Asian Journal of Engineering and Technology Innovation

Asian Journal of Engineering and Technology Innovation

E-mail: editor@ajetijournal.com
Publisher Home

An Encryption cum Hash Function Using Permutation Parity Machine

Shiffin N, Y Sree Chaitanya, Rajat Pandey, Ravi Jha

Reva Institute of Technology and Management, Rukmini Knowledge Park, Kattigenahalli, Yelahanka, Near Border Security Bustop, Bengaluru, Karnataka-560064, India.

Abstract

In the modern world computing has become pervasive and has led to expansive usage of resource constraint devices like RFID devices, IoT devices, embedded systems and other smart devices. Though these devices allow us to run a variety of services with ease, there is a lot of sensitive information that is accessed through these resource constraint devices raising security concerns.The traditional cryptographic techniques are too big, too slow or too energy-consuming for efficient use on such devices. In this paper we present a novel technique to address this issue. We propose use of Permutation Parity Machine (Neural cryptographic technique) for key exchange, encryption and hash functions.Subsequently we demonstrate its performance against common types of attacks and the results of testing it against standard NIST test suites.

Keywords:
-
Powered By
Acadwise

Subscribe to our newsletter and stay up to date with the latest news and deals!

Connect via