dc.contributor.advisor |
Sumbwanyambe, M
|
|
dc.contributor.author |
Muthavhine, Khumbelo Difference
|
|
dc.date.accessioned |
2019-10-21T05:57:00Z |
|
dc.date.available |
2019-10-21T05:57:00Z |
|
dc.date.issued |
2018-07 |
|
dc.identifier.uri |
http://hdl.handle.net/10500/25883 |
|
dc.description.abstract |
Ubiquitous computing is already weaving itself around us and it is connecting everything to the network of networks. This interconnection of objects to the internet is new computing paradigm called the Internet of Things (IoT) networks. Many capacity and non-capacity constrained devices, such as sensors are connecting to the Internet. These devices interact with each other through the network and provide a new experience to its users. In order to make full use of this ubiquitous paradigm, security on IoT is important. There are problems with privacy concerns regarding certain algorithms that are on IoT, particularly in the area that relates to their avalanche effect means that a small change in the plaintext or key should create a significant change in the ciphertext. The higher the significant change, the higher the security if that algorithm. If the avalanche effect of an algorithm is less than 50% then that algorithm is weak and can create security undesirability in any network. In this, case IoT.
In this study, we propose to do the following: (1) Search and select existing block cryptographic algorithms (maximum of ten) used for authentication and encryption from different devices used on IoT. (2) Analyse the avalanche effect of select cryptographic algorithms and determine if they give efficient authentication on IoT. (3) Improve their avalanche effect by designing a mathematical model that improves their robustness against attacks. This is done through the usage of the initial vector XORed with plaintext and final vector XORed with cipher tect. (4) Test the new mathematical model for any enhancement on the avalanche effect of each algorithm as stated in the preceding sentences. (5) Propose future work on how to enhance security on IoT.
Results show that when using the proposed method with variation of key, the avalanche effect significantly improved for seven out of ten algorithms. This means that we have managed to improve 70% of algorithms tested. Therefore indicating a substantial success rate for the proposed method as far as the avalanche effect is concerned. We propose that the seven algorithms be replaced by our improved versions in each of their implementation on IoT whenever the plaintext is varied. |
en |
dc.format.extent |
1 online resource (xv, 169 leaves) : color illustrations, color graphs |
en |
dc.language.iso |
en |
en |
dc.subject.ddc |
005.8 |
|
dc.subject.lcsh |
Internet of things -- Security measures |
en |
dc.subject.lcsh |
Embedded Internet devices -- Security measures |
en |
dc.subject.lcsh |
Data encryption (Computer science) |
en |
dc.subject.lcsh |
Computer networks -- Security measures |
en |
dc.subject.lcsh |
Ubiquitous computing -- Security measures |
en |
dc.subject.lcsh |
Computer algorithms |
en |
dc.title |
An analysis and a comparative study of cryptographic algorithms used on the internet of things (IoT) based on avalanche effect |
en |
dc.type |
Dissertation |
en |
dc.description.department |
Electrical and Mining Engineering |
en |
dc.description.degree |
M. Tech. (Electrical Engineering) |
en |