Improving the Security of Internet

of Things using Encryption Algorithms: Hybrid Encryption Algorithm (HAN)

Internet

of Things (IOT) involves communication between devices. Any leak of important

information can thus be very harmful. To prevent this a hybrid encryption

algorithm (HAN) has been proposed. At first a public key has to be generated

which will be known by both the sender and the receiver. The key is created

using the AES algorithm. The receiver has a private key which is not known by

the sender. For encrypting the message HAN uses NTRU asymmetric encryption

which encrypts the message given by the sender using the key generated using

the AES algorithm. The receiver now has to decrypt the message. For this, in

HAN algorithm NTRU algorithm is partially used. The encryption and decryption

happens as follows:

Encryption

= (message multinomial, pr) *(public key, h) + message Decryption = (private key, f) *

Encryption The algorithm also uses digital

signature which is used security as well as for increasing the speed for

validating the received message when compared to other algorithms.

On

concluding the above algorithm, HAN can be considered as a combination of both

the AES encryption algorithm and the NTRU technique of asymmetric decoding. On

comparison to other algorithms, HAN algorithm has greater speed when considered

the parameter of key generation as well as for encryption and decryption.

Using Symmetric and

Asymmetric Cryptography to Secure Communication Between Devices in IOT

This

algorithm uses both symmetric as well as the asymmetric algorithms to perform

encryption for data transfer between devices in the internet of things. The

asymmetric cryptography technique uses both the type of keys i.e. public and

private. The public key is available to both the sender and the receiver

whereas the private key is available to only the receiver who with the help of

the obtained key unfolds the messages. In this algorithm, an advancement of

Vigenere Cipher technique has been proposed for symmetric cryptographic

algorithm and RSA technique is used for asymmetric cryptographic algorithm. the

following steps are followed in the algorithm:

Sender’s side:

1. The instant time

stamp has to be marked

2. A random key (K)

is only then created with the help of the timestamp

3. Get the data (P)

from the sender

4. The sender’s data and the random

key is collected and using the modified Vigenere Cipher algorithm, it is

converted to cipher text (C)

5. Now, the public key (Pk)

is collected from the receiver

6. The arbitrary key is currently

scrambled utilizing the RSA technique to acquire the encrypted key E

7. Now the encoded text is

generated using the encrypted key E as well as the cipher text C and the data

is transmitted

Receiver’s side:

1. Message is received from the

sender

2. Message is broken into encrypted

key (E) and cipher text (C)

3. The private key is using to

decrypt the key (E) using the RSA algorithm to obtain the random key

4. Once the random key is obtained,

the advanced Vigenere Cipher technique will be used to achieve the sender’s

data.