A Secure Self-Encryption Scheme for Resource Limited Mobile Devices

  • Yongjoo Shin
  • Seungjae Shin
  • Minsoo Kim
  • Hyunsoo Yoon
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 215)


Recently, IT and mobile technology are developed rapidly. Mobile devices such as a smartphone and tablet PC have become widely popular, and many people store their private information into the devices. However, the portability and mobility of devices take risks such as being lost or stolen. These devices are the one of main cause to leak the sensitive and confidential information. To protect the information leakage from devices, the encryption algorithm is required. The existing encryption algorithms take long delay time and heavy battery consumption in mobile devices with restricted resources. Previously, the Self-Encryption (SE) which is a lightweight encryption algorithm for mobile devices was proposed, which had critical weaknesses. This paper proposes a novel SE scheme with a random permutation and bit-flipping process. Our proposed scheme derives the keystream from the plaintext itself, but the statistical correlations are effectively removed from the novel randomization process. It gives a solution to overcome weaknesses of the original SE scheme and the complexity to make adversaries it difficult to launch a brute force attack, and satisfies a 0/1 uniformity of key and cipher stream, which is an important property of the secure stream cipher. Moreover, it is faster and more energy-efficient than other ciphers such as AES and RC4. The evaluation is performed by the Android platform. The delay time and the battery consumption are measured and analyzed, which show that the proposed scheme is secure and best suited to the mobile platform.


Data security Lightweight encryption Mobile device 



This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MEST). (No. 2012-0005390).


  1. 1.
    Chen Y, Ku WS (2009) Self-encryption scheme for data security in mobile devices. In: IEEE consumer communication and networking conference (CCNC)Google Scholar
  2. 2.
    Gasti P, Chen Y (2010) Breaking and fixing the self-encryption scheme for data security in mobile devices. In: Proceedings of the 18th Euromicro conference on parallel, distributed and network-based processing (PDP)Google Scholar
  3. 3.
    3GPP Std. TS33.220 v11.3.0 (2012) Generic authentication architecture (GAA); generic bootstrapping architecture (GBA)Google Scholar
  4. 4.
    Stallings W (2003) Cryptography and network security, 3 edn. Prentice Hall, Philadelphia, pp 43–44, 66–67, 192–194Google Scholar
  5. 5.
    Knuth DE (1998) The art of computer programming. Seminumerical algorithms, vol 2. Addison-WeseleyGoogle Scholar
  6. 6.
    Wilson MC (2005) Overview of sattolo’s algorithm. Technical Report 5542, INRIAGoogle Scholar
  7. 7.
    Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Katz J, Lindell Y (2007) Introduction to modern cryptography. Chapman and Hall/CRC, Boca RatonGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  • Yongjoo Shin
    • 1
  • Seungjae Shin
    • 1
  • Minsoo Kim
    • 1
  • Hyunsoo Yoon
    • 1
  1. 1.Department of Computer ScienceKAISTDaejeonSouth Korea

Personalised recommendations