loading
Papers

Research.Publish.Connect.

Paper

Authors: Muhammad Shaiful Azrin Md Alimon 1 ; L.M. Kamarudin 2 ; Azizi Harun 1 ; Ammar Zakaria 1 and Shaufikah Shukri 1

Affiliations: 1 Center of Excellence in Advanced Sensor Technology and University Malaysia Perlis, Malaysia ; 2 Center of Excellence in Advanced Sensor Technology, University Malaysia Perlis, School of Computer & Communication Engineering and University Malaysia Perlis, Malaysia

ISBN: 978-989-758-245-5

Keyword(s): 8-bit Cipher, Cryptography, WSN Security, Vigenere Cipher, Shalala.

Abstract: Cryptography is a science that deals on the method of converting plaintext into cipher text, usually with the help of encryption keys and encryption algorithm. Current standard implementation of cryptography is proved to require high resource in memory which is not suitable to be implemented in low memory embedded system, thus a lightweight cryptography are required. Vigenere cipher is one of the encryption algorithms that was easy to implement and comprehand, which can be used to provide confidentiality from the third party. Vigenere cipher is a polyalphabetic Ceaser cipher, which means it shifting the character in plaintext to become character of mod of its key character. Even thou Vigenere cipher are a classical cipher that doing its cipher using character compared to modern cipher that doing its cipher using bits and byte, it still can be implemented in modern computer by representing its character based on ASCII Table. Furthermore, because of this, its character can be extended t o contain all alphabet and special character in the ASCII Table, thus allowing it to encrypt every character that can be represented using ASCII Table. Originally the resilience of Vigenere cipher is based on two factors: (1) the length of its key, and (2) the randomness of character in its key. Even though increasing the length and the used random character provide a great resilience, it takes away the fun of using dictionary word to encrypt the plaintext. To overcome that, this paper, proposing a method of implementing a Pseudorandom Path that change the flow of mod use by the Vigenere Cipher to encrypt and decrypt either positive mod or negative mod. Usually Vigenere Cipher use positive mode to encrypt, while negative mod to decrypt, however this paper propose a method to combine both mod during encryption or decryption with the supervision from the Pseudorandom Path. This method of implementation and its result were discussed in this paper and named as Shalala Cryptography. The results were compared between using original resilience and a Shalala Cryptography method. The resource requirement to implement this algorithm using C++ language is also shown, which shows a lightweight cryptography scheme in term of RAM consumption and fast processed time, which are suitable to be used in WSN or IoT environment. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.173.45

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Md Alimon, M.; Kamarudin, L.; Harun, A.; Zakaria, A. and Shukri, S. (2017). Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS, ISBN 978-989-758-245-5, pages 363-369. DOI: 10.5220/0006358403630369

@conference{iotbds17,
author={Muhammad Shaiful Azrin Md Alimon. and L.M. Kamarudin. and Azizi Harun. and Ammar Zakaria. and Shaufikah Shukri.},
title={Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security},
booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,},
year={2017},
pages={363-369},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006358403630369},
isbn={978-989-758-245-5},
}

TY - CONF

JO - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,
TI - Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security
SN - 978-989-758-245-5
AU - Md Alimon, M.
AU - Kamarudin, L.
AU - Harun, A.
AU - Zakaria, A.
AU - Shukri, S.
PY - 2017
SP - 363
EP - 369
DO - 10.5220/0006358403630369

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.