Home > Published Issues > 2020 > Volume 15, No. 10, October 2020 >

Implementing IoT Lottery on Data Encryption Standard

Mohammed M. Alani 1, Muath Alrammal2, and Munir Naveed 2
1. Senior Member of ACM, Abu Dhabi, UAE
2. Higher Colleges of Technology, Abu Dhabi, 41012, UAE

Abstract—As the number of IoT devices grow rapidly, and soon to exceed 40 billion, security challenges grow rapidly as well. One challenge proven to wreak havoc in the past few years is the use of IoT devices as attacking tools. This paper presents the results of implementing a brute-force attack on Data Encryption Standard using clusters of IoT devices. The implementation presented was successful. Results have shown that a cluster size of 200 IoT devices was able on average to find the key within 350 seconds. Another experiment of a cluster of 2000 IoT devices succeeded in finding the key within 0.015 seconds.

Index Terms—IoT, security, IoT security, DES, data encryption standard, brute-force attack

Cite: Mohammed M. Alani, Muath Alrammal, and Munir Naveed, "Implementing IoT Lottery on Data Encryption Standard," Journal of Communications vol. 15, no. 10, pp. 735-740, October 2020. Doi: 10.12720/jcm.15.10.735-740

Copyright © 2020 by the authors. This is an open access article distributed under the Creative Commons Attribution License (CC BY-NC-ND 4.0), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.