Improving the Security of Internet
of Things using Encryption Algorithms: Hybrid Encryption Algorithm (HAN)

Internet
of Things (IOT) involves communication between devices. Any leak of important
information can thus be very harmful. To prevent this a hybrid encryption
algorithm (HAN) has been proposed. At first a public key has to be generated
which will be known by both the sender and the receiver. The key is created
using the AES algorithm. The receiver has a private key which is not known by
the sender. For encrypting the message HAN uses NTRU asymmetric encryption
which encrypts the message given by the sender using the key generated using
the AES algorithm. The receiver now has to decrypt the message. For this, in
HAN algorithm NTRU algorithm is partially used. The encryption and decryption
happens as follows:

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Encryption
= (message multinomial, pr) *(public key, h) + message                                                   Decryption = (private key, f) *
Encryption                                                                                                  The algorithm also uses digital
signature which is used security as well as for increasing the speed for
validating the received message when compared to other algorithms.                                                        

On
concluding the above algorithm, HAN can be considered as a combination of both
the AES encryption algorithm and the NTRU technique of asymmetric decoding. On
comparison to other algorithms, HAN algorithm has greater speed when considered
the parameter of key generation as well as for encryption and decryption.         

 

Using Symmetric and
Asymmetric Cryptography to Secure Communication Between Devices in IOT

This
algorithm uses both symmetric as well as the asymmetric algorithms to perform
encryption for data transfer between devices in the internet of things. The
asymmetric cryptography technique uses both the type of keys i.e. public and
private. The public key is available to both the sender and the receiver
whereas the private key is available to only the receiver who with the help of
the obtained key unfolds the messages. In this algorithm, an advancement of
Vigenere Cipher technique has been proposed for symmetric cryptographic
algorithm and RSA technique is used for asymmetric cryptographic algorithm. the
following steps are followed in the algorithm:

Sender’s side:

1. The instant time
stamp has to be marked                                                                                                                    

2. A random key (K)
is only then created with the help of the timestamp

3. Get the data (P)
from the sender

4. The sender’s data and the random
key is collected and using the modified Vigenere Cipher algorithm, it is
converted to cipher text (C)

5. Now, the public key (Pk)
is collected from the receiver

6. The arbitrary key is currently
scrambled utilizing the RSA technique to acquire the encrypted key E

7. Now the encoded text is
generated using the encrypted key E as well as the cipher text C and the data
is transmitted

 

Receiver’s side:

1. Message is received from the
sender

2. Message is broken into encrypted
key (E) and cipher text (C)

3. The private key is using to
decrypt the key (E) using the RSA algorithm to obtain the random key

4. Once the random key is obtained,
the advanced Vigenere Cipher technique will be used to achieve the sender’s
data.

x

Hi!
I'm Erica!

Would you like to get a custom essay? How about receiving a customized one?

Check it out