A New Lightweight Cryptographic Algorithm For Enhancing Data Security in Cloud Computing
A New Lightweight Cryptographic Algorithm For Enhancing Data Security in Cloud Computing
Abstract
A new lightweight cryptographic algorithm for improving data security
was suggested. This algorithm may be utilized to protect cloud computing
applications. A 16 byte (128 bit) key is required to encrypt the data
using the 128 bit block cipher technique. Comparing the experimental
findings of the proposed method to the commonly used cloud computing
cryptographic systems revealed a strong security level.
1 Introduction
This growth has led to the creation of several distributed network models, archi-
tectures, and infrastructures, including network, pervasive, autonomous, cloud,
etc. A computing network that is generally connected through the Internet
and shares a decentralized selection of services provided by an organization to
meet customer demands is referred to as the ”cloud.” The personal journal
The NIST idea of cloud computing is a framework for delivering all-pervasive,
quick, and on-demand network access to a shared set of reconfigurable com-
puting resources.These tools may be used by a cloud client upon request to
create, maintain, and host services and applications that may be customized
anywhere and on any device. The NIST ”concept” places a focus on the three
different service models of infrastructure-as-a-service, platform-as-a-service, and
software-as-a-service that also deliver cloud services to the customer through a
cloud service provider client.
Sharing cloud computing services actually makes it more difficult to keep
them safe and protected from unauthorized access or use. One of the main
security concerns with cloud computing is network security, which has to do
with both internal and external assaults.
1
According to (ISO), describes Data Security concerns which can likewise be
guided in regards to the cloud computing essential security requirements for a
successful and secure innovation technology solution.
3 Related work
This section consists of two sub-sections: one presents cloud computing security-
related work, and the other presents available lightweight cryptographic systems-
related work.
2
4 Powerful encryption algorithm prerequisites
Any encryption algorithm must satisfy some set of specifications to provide
high security. The following criteria have been defined, based on the current
literature, that should be fulfilled by the newly developed algorithm:
• Encryption of the entire character set as an item
3
5.2 Encryption Block
The encryption process takes place after producing the sub-keys (KK1, KK2
. . . KKK) from the key generation process. Easy processes, like, XOR, XNOR,
AND, OR, left shift (LS), swapping, and substitution (S boxes), are conducted
throughout the encryption process to create confusion and diffusion. These
operations increase complexity and create confusion for the attackers.
• (Initial state steps): Each sub-block is addressed using working key sub-
keys (KK1, KK2,... KKK) by combining operations from various algebraic
groups, which are AND, OR, XOR, and XNOR operations.
• Ro11 is the output of XNOR between P0–31 and K1, The product (Ro11)
feeds F-Function to produce EFL1
• Ro14 is the output of XNOR between P96–127 and K1, The product
(Ro14) feeds F-Function to produce EFR1.
5.3 Decryption
The computational procedure used for the decryption of the cipher-text block
is exactly the same as the Mi block encryption method. The 128-bit-long Ci
block is first split into 4 sub-blocks, and then handled with the same working
keys using mixed XOR and Sub operations. And since they are the reverse of
the encryption operation, the precise steps for the procedure would not need to
be written.
4
6.3 Comparative analysis of parameters
The NLCA algorithm reduces computational complexity and decreases the power
of processing. It has a clear architecture that includes five rounds of encryp-
tion; each round requires simple mathematical procedures. This is because
most mathematical operations are based on 4-bit data, and S-boxes are only
4-by-4 sizes. The NLCA algorithm allows various block and key lengths that
are not provided by most. symmetric algorithms, such as ”AES, LED, DES,
3DES,B̊lowfish.” The data processing time generated by the encryption and the
key generation time for the new algorithm are also faster than other algorithms
with secure key generation.
7 Conclusion
The NLCA algorithm has proven to have strong security levels and a definite
improvement in encryption/decryption, offering high security and cheap com-
puting cost, according to experimental data. A 16-byte (128-bit) key is required
to encrypt the data using the 16 byte (128-bit) block cipher technique. A new
lightweight cryptographic algorithm (NLCA) was used to improve data security
in the context of cloud computing. Other factors were block size, key length,
potential key, mathematical operations, cipher type, and security power. Cloud
computing security has emerged as one of the primary problems with the tech-
nology. In the world of cloud computing, it is much more useful because of
its quick data collection and processing. Numerous procedures and methods,
including cryptography—the most successful—have been suggested.