Cargando…
Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding
Modern, commonly used cryptosystems based on encryption keys require that the length of the stream of encrypted data is approximately the length of the key or longer. In practice, this approach unnecessarily complicates strong encryption of very short messages commonly used for example in ultra-low-...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10490581/ https://www.ncbi.nlm.nih.gov/pubmed/37687864 http://dx.doi.org/10.3390/s23177408 |
_version_ | 1785103872772014080 |
---|---|
author | Krokosz, Tomasz Rykowski, Jarogniew Zajęcka, Małgorzata Brzoza-Woch, Robert Rutkowski, Leszek |
author_facet | Krokosz, Tomasz Rykowski, Jarogniew Zajęcka, Małgorzata Brzoza-Woch, Robert Rutkowski, Leszek |
author_sort | Krokosz, Tomasz |
collection | PubMed |
description | Modern, commonly used cryptosystems based on encryption keys require that the length of the stream of encrypted data is approximately the length of the key or longer. In practice, this approach unnecessarily complicates strong encryption of very short messages commonly used for example in ultra-low-power and resource-constrained wireless network sensor nodes based on microcontrollers (MCUs). In such cases, the data payload can be as short as a few bits of data while the typical length of the key is several hundred bits or more. The article proposes an idea of employing a complex of two algorithms, initially applied for data compression, acting as a standard-length encryption key algorithm to increase the transmission security of very short data sequences, even as short as one or a few bytes. In this article, we present and evaluate an approach that uses LZW and Huffman coding to achieve data transmission obfuscation and a basic level of security. |
format | Online Article Text |
id | pubmed-10490581 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-104905812023-09-09 Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding Krokosz, Tomasz Rykowski, Jarogniew Zajęcka, Małgorzata Brzoza-Woch, Robert Rutkowski, Leszek Sensors (Basel) Article Modern, commonly used cryptosystems based on encryption keys require that the length of the stream of encrypted data is approximately the length of the key or longer. In practice, this approach unnecessarily complicates strong encryption of very short messages commonly used for example in ultra-low-power and resource-constrained wireless network sensor nodes based on microcontrollers (MCUs). In such cases, the data payload can be as short as a few bits of data while the typical length of the key is several hundred bits or more. The article proposes an idea of employing a complex of two algorithms, initially applied for data compression, acting as a standard-length encryption key algorithm to increase the transmission security of very short data sequences, even as short as one or a few bytes. In this article, we present and evaluate an approach that uses LZW and Huffman coding to achieve data transmission obfuscation and a basic level of security. MDPI 2023-08-25 /pmc/articles/PMC10490581/ /pubmed/37687864 http://dx.doi.org/10.3390/s23177408 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Krokosz, Tomasz Rykowski, Jarogniew Zajęcka, Małgorzata Brzoza-Woch, Robert Rutkowski, Leszek Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding |
title | Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding |
title_full | Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding |
title_fullStr | Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding |
title_full_unstemmed | Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding |
title_short | Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding |
title_sort | cryptographic algorithms with data shorter than the encryption key, based on lzw and huffman coding |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10490581/ https://www.ncbi.nlm.nih.gov/pubmed/37687864 http://dx.doi.org/10.3390/s23177408 |
work_keys_str_mv | AT krokosztomasz cryptographicalgorithmswithdatashorterthantheencryptionkeybasedonlzwandhuffmancoding AT rykowskijarogniew cryptographicalgorithmswithdatashorterthantheencryptionkeybasedonlzwandhuffmancoding AT zajeckamałgorzata cryptographicalgorithmswithdatashorterthantheencryptionkeybasedonlzwandhuffmancoding AT brzozawochrobert cryptographicalgorithmswithdatashorterthantheencryptionkeybasedonlzwandhuffmancoding AT rutkowskileszek cryptographicalgorithmswithdatashorterthantheencryptionkeybasedonlzwandhuffmancoding |