Home > Vol 18, No 2 > Guma'a Dynamic keys generation for internet of things Omar Sapti Guma'a, Qasim Mohammed Hussein, Ziyad Tariq Mustafa Abstract In several aspects, interest in IoT has become considerable by researchers and academics in recent years. Data security becomes one of the important challenges facing development of IoT environment. Many algorithms were proposed to secure the IoT applications. The traditional public key cryptographic are inappropriate because it requires high computational. Therefore, lattice-based public-key cryptosystem (LB- PKC) is a favorable technique for IoT security. NTRU is one of a LB-PKC that based on truncated polynomial ring, it has good features, which make it to be an effective alternative to the RSA and ECC algorithms. But, there is LLL algorithm can success to attack it under certain conditions. This paper proposes modifications to NTRU public key cryptosystem to be secure against the lattice-based attack by using LLL algorithm, as well as a method for generating a new keys sequence dynamically. The results from simulations show that the performance of these modifications gives more secure from NTRU. Keywords IoT; NTRU; Security; Attack; Lattice-based; LLL algorithm Available at: http://ijeecs.iaescore.com/index.php/IJEECS/article/view/20871 REFERENCES [1] Mohd Muntjir, Mohd Rahul, and Hesham A. Alhumyani, " An Analysis of Internet of Things (IoT): Novel Architectures, Modern Applications, Security Aspects and Future Scope with Latest Case Studies", International Journal of Engineering Research & Technology (IJERT), Vol. 6 Issue 06, June 2017, pp. 422- 447. [2] Nada Qasim Mohammed, Qasim Mohammed Hussein, Ahmed M. Sana, Layth A. Khalil, A Hybrid Approach to Design Key Generator of Cryptosystem, Journal of Computational and Theoretical Nanoscience, Volume 16, Number 3, March 2019, pp. 971-977(7). [3] Christian Dancke Tuen, Security in Internet of Things Systems, Norwegian University of Science and Technology, 2015. [4] R. Chaudhary, G. S. Aujla, N. Kumar and S. Zeadally, "Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions," in IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4897- 4909, June 2019. [5] Joel J. P. C. Rodrigues, Amjad Gawanmeh, Kashif and Sazia Parvin, "Smart Devices, Applications, and Protocols for the IoT", USA, IGI Global, Engineering science reference(an imprint of IGI Global), 2019, P.P. 97. [6] Abdul Monem S. Rahm, Qasim Mohammed Hussein, “A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information", Engineering & Technology Journal,Vol.28, No.6, 2010. [7] Arjen Klaas Lenstra, Hendrik Willem Lenstra, and La'szlo' Lova'sz. Factoring polynomials with rational coefficients. Mathematische Annalen, 261(4):515- 534, 1982.