Brisk: Dynamic encryption based cipher for long term security

Ashutosh Dhar Dwivedi*

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

15 Downloads (Pure)


Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal. The majority of standard cryptographic algorithms do not fit with these constrained devices due to heavy cryptographic components. In this paper, a new block cipher, BRISK, is proposed with a block size of 32-bit. The cipher design is straightforward due to simple round operations, and these operations can be efficiently run in hardware and suitable for software. Another major concept used with this cipher is dynamism during encryption for each session; that is, instead of using the same encryption algorithm, participants use different ciphers for each session. Professor Lars R. Knudsen initially proposed dynamic encryption in 2015, where the sender picks a cipher from a large pool of ciphers to encrypt the data and send it along with the encrypted message. The receiver does not know about the encryption technique used before receiving the cipher along with the message. However, in the proposed algorithm, instead of choosing a new cipher, the process uses the same cipher for each session, but varies the cipher specifications from a given small pool, e.g., the number of rounds, cipher components, etc. Therefore, the dynamism concept is used here in a different way.

Original languageEnglish
Article number5744
Issue number17
Number of pages19
Publication statusPublished - 1 Sep 2021
Externally publishedYes

Bibliographical note

Funding Information: Funding: This work is supported by a grant from the Independent Research Fund Denmark for Technology and Production, grant no. 8022-00348A. Publisher Copyright: © 2021 by the author. Licensee MDPI, Basel, Switzerland.

Cite this