Security, Vigenere Cipher, Shalala.

Abstract: Cryptography is a science that deals on the method of converting plaintext into cipher text, usually with the help of encryption keys and encryption algorithm. Current standard implementation of cryptography is proved to require high resource in memory which is not suitable to be implemented in low memory embedded system, thus a lightweight cryptography are required. Vigenere cipher is one of the encryption algorithms that was easy to implement and comprehand, which can be used to provide confidentiality from the third party. Vigenere cipher is a polyalphabetic Ceaser cipher, which means it shifting the character in plaintext to become character of mod of its key character. Even thou Vigenere cipher are a classical cipher that doing its cipher using character compared to modern cipher that doing its cipher using bits and byte, it still can be implemented in modern computer by representing its character based on ASCII Table. Furthermore, because of this, its character can be extended to contain all alphabet and special character in the ASCII Table, thus allowing it to encrypt every character that can be represented using ASCII Table. Originally the resilience of Vigenere cipher is based on two factors: (1) the length of its key, and (2) the randomness of character in its key. Even though increasing the length and the used random character provide a great resilience, it takes away the fun of using dictionary word to encrypt the plaintext. To overcome that, this paper, proposing a method of implementing a Pseudorandom Path that change the flow of mod use by the Vigenere Cipher to encrypt and decrypt either positive mod or negative mod. Usually Vigenere Cipher use positive mode to encrypt, while negative mod to decrypt, however this paper propose a method to combine both mod during encryption or decryption with the supervision from the Pseudorandom Path. This method of implementation and its result were discussed in this paper and named as Shalala Cryptography. The results were compared between using original resilience and a Shalala Cryptography method. The resource requirement to implement this algorithm using C++ language is also shown, which shows a lightweight cryptography scheme in term of RAM consumption and fast processed time, which are suitable to be used in WSN or IoT environment. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.144.31.64

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Md Alimon, M.; Kamarudin, L.; Harun, A.; Zakaria, A. and Shukri, S. (2017). Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security. In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - IoTBDS; ISBN 978-989-758-245-5; ISSN 2184-4976, SciTePress, pages 363-369. DOI: 10.5220/0006358403630369

@conference{iotbds17,
author={Muhammad Shaiful Azrin {Md Alimon}. and L.M. Kamarudin. and Azizi Harun. and Ammar Zakaria. and Shaufikah Shukri.},
title={Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security},
booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - IoTBDS},
year={2017},
pages={363-369},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006358403630369},
isbn={978-989-758-245-5},
issn={2184-4976},
}

TY - CONF

JO - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - IoTBDS
TI - Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security
SN - 978-989-758-245-5
IS - 2184-4976
AU - Md Alimon, M.
AU - Kamarudin, L.
AU - Harun, A.
AU - Zakaria, A.
AU - Shukri, S.
PY - 2017
SP - 363
EP - 369
DO - 10.5220/0006358403630369
PB - SciTePress