z-logo
open-access-imgOpen Access
Adaptive Multi-Applications Cryptographic System
Author(s) -
Basil Al-Kasasbeh
Publication year - 2021
Publication title -
international journal of advances in soft computing and its applications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.15
H-Index - 18
eISSN - 2710-1274
pISSN - 2074-8523
DOI - 10.15849/ijasca.211128.03
Subject(s) - computer science , cryptography , encryption , computer network , identifier , ciphertext , distributed computing , computer security
Cryptography is the core method utilized to protect the communications between different applications, terminals, and agents distributed worldwide and connected via the internet. Yet, with the distribution of the low-energy and low-storage devices, in the Internet-of-Things (IoT), the cryptography protocols cannot be implemented because of the power constraints or because the implementation is beyond the time constraints that hindered their usability of these protocols in real-time critical applications. To solve this problem, an Adaptive Multi-Application Cryptography System is proposed in this paper. The proposed system consists of the requirements identifier and the implementer, implemented on the application and transportation layer. The requirement identifier examines the header of the data, determines the underlying application and its type. The requirements are then identified and encoded according to four options: high, moderate, low, and no security requirements. The inputs are processed, and ciphertext is produced based on the identified requirements and the suitable cryptography algorithm. The results showed that the proposed system reduces the delay by 97% relative to the utilized algorithms' upper-bound delay.Keywords: Cryptography, symmetric key encryption, block cipher, delay and performance, quantum computing.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here