Volume 17 , Issue 2 , PP: 340-359, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Chaithanya S. 1 * , Siddesh G. K. 2
Doi: https://doi.org/10.54216/JISIoT.170222
The Internet of Things real-time communications depend on a secure stream of data. For the secure communications, a stream cipher with the features of ease and speediness is appropriate. The development and testing of a novel cryptographic algorithm with the goal of enhancing encryption performance. This paper introduces novel A matrix-based nonlinear pseudorandom key stream generation method inspired by the principles of fundamental recursive relationship of Reinforcement Learning, aiming to enhance diffusion and randomness in stream ciphers. We also incorporate the encryption approach based on the Counter based transformation of keystream generation (CBTKSG) method to enhance the speed, which is particularly well-suited for efficiently handling large file sizes since it delivers fast throughput. The technique was thoroughly bench marked and compared to other well-known encryption schemes. Performance has significantly improved without sacrificing security, according to the data. The keystream output was placed through the NIST SP 800-22 statistical test suite to verify its cryptographic strength. It passed every test with high p-values, indicating high randomness quality. The cipher has a strong avalanche effect, meets standard security criteria like IND-CPA and IND-CCA, and resists common cryptanalysis methods including related-key, differential, and linear attacks.
Internet of Things , Encryption , Stream cipher , CBTKSG , Cryptography , Reinforcement Learning
[1] M. Hermann, T. Pentek, and B. Otto, "Design principles for industrie 4.0 scenarios," in Proc. 49th Hawaii Int. Conf. Syst. Sci. (HICSS), 2016, pp. 3928–3937.
[2] F. Muhammad, C. Ahendyarti, and Masjudin, "Chacha stream cipher implementation for network security in wireless sensor network," IOP Conf. Ser., Mater. Sci. Eng., vol. 673, no. 1, p. 012064, 2019.
[3] E. Lara, L. Aguilar, J. A. García, and M. A. Sanchez, "A lightweight cipher based on salsa20 for resource-constrained iot devices," Sensors, vol. 18, no. 10, p. 3326, 2018.
[4] O. Z. Akif, S. Ali, R. S. Ali, and A. K. Farhan, "A new pseudorandom bits generator based on a 2d-chaotic system and diffusion property," Bull. Electr. Eng. Inform., vol. 10, no. 3, pp. 1580–1588, 2021.
[5] D. Khwailleh and F. Al-Balas, "A dynamic data encryption method based on addressing the data importance on the internet of things," Int. J. Electr. Comput. Eng., vol. 12, no. 2, pp. 2139–2146, 2022.
[6] S. O. Sharif and S. Mansoor, "Performance analysis of stream and block cipher algorithms," in Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), vol. 1, 2010, pp. 1–522.
[7] E. Almaraz Luengo, "A brief and understandable guide to pseudo-random number generators and specific models for security," Statist. Surveys, vol. 16, pp. 137–181, 2022.
[8] J. Zheng and H. Hu, "A highly secure stream cipher based on analog-digital hybrid chaotic system," Inf. Sci., vol. 587, pp. 226–246, 2022.
[9] T.-T. Lee and S.-T. Wu, "A lightweight keystream generator based on expanded chaos with a counter for secure iot," Electronics, vol. 13, no. 24, p. 5019, 2024.
[10] X. Wang, L. Zhang, and Y. Liu, "A Novel Lightweight Image Encryption Algorithm Based on Chaotic Maps," Entropy, vol. 23, no. 5, pp. 1-15, 2021.
[11] U. Zia, M. McCartney, B. Scotney, et al., "A novel pseudo-random number generator for IoT based on a coupled map lattice system using the generalized symmetric map," SN Appl. Sci., vol. 4, p. 48, 2022.
[12] Z. Liu, Y. Wang, J. Liu, J. Feng, and L. Y. Zhang, "Characteristics of 3d coupled map lattice and its application in pseudo-random number generator," Nonlinear Dyn., vol. 112, no. 23, pp. 21509–21531, 2024.
[13] Y.-j. Sun, H. Zhang, X.-y. Wang, X.-q. Wang, and P.-f. Yan, "2d non-adjacent coupled map lattice with q and its applications in image encryption," Appl. Math. Comput., vol. 373, p. 125039, 2020.
[14] K. Suwais and S. Almanasra, "Strike: Stream cipher based on stochastic lightning strike behaviour," Appl. Sci., vol. 13, no. 8, p. 4669, 2023.
[15] S.-T. Wu, "Hybrid chaotic keystream generator based on dawson’s summation generator," Sens. Mater., vol. 35, 2023.
[16] Abdelli, W. Youssef, F. Kharroubi, L. Khriji, and M. Machhout, "A novel enhanced chaos based present lightweight cipher scheme," Phys. Scr., vol. 99, no. 1, p. 016004, 2024.
[17] Y. Guang, L. Yu, W. Dong, Y. Wang, J. Zeng, J. Zhao, and Q. Ding, "Chaos-based lightweight cryptographic algorithm design and fpga implementation," Entropy, vol. 24, no. 11, p. 1610, 2022.
[18] T. R. Campbell, "Daence: Salsa20 and ChaCha in deterministic authenticated encryption with no noncense," Cryptol. ePrint Arch., 2020.
[19] Salkanovic, S. Ljubic, L. Stankovic, and J. Lerga, "Analysis of cryptography algorithms implemented in android mobile application," Inf. Technol. Control, vol. 50, no. 4, pp. 786–807, 2021.
[20] E. J. Madarro-Capó, et al., "New Weak Keys with Parity Patterns in the RC4 Stream Cipher," Cryptography, vol. 8, no. 4, p. 54, 2024.
[21] M. Alabdulrazzaq and M. Alenezi, "Performance Evaluation of Cryptographic Algorithms for IoT Applications," J. Inf. Secur. Appl., vol. 58, pp. 1-11, 2022.
[22] P. Gehlot, S. Biradar, and B. Singh, "Implementation of modified twofish algorithm using 128 and 192-bit keys on vhdl," Int. J. Comput. Appl., vol. 70, no. 13, 2013.
[23] M. Babitha and K. R. Babu, "Secure cloud storage using aes encryption," in Proc. Int. Conf. Autom. Control Dyn. Optim. Techn. (ICACDOT), 2016, pp. 859–864.
[24] J.-P. Aumasson, Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, Inc, 2024.
[25] C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schläffer, "Ascon v1.2: Lightweight authenticated encryption and hashing," J. Cryptol., vol. 34, no. 3, p. 33, 2021.
[26] X. Huang, L. Liu, X. Li, M. Yu, and Z. Wu, "A new pseudorandom bit generator based on mixing three-dimensional chen chaotic system with a chaotic tactics," Complexity, vol. 2019, p. 6567198, 2019.
[27] M. A. S. AL-khatib, A. H. Lone, and M. Uddin, "Comparative analysis of sla-lfsr with traditional pseudo random number generators," Int. J. Comput. Intell. Res., vol. 13, no. 6, pp. 1461–1470, 2017.
[28] Y. Wang, Z. Liu, L. Y. Zhang, F. Pareschi, G. Setti, and G. Chen, "From chaos to pseudorandomness: a case study on the 2-d coupled map lattice," IEEE Trans. Cybern., vol. 53, no. 2, pp. 1324–1334, 2023.