Skip to main content
Top

2023 | OriginalPaper | Chapter

Alternate Tiny Encryption Algorithm: A Modified Tiny Encryption Algorithm for Improved Data Security

Authors : Mehak Gupta, Nimit Agrawal, Manas Ranjan Prusty

Published in: Intelligent Cyber Physical Systems and Internet of Things

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this era of Industry 4.0, securing file data is very crucial in today’s environment with respect to data transfer of Internet of Things (IoT) devices. Over the years with the evolution of technology and file storage systems, many algorithms have been used for encryption and decryption processes for securing the file data, each with its methodologies, advantages, and limitations. An efficient algorithm has very few limitations thus making it a top choice for usage. In this paper, we have proposed a symmetric key cryptographic algorithm called the Alternate Tiny Encryption Algorithm (ATEA) focusing on a strong approach for safekeeping of the file data and minimizing the weak points of the existing Tiny Encryption Algorithm (TEA) and Extended Tiny Encryption Algorithm (XTEA). The Alternate Tiny Encryption Algorithm (ATEA) is a Feistel cipher that utilizes mixed algebraic group operations. The algorithm is simple enough to incorporate into practically any computer program and can be quickly translated into a variety of languages. It uses a unique key generation technique making the encryption of file data more secure.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Liu S, Gavrylyako O, Bradford P (2004) Implementing the TEA algorithm on sensors. In: Proceedings of the 42nd annual Southeast regional conference, pp 64–69 Liu S, Gavrylyako O, Bradford P (2004) Implementing the TEA algorithm on sensors. In: Proceedings of the 42nd annual Southeast regional conference, pp 64–69
2.
go back to reference Sharma M, Arora JB (2017) Cryptography and its desirable properties in terms of different algorithm. IITM J Manag IT 75–81 Sharma M, Arora JB (2017) Cryptography and its desirable properties in terms of different algorithm. IITM J Manag IT 75–81
3.
go back to reference Ramanujam S, Karuppiah M (2011) Designing an algorithm with high avalanche effect. IJCSNS Int J Comput Sci Netw Secur 106–111 Ramanujam S, Karuppiah M (2011) Designing an algorithm with high avalanche effect. IJCSNS Int J Comput Sci Netw Secur 106–111
4.
go back to reference Narendra K, Pareek VP, Sud K (2010) Block cipher using 1D and 2D chaotic maps. Int J Inf Commun Technol 2(3):244 Narendra K, Pareek VP, Sud K (2010) Block cipher using 1D and 2D chaotic maps. Int J Inf Commun Technol 2(3):244
5.
go back to reference Shoeb M, Gupta VK (2019) A crypt analysis of the tiny encryption algorithm in key generation. Int J Commun Comput Technol 01(01) Shoeb M, Gupta VK (2019) A crypt analysis of the tiny encryption algorithm in key generation. Int J Commun Comput Technol 01(01)
6.
go back to reference Wheeler D, Needham R (2004) TEA, a tiny encryption algorithm. In: Proceedings of the fast software encryption: second international workshop. Lecture notes in computer science, vol 1008, pp 363–366 Wheeler D, Needham R (2004) TEA, a tiny encryption algorithm. In: Proceedings of the fast software encryption: second international workshop. Lecture notes in computer science, vol 1008, pp 363–366
7.
go back to reference Moon MD, Hwang K, Lee W, Lee S, Lim J (2002) Impossible differential cryptanalysis of reduced round XTEA and TEA. In: Daemen J, Rijmen V (eds) FSE 2002. LNCS, vol 2365. Springer, pp 49–60 Moon MD, Hwang K, Lee W, Lee S, Lim J (2002) Impossible differential cryptanalysis of reduced round XTEA and TEA. In: Daemen J, Rijmen V (eds) FSE 2002. LNCS, vol 2365. Springer, pp 49–60
8.
go back to reference Kelsey J, Schneider B, Wagner D (1997) Related-key cryptanalysis of 3-way, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Proceedings of the first international conference on information and communication security. Lecture notes in computer science, vol 1334, pp 233–246 Kelsey J, Schneider B, Wagner D (1997) Related-key cryptanalysis of 3-way, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Proceedings of the first international conference on information and communication security. Lecture notes in computer science, vol 1334, pp 233–246
9.
go back to reference Lee E, Hong D, Chang D, Hong S, Lim J (2006) A weak key class of XTEA for a related- key rectangle attack. In: Nguyen PQ (ed) VIETCRYPT 2006. LNCS, vol 4341. Springer, pp 286–297 Lee E, Hong D, Chang D, Hong S, Lim J (2006) A weak key class of XTEA for a related- key rectangle attack. In: Nguyen PQ (ed) VIETCRYPT 2006. LNCS, vol 4341. Springer, pp 286–297
10.
go back to reference Hossain MA, Islam MK, Dasand SK, Nashiry MA (2012) Cryptanalyzing of message digest algorithms MD4 and MD5. Int J Crypt Inf Secur (IJCIS) 2(1) Hossain MA, Islam MK, Dasand SK, Nashiry MA (2012) Cryptanalyzing of message digest algorithms MD4 and MD5. Int J Crypt Inf Secur (IJCIS) 2(1)
11.
go back to reference Sriramya P, Karthika RA (2015) Providing password security by salted password hashing using Bcrypt algorithm. ARPN J Eng Appl Sci 10(13) Sriramya P, Karthika RA (2015) Providing password security by salted password hashing using Bcrypt algorithm. ARPN J Eng Appl Sci 10(13)
12.
go back to reference Boonkrong S (2012) Security of passwords. Inf Technol J 112–117 Boonkrong S (2012) Security of passwords. Inf Technol J 112–117
13.
go back to reference Benson E, Marcus A, Karger D, Madden S (2010) Sync kit: a persistent client-side database caching toolkit for data intensive websites. In: Proceedings of the 19th International conference on world wide web, USA, Apr 2010 Benson E, Marcus A, Karger D, Madden S (2010) Sync kit: a persistent client-side database caching toolkit for data intensive websites. In: Proceedings of the 19th International conference on world wide web, USA, Apr 2010
14.
go back to reference Zaman RU, Utkarsh P, Tanwani L, Kumar A (2017) Data encryption and file sharing. Int Res J Eng Technol (IRJET) 04(05) Zaman RU, Utkarsh P, Tanwani L, Kumar A (2017) Data encryption and file sharing. Int Res J Eng Technol (IRJET) 04(05)
15.
go back to reference Ramanujam S, Karuppiah M (2011) Designing an algorithm with high Avalanche effect. Int J Comput Sci Netw Secur (IJCSNS) 11(1) Ramanujam S, Karuppiah M (2011) Designing an algorithm with high Avalanche effect. Int J Comput Sci Netw Secur (IJCSNS) 11(1)
Metadata
Title
Alternate Tiny Encryption Algorithm: A Modified Tiny Encryption Algorithm for Improved Data Security
Authors
Mehak Gupta
Nimit Agrawal
Manas Ranjan Prusty
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_32

Premium Partner