Grain-128PLE: Generic Physical-Layer Encryption for IoT Networks
- URL: http://arxiv.org/abs/2309.15569v1
- Date: Wed, 27 Sep 2023 10:48:52 GMT
- Title: Grain-128PLE: Generic Physical-Layer Encryption for IoT Networks
- Authors: Marcus de Ree, Georgios Mantas, Jonathan Rodriguez,
- Abstract summary: Grain-128PLE is a lightweight physical layer encryption scheme that is derived from the Grain-128AEAD v2 stream cipher.
The design of Grain-128PLE maintains the structure of the main building blocks of the original Grain-128AEAD v2 stream cipher.
- Score: 6.515605001492591
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Physical layer security (PLS) encompasses techniques proposed at the physical layer to achieve information security objectives while requiring a minimal resource footprint. The channel coding-based secrecy and signal modulation-based encryption approaches are reliant on certain channel conditions or a certain communications protocol stack to operate on, which prevents them from being a generic solution. This paper presents Grain-128PLE, a lightweight physical layer encryption (PLE) scheme that is derived from the Grain-128AEAD v2 stream cipher. The Grain-128PLE stream cipher performs encryption and decryption at the physical layer, in between the channel coding and signal modulation processes. This placement, like that of the A5 stream cipher that had been used in the GSM communications standard, makes it a generic solution for providing data confidentiality in IoT networks. The design of Grain-128PLE maintains the structure of the main building blocks of the original Grain-128AEAD v2 stream cipher, evaluated for its security strength during NIST's recent Lightweight Cryptography competition, and is therefore expected to achieve similar levels of security.
Related papers
- Multi-Layered Security System: Integrating Quantum Key Distribution with Classical Cryptography to Enhance Steganographic Security [0.0]
We present a novel cryptographic system that integrates Quantum Key Distribution (QKD) with classical encryption techniques.
Our approach leverages the E91 QKD protocol to generate a shared secret key between communicating parties.
This key is then hashed using the Secure Hash Algorithm (SHA) to provide a fixedlength, high-entropy key.
arXiv Detail & Related papers (2024-08-13T15:20:29Z) - Physical Layer Deception with Non-Orthogonal Multiplexing [52.11755709248891]
We propose a novel framework of physical layer deception (PLD) to actively counteract wiretapping attempts.
PLD combines PLS with deception technologies to actively counteract wiretapping attempts.
We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches.
arXiv Detail & Related papers (2024-06-30T16:17:39Z) - CodeChameleon: Personalized Encryption Framework for Jailbreaking Large
Language Models [49.60006012946767]
We propose CodeChameleon, a novel jailbreak framework based on personalized encryption tactics.
We conduct extensive experiments on 7 Large Language Models, achieving state-of-the-art average Attack Success Rate (ASR)
Remarkably, our method achieves an 86.6% ASR on GPT-4-1106.
arXiv Detail & Related papers (2024-02-26T16:35:59Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Chaotic Encryption for 10-Gb Ethernet Optical Links [0.7499722271664144]
Ethernet traffic has been encrypted, transmitted, and decrypted over a multimode optical link.
No overhead is introduced during encryption, getting no losses in the total throughput.
arXiv Detail & Related papers (2024-01-26T18:08:19Z) - Physical Layer Encryption for Industrial Ethernet in Gigabit Optical Links [0.5624791703748108]
New encryption method for high speed optical communications suitable for such kind of networks is proposed.
New encryption method consists of a symmetric streaming encryption of the 8b/10b data flow at PCS (Physical Coding Sublayer) level.
arXiv Detail & Related papers (2024-01-26T18:01:59Z) - Secure Data Transmission over Insecure Radio Channel in Wireless of Things (WoT) Network [1.864621482724548]
The Public Key Cryptography (PKC) techniques which use larger keys cannot be fitted in tiny resource constrained Wireless of Things (WoT) devices.
Some Symmetric Key Cryptosystems (SKC) use smaller keys, which can be fitted in the tiny devices.
In large networks where the number of nodes is in the order of 103, the memory constraint does not allow the system to do so.
arXiv Detail & Related papers (2023-11-20T16:00:02Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - Generative AI-aided Joint Training-free Secure Semantic Communications
via Multi-modal Prompts [89.04751776308656]
This paper proposes a GAI-aided SemCom system with multi-model prompts for accurate content decoding.
In response to security concerns, we introduce the application of covert communications aided by a friendly jammer.
arXiv Detail & Related papers (2023-09-05T23:24:56Z) - SemProtector: A Unified Framework for Semantic Protection in Deep Learning-based Semantic Communication Systems [51.97204522852634]
We present a unified framework that aims to secure an online semantic communications system with three semantic protection modules.
Specifically, these protection modules are able to encrypt semantics to be transmitted by an encryption method, mitigate privacy risks from wireless channels by a perturbation mechanism, and calibrate distorted semantics at the destination.
Our framework enables an existing online SC system to dynamically assemble the above three pluggable modules to meet customized semantic protection requirements.
arXiv Detail & Related papers (2023-09-04T06:34:43Z) - A Comprehensive Survey on the Implementations, Attacks, and
Countermeasures of the Current NIST Lightweight Cryptography Standard [2.055054374525828]
This survey is the first work on the current standard for lightweight cryptography, standardized in 2023.
Lightweight cryptography plays a vital role in securing resource-constrained embedded systems.
NIST initiated a standardization process for lightweight cryptography.
arXiv Detail & Related papers (2023-04-13T02:29:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.