Institutional Repository

An analysis and a comparative study of cryptographic algorithms used on the internet of things (IoT) based on avalanche effect

Show simple item record

dc.contributor.advisor Sumbwanyambe, M
dc.contributor.author Muthavhine, Khumbelo Difference
dc.date.accessioned 2019-10-21T05:57:00Z
dc.date.available 2019-10-21T05:57:00Z
dc.date.issued 2018-07
dc.identifier.uri http://hdl.handle.net/10500/25883
dc.description.abstract Ubiquitous computing is already weaving itself around us and it is connecting everything to the network of networks. This interconnection of objects to the internet is new computing paradigm called the Internet of Things (IoT) networks. Many capacity and non-capacity constrained devices, such as sensors are connecting to the Internet. These devices interact with each other through the network and provide a new experience to its users. In order to make full use of this ubiquitous paradigm, security on IoT is important. There are problems with privacy concerns regarding certain algorithms that are on IoT, particularly in the area that relates to their avalanche effect means that a small change in the plaintext or key should create a significant change in the ciphertext. The higher the significant change, the higher the security if that algorithm. If the avalanche effect of an algorithm is less than 50% then that algorithm is weak and can create security undesirability in any network. In this, case IoT. In this study, we propose to do the following: (1) Search and select existing block cryptographic algorithms (maximum of ten) used for authentication and encryption from different devices used on IoT. (2) Analyse the avalanche effect of select cryptographic algorithms and determine if they give efficient authentication on IoT. (3) Improve their avalanche effect by designing a mathematical model that improves their robustness against attacks. This is done through the usage of the initial vector XORed with plaintext and final vector XORed with cipher tect. (4) Test the new mathematical model for any enhancement on the avalanche effect of each algorithm as stated in the preceding sentences. (5) Propose future work on how to enhance security on IoT. Results show that when using the proposed method with variation of key, the avalanche effect significantly improved for seven out of ten algorithms. This means that we have managed to improve 70% of algorithms tested. Therefore indicating a substantial success rate for the proposed method as far as the avalanche effect is concerned. We propose that the seven algorithms be replaced by our improved versions in each of their implementation on IoT whenever the plaintext is varied. en
dc.format.extent 1 online resource (xv, 169 leaves) : color illustrations, color graphs en
dc.language.iso en en
dc.subject.ddc 005.8
dc.subject.lcsh Internet of things -- Security measures en
dc.subject.lcsh Embedded Internet devices -- Security measures en
dc.subject.lcsh Data encryption (Computer science) en
dc.subject.lcsh Computer networks -- Security measures en
dc.subject.lcsh Ubiquitous computing -- Security measures en
dc.subject.lcsh Computer algorithms en
dc.title An analysis and a comparative study of cryptographic algorithms used on the internet of things (IoT) based on avalanche effect en
dc.type Dissertation en
dc.description.department Electrical and Mining Engineering en
dc.description.degree M. Tech. (Electrical Engineering) en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics