Simulation of RC5 Algorithm to Provide Security for WLAN, Peer-to-Peer
Main Article Content
Abstract
Information security is a significant viewpoint in different areas of correspondence. This paper manages information encryption as large numbers of data correspondence rely upon encryption information. In this paper, another proposition of an information encryption framework has been presented. The framework can be partitioned into two stages; the primary stage centers around creating a top-notch Pseudo Irregular Number generator PRNGs utilizing rudimentary, intermittent, and crossover rules of cell automata CA. The framework recommends another mix of CA rules in an undertaking to give high arbitrariness and to work on the strength of the proposed cryptosystem. The subsequent stage creates the Improved Rivest Code 5 ERC5 calculations which utilizes the produced arbitrary Number Succession RNS with an end goal to reinforce the security and haphazardness of the first Rivest Code 5 RC5 Algorithm. The outcomes show that the proposed PRNGs in light of CA can create RNS with a high period which can reach more than 100000 keys without reiteration or string duplication. In addition, the test exhibits that the proposed ERC5 works on the security of the first RC5 calculation. The proposed cryptosystem is assessed as far as Shannon's hypothesis of data entropy, irregularity tests, calculation time, and key space investigation. The outcomes confirm that the recommended information crypto-framework expands the development of the security level of unique RC5 encryption calculation with a serious level of arbitrariness and privacy. It is executed this work to show the results rely upon the programming language C# and the correspondence was presented in a structure called disseminated through an association wireless local-area network WIFI.
Downloads
Article Details
References
Shahzadi R, Anwar SM, Qamar F, Ali M, Rodrigues JJ. Chaos based enhanced RC5 algorithm for security and integrity of clinical images in remote health monitoring. IEEE Access. 2019;7:52858-70. DOI: https://doi.org/10.1109/ACCESS.2019.2909554
Alsaffar N, Elmedany W, Ali H. Application of RC5 for IoT devices in smart transportation system. In: 2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO); 2019 Apr; IEEE. p. 1-4. DOI: https://doi.org/10.1109/ICMSAO.2019.8880351
Vibar JCN, Medina RP, Sison AM. ERC5a–An enhanced RC5 algorithm on bit propagation in the encryption function. In: 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS); 2019 Feb; IEEE. p. 479-82. DOI: https://doi.org/10.1109/CCOMS.2019.8821685
Abidi A, Sghaier A, Bakiri M, Guyeux C, Machhout M. Statistical analysis and security evaluation of chaotic RC5-CBC symmetric key block cipher algorithm. Int J Adv Comput Sci Appl. 2019;10(10). DOI: https://doi.org/10.14569/IJACSA.2019.0101070
Hossen MS, Islam MA, Khatun T, Hossain S, Rahman MM. A new approach to hiding data in the images using steganography techniques based on AES and RC5 algorithm cryptosystem. In: 2020 International Conference on Smart Electronics and Communication (ICOSEC); 2020 Sep; IEEE. p. 676-81. DOI: https://doi.org/10.1109/ICOSEC49089.2020.9215442
Alenezi MN, Alabdulrazzaq H, Mohammad NQ. Symmetric encryption algorithms: Review and evaluation study. Int J Commun Netw Inf Secur. 2020;12(2):256-72.
Wang Z, Yu B, Pei B, Zhang L. Research on AES encryption algorithm based on timestamp in Wireless Sensor Networks. In: 2020 2nd International Conference on Information Technology and Computer Application (ITCA); 2020 Dec; IEEE. p. 15-8. DOI: https://doi.org/10.1109/ITCA52113.2020.00010
Yang C, Wu J, Wang L, Zhang X, Li L, Liu S. Smart grid monitoring systems based on advanced encryption standard and wireless local area network. IOP Conf Ser Mater Sci Eng. 2020;719(1):012056. DOI: https://doi.org/10.1088/1757-899X/719/1/012056
Al-Ahdal AH. Security Analysis of a Robust Lightweight Algorithm for Securing Data in Internet of Things Networks. Turk J Comput Math Educ. 2021;12(12):133-43.
Sagun A, Khaidurov V, Lakhno V, Opirskyy I, Chubaievskyi V, Desiatko A. Devising a method for improving crypto resistance of the symmetric block cryptosystem RC5 using nonlinear shift functions. East Eur J Enterp Technol. 2021;5(9):113. DOI: https://doi.org/10.15587/1729-4061.2021.240344
Valeriy L, Andrii S, Vladyslav K, Boris G, Petro K, Svitlana K. One method for RC5 algorithm’s cryptographic strength improving. In: Soft Computing for Security Applications: Proceedings of ICSCS 2021. Singapore: Springer Singapore; 2021. p. 13-25. DOI: https://doi.org/10.1007/978-981-16-5301-8_2
Ngamsert R, Kangrang A. Applying of marine predator’s algorithm linked with reservoir simulation model considering sedimentation for reservoir operation. Adv Civ Eng. 2022. DOI: https://doi.org/10.1155/2022/1631914
Hussein SN, Obaid AH, Jabbar A. Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm. Iraqi J Sci. 2022;5037-45. DOI: https://doi.org/10.24996/ijs.2022.63.11.38
Sumathi M, Narmadha R, Anbarasi Jebaselvi GD. Performance comparison of data security algorithms. In: Human-Assisted Intelligent Computing: Modeling, simulations and applications. Bristol, UK: IOP Publishing; 2023. p. 33-1. DOI: https://doi.org/10.1088/978-0-7503-4801-0ch33
de Carvalho Bertoli G, Suri R, Rizos A, Pereira DP. Open Challenge for Intrusion Detection on Air-Ground Communication: From Data Analysis to Simulation. In: 2023 IEEE/AIAA 42nd Digital Avionics Systems Conference (DASC); 2023 Oct; IEEE. p. 1-9. DOI: https://doi.org/10.1109/DASC58513.2023.10311274