Cargando…

Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding

Modern, commonly used cryptosystems based on encryption keys require that the length of the stream of encrypted data is approximately the length of the key or longer. In practice, this approach unnecessarily complicates strong encryption of very short messages commonly used for example in ultra-low-...

Descripción completa

Detalles Bibliográficos
Autores principales: Krokosz, Tomasz, Rykowski, Jarogniew, Zajęcka, Małgorzata, Brzoza-Woch, Robert, Rutkowski, Leszek
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10490581/
https://www.ncbi.nlm.nih.gov/pubmed/37687864
http://dx.doi.org/10.3390/s23177408
_version_ 1785103872772014080
author Krokosz, Tomasz
Rykowski, Jarogniew
Zajęcka, Małgorzata
Brzoza-Woch, Robert
Rutkowski, Leszek
author_facet Krokosz, Tomasz
Rykowski, Jarogniew
Zajęcka, Małgorzata
Brzoza-Woch, Robert
Rutkowski, Leszek
author_sort Krokosz, Tomasz
collection PubMed
description Modern, commonly used cryptosystems based on encryption keys require that the length of the stream of encrypted data is approximately the length of the key or longer. In practice, this approach unnecessarily complicates strong encryption of very short messages commonly used for example in ultra-low-power and resource-constrained wireless network sensor nodes based on microcontrollers (MCUs). In such cases, the data payload can be as short as a few bits of data while the typical length of the key is several hundred bits or more. The article proposes an idea of employing a complex of two algorithms, initially applied for data compression, acting as a standard-length encryption key algorithm to increase the transmission security of very short data sequences, even as short as one or a few bytes. In this article, we present and evaluate an approach that uses LZW and Huffman coding to achieve data transmission obfuscation and a basic level of security.
format Online
Article
Text
id pubmed-10490581
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-104905812023-09-09 Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding Krokosz, Tomasz Rykowski, Jarogniew Zajęcka, Małgorzata Brzoza-Woch, Robert Rutkowski, Leszek Sensors (Basel) Article Modern, commonly used cryptosystems based on encryption keys require that the length of the stream of encrypted data is approximately the length of the key or longer. In practice, this approach unnecessarily complicates strong encryption of very short messages commonly used for example in ultra-low-power and resource-constrained wireless network sensor nodes based on microcontrollers (MCUs). In such cases, the data payload can be as short as a few bits of data while the typical length of the key is several hundred bits or more. The article proposes an idea of employing a complex of two algorithms, initially applied for data compression, acting as a standard-length encryption key algorithm to increase the transmission security of very short data sequences, even as short as one or a few bytes. In this article, we present and evaluate an approach that uses LZW and Huffman coding to achieve data transmission obfuscation and a basic level of security. MDPI 2023-08-25 /pmc/articles/PMC10490581/ /pubmed/37687864 http://dx.doi.org/10.3390/s23177408 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Krokosz, Tomasz
Rykowski, Jarogniew
Zajęcka, Małgorzata
Brzoza-Woch, Robert
Rutkowski, Leszek
Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding
title Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding
title_full Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding
title_fullStr Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding
title_full_unstemmed Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding
title_short Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding
title_sort cryptographic algorithms with data shorter than the encryption key, based on lzw and huffman coding
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10490581/
https://www.ncbi.nlm.nih.gov/pubmed/37687864
http://dx.doi.org/10.3390/s23177408
work_keys_str_mv AT krokosztomasz cryptographicalgorithmswithdatashorterthantheencryptionkeybasedonlzwandhuffmancoding
AT rykowskijarogniew cryptographicalgorithmswithdatashorterthantheencryptionkeybasedonlzwandhuffmancoding
AT zajeckamałgorzata cryptographicalgorithmswithdatashorterthantheencryptionkeybasedonlzwandhuffmancoding
AT brzozawochrobert cryptographicalgorithmswithdatashorterthantheencryptionkeybasedonlzwandhuffmancoding
AT rutkowskileszek cryptographicalgorithmswithdatashorterthantheencryptionkeybasedonlzwandhuffmancoding