Abstract
Recently, IT and mobile technology are developed rapidly. Mobile devices such as a smartphone and tablet PC have become widely popular, and many people store their private information into the devices. However, the portability and mobility of devices take risks such as being lost or stolen. These devices are the one of main cause to leak the sensitive and confidential information. To protect the information leakage from devices, the encryption algorithm is required. The existing encryption algorithms take long delay time and heavy battery consumption in mobile devices with restricted resources. Previously, the Self-Encryption (SE) which is a lightweight encryption algorithm for mobile devices was proposed, which had critical weaknesses. This paper proposes a novel SE scheme with a random permutation and bit-flipping process. Our proposed scheme derives the keystream from the plaintext itself, but the statistical correlations are effectively removed from the novel randomization process. It gives a solution to overcome weaknesses of the original SE scheme and the complexity to make adversaries it difficult to launch a brute force attack, and satisfies a 0/1 uniformity of key and cipher stream, which is an important property of the secure stream cipher. Moreover, it is faster and more energy-efficient than other ciphers such as AES and RC4. The evaluation is performed by the Android platform. The delay time and the battery consumption are measured and analyzed, which show that the proposed scheme is secure and best suited to the mobile platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
If ∆ is too small, the security strength is weaken. Although higher ∆ means more strong security, computational overhead also increases. If \( \Updelta = 1 \), our self-encryption becomes equivalent to the one-time pad which provides unconditional secrecy [4].
- 2.
References
Chen Y, Ku WS (2009) Self-encryption scheme for data security in mobile devices. In: IEEE consumer communication and networking conference (CCNC)
Gasti P, Chen Y (2010) Breaking and fixing the self-encryption scheme for data security in mobile devices. In: Proceedings of the 18th Euromicro conference on parallel, distributed and network-based processing (PDP)
3GPP Std. TS33.220 v11.3.0 (2012) Generic authentication architecture (GAA); generic bootstrapping architecture (GBA)
Stallings W (2003) Cryptography and network security, 3 edn. Prentice Hall, Philadelphia, pp 43–44, 66–67, 192–194
Knuth DE (1998) The art of computer programming. Seminumerical algorithms, vol 2. Addison-Weseley
Wilson MC (2005) Overview of sattolo’s algorithm. Technical Report 5542, INRIA
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Katz J, Lindell Y (2007) Introduction to modern cryptography. Chapman and Hall/CRC, Boca Raton
Acknowledgments
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MEST). (No. 2012-0005390).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Shin, Y., Shin, S., Kim, M., Yoon, H. (2013). A Secure Self-Encryption Scheme for Resource Limited Mobile Devices. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_15
Download citation
DOI: https://doi.org/10.1007/978-94-007-5860-5_15
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5859-9
Online ISBN: 978-94-007-5860-5
eBook Packages: EngineeringEngineering (R0)