International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 6, June 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Secure Encryption through Gray Codes and BigIntegers for IoT Devices

[Full Text]



Hirendra Singh Sengar, Dr. D.N.Goswami, Dr. Anshu Chaturvedi



BigIntegers, Cryptanalysis, Cryptanalytical attacks, Encryption, Gray codes, Prime numbers, Randomization



Cryptography is essential because it allows protection of data securely so that unauthorized person cannot have access to it which ensures the protection of corporate secrets. In this paper, Binary code conversions based cryptography technique has been developed which provides security through binary codes like gray codes. Furthermore, security has been enhanced by the utility of prime numbers and BigInteger values. The designed technique protects the alphanumeric data against various cryptanalytical attacks. Proposed work includes symmetric key technique. The benefit of using symmetric key algorithm is faster execution time as compare to asymmetric key algorithm. It also work on stream ciphers those are faster when compared to block ciphers. Performance and security analysis when compared to other schemes shows that the proposed scheme is more powerful, efficient and secure than other related schemes.



[1] Patel, P., Patel, R. & Patel, N 2015, ‘Integrated ECC and Blowfish for Smartphone Security’, Procedia Computer Science, ELSEVIER, pp.210-216.
[2] https://www.expertsexchange.com/articles/12460/Cryptanalysis-and-Attacks.html
[3] Chandra, S., Mandal, B., Alam, Sk. & Bhattacharyya, S 2015, ‘Content based double encryption algorithm using symmetric key cryptography’, Procedia Computer Science, ELSEVIER, pp.1228-1234.
[4] Laiphrakpam, D. & Khumanthem M 2016, ‘Cryptanalysis of symmetric key image encryption using chaotic Rossler system’, Optik, vol 7, issue 11, pp. 200-209.
[5] Mandal K.M., Kar M., Singh K.S. & Varnwal K.V. 2014, ‘Symmetric key image encryption using chaotic Rossler system’, Security and Communication Networks, vol 7, pp. 2145–2152.
[6] Ammar, M. & Rusello G 2018, ‘Internet of Things: A survey on the security of IoT frameworks’, Journal of information security and applications, ELSEVIER, pp. 8-27.
[7] Boruchinkin, A., Tolstaya, A & Zhgilev A 2018, ‘Cryptographic Wireless Communication Device’, Proc. 8th Annual International Conference on Biologically Inspired Cognitive Architectures (BICA), pp. 110-115.
[8] J., M., Al-Muhammed & Zitar, R 2017, ‘k-Lookback random-based text encryption technique’, Journal of King Saud University – Computer and Information Sciences, vol 31, pp. 92-104.
[9] Kushwaha, A., Sharma, H. & Ambhaikar, A 2016, ‘A Novel Selective Encryption Method for Securing Text over Mobile Ad hoc Network’, Proc. 7th International Conference on Communication, Computing and Virtualization, 2016, 79, pp. 16-23.
[10] Riyaldhi, R., Rojali & Kurniawan, A 2017, ‘Improvement of Advanced Encryption Standard Algorithm with Shift Row and S.BOX modification mapping in mix column’, Proc. International Conference on Computer Science and Computation al Intelligence(ICCSCI), pp. 401-407.
[11] Liwandouw, V. & Wowor, A 2017, ‘The Existence Of Cryptography: A Study On Instant Messaging’, Proc. 4th Information Systems International Conference (ISICO), pp. 721-727.
[12] Starikovskiy, A., Zhgilev, A. & Shevchenko, N 2018, ‘Text Messages Protection System’, Proc. 8th Annual International Conference on Biologically Inspired Cognitive Architectures (BICA), 2018, pp. 457-466.
[13] Sliming, D. & Melaka, F 2018, ‘Encryption of speech signal with multiple secret keys’, Proc. International Conference Natural Language and Speech Processing (ICNLSP), pp. 79-88.
[14] Nathanael, D., Faisal & Soriano, D 2018, ‘Text Encryption in Android Chat Applications using elliptical Curve Cryptography (ECC)’, Proc. 3rd International Conference on Computer Science and Computational Intelligence, pp. 283-291.
[15] Thangarajan, S. & Bhaaskaran, V 2018, ‘High Speed and Low Power Implementation of AES for Wireless Sensor Networks’, Proc. 8th International Conference on Advances in Computing and Communication (ICACC), pp. 736-743.
[16] Hraoui, S., Gmira, F., Abbou, M., Oulidi A. & Jarjar A 2018, ‘A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm’, Proc. Second International Conference on Intelligent Computing in Data Sciences (ICDS), pp. 399-408.
[17] Rizk. R. & Alkady, Y 2015, ‘Two-phase hybrid cryptography algorithm for wirelesssensor networks’, Journal of Electrical Systems and Information Technology, vol 2, pp. 296–313.
[18] Mishra M. & Mankar V 2015, ‘Text encryption algorithms based on Pseudo Random Number Generator’, International Journal of Computer Applications, vol 111, pp. 1-6.
[19] Tiwari R. & Sinhal A 2016, ‘Block Based text data partition with RC4 encryption for text data security’, International Journal of Advanced Computer Research, vol 6, pp. 107-113.
[20] Kumari S 2017, ‘A research paper on cryptography encryption and compression techniques’, International journal of engineering and computer science, vol 6, pp. 20915-20919.
[21] Vijayan A., Gobinath T. & Saravanakarthikeyan M. 2016, ‘International journal of engineering research and applications’, ASCII value based encryption system (AVB), vol 6, pp. 08-11.
[22] Elhoseny M., Yuan X., El Minir. H. & Riad A 2016, ‘An energy efficient encryption method for secure dynamic WSN’, Security and communication networks, vol 9, pp. 2024-2031
[23] Ahmad M. & Tipathi M 2018, ‘Development of encryption and decryption technique to secure the confidential data’, International journal of advanced research in computer science, vol 9, pp. 60-63