CASC 3N Vs. 4N: Effect of Increasing Cellular Automata Neighborhood Size on Cryptographic Strength

Total Page:16

File Type:pdf, Size:1020Kb

CASC 3N Vs. 4N: Effect of Increasing Cellular Automata Neighborhood Size on Cryptographic Strength (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 4, 2020 CASC 3N vs. 4N: Effect of Increasing Cellular Automata Neighborhood Size on Cryptographic Strength Fatima Ezzahra Ziani1, Anas Sadak2, Charifa Hanin3, Bouchra Echandouri4, Fouzia Omary5 Computer Science Department University Mohammed V Rabat, Morocco Abstract—Stream ciphers are symmetric cryptosystems that 3Neighborhood configurations [4]. Accordingly, this article rely on pseudorandom number generators (PRNGs) as a primary presents two versions of Cellular Automata-based Stream building block to generate a keystream. Stream ciphers have Cipher (3-CASC and 4-CASC). These versions were analysed been extensively studied and many designs were proposed and investigated to identify differences between their throughout the years. One of the popular designs used is the cryptographic properties and statistical analysis as well as combination of linear feedback shift registers (LFSRs) and their resistance against attacks targeting stream ciphers. nonlinear feedback shift registers (NFSRs). Although this design is suitable for both software and hardware implementation and The study of the 4Neighborhood 1-dimensional CA rules provides a good randomness behavior, it is still subject to attacks is a challenging task. The authors chose the rules according to such as fault attacks and correlations attacks. Cellular automata the recommendations in [5] for the 3-CASC version. Then, (CAs) based stream ciphers are another design class that has these rules are combined with a new variable to get the been proposed. CAs display good cryptographic properties as 4Neighborhood 1-dimensional CA rules. Section 2 details this well as a good randomness behavior, also high computational step. The N-CASC design, which was inspired by grain-like speed and a higher level of security. The use of CAs as CA-based ciphers, consists of three building blocks: a linear cryptographic primitives is not recent and has been thoroughly block, a nonlinear block, and a mixing block. For the linear investigated, especially the use of three-neighborhood one- block and nonlinear block, only linear rules and nonlinear dimensional cellular automata. In this article, the authors rules are used respectively. For the mixing block, a hybrid investigate the impact of increasing the neighborhood size of CAs ruleset with both linear and nonlinear rules is adopted. on the security level and the cryptographic properties provided. Thereafter, four-neighborhood one-dimensional CAs are studied The goal of the article is to look at the effect of and a stream cipher algorithm is proposed. The security of the transitioning from the 3N version to the 4N version on the proposed algorithm is demonstrated by using the results of cryptographic properties as well as the statistical features of standard tests (i.e. NIST Test Suite and Dieharder Battery of the stream cipher proposed. Tests), particularly by computing the cryptographic properties of the used CAs and by showing the resistance of the suggested The rest of this article is organized as follows: algorithm to mostly known attacks. Section II presents cellular automata and cryptographic Keywords—Stream ciphers; cellular automata; neighborhood properties. Section III provides related works. Section IV size; dieharder; NIST STS; cryptographic properties; attacks on details the design of the proposed scheme. Section V displays stream ciphers the results including the statistical test, the avalanche effect, and the cryptographic properties. Section VI shows the I. INTRODUCTION security analysis of the proposed scheme. In stream ciphers design, fast encryption and simplicity are II. BACKGROUND particularly essential criteria. To get a ciphertext, a stream cipher processes by applying the XOR operation to the A. Cellular Automata plaintext with the keystream. This latter is generated by a Cellular automata are dynamic systems that were first PRNG that should provide good randomness and a good introduced in the 1950s by John von Neumann and later security level. The strength of a stream cipher resides in the popularized by Stephen Wolfram in the 1980s [6]. They were robustness of the strength of the PRNG [1]. The outstanding first studied for the modeling of biological self-reproduction primitive recommended to use for the design of a PRNG is by von Neumann upon Stanislas Ulam recommendations [7]. Cellular Automaton. Since then, they were used in different fields such as physics, Thanks to the simplicity producing the complex behaviour chemistry, mathematics, biology etc. … to model and solve of cellular automata (CA), especially the one-dimensional physical, natural and real-life problems [6]. Researchers took 3Neighborhood CAs which are widely used in the field of interest in cellular automata because of the complex global cryptography. They were studied [2-4] to ensure a good behavior that stems from simple interactions and computations security level. However, some attacks are inevitable in at the cellular level. Moreover, global properties such as 308 | P a g e www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 4, 2020 4 universality in computation and randomness explains the 22 = 65535 total rules. Table II shows an example of a linear attraction of the scientific community [8]. and a non-linear rule (left skewed). A cellular automaton is a finite set of n cells arranged as a One way to visualize the evolution of a cellular automaton network that evolve in discrete space and time. Formally, a is to use a space/time diagram. In a space/time diagram the cellular automaton is a tuple (L, S, N, f, R) [6], where: cellular space lies on the x-axis, with different colors for each L is the d-dimensional cellular space. state, while time is represented by the y-axis. Space/time diagrams are a good tool to visualize the global behavior of a S is the finite state set. cellular automaton and the rule(s) associated with it. Fig. 1 represents the space time diagram of rule 90 for a N is the neighborhood vector linking each cell to its configuration of 256 cells and 100 time steps neighbors and represented by a radius r representing (https://www.wolframalpha.com/input/?i=rule+90). the number of consecutive cells a cell depends on. f is the local update rule or simply the rule that gives TABLE I. EXAMPLES OF 1-DIMENSIONAL, 2-STATE, 4N EXAMPLE OF ECA RULES the next state of each cell. Neighborhood Rule 120 (nonlinear) Rule 150 (linear) R is the rule vector consisting of the rule(s) applied to configuration 푥 ⊕ 푥 ⋅ 푥 푥 ⊕ 푥 ⊕ 푥 each cell. 푖−1 푖 푖+1 푖−1 푖 푖+1 111 0 1 The L, S and N parameters can be varied to define different 110 1 0 types of CAs. For example, von Neumann studied 2- dimensional, 5-neighborhood, 29-state cellular automata. If 101 1 0 the rule f is a linear Boolean function including only XOR 100 1 1 logic, then the CA is called a linear CA. Otherwise, if f 011 1 0 comprises also AND or OR logic, then the CA is called a non- 010 0 1 linear CA. The rule vector R can consist of a single rule applied to all the cells (uniform CA) or a set of rules assigned 001 0 1 to each cell (hybrid CA). 000 0 0 Despite the fact that multi-dimension cellular automata can TABLE II. EGHBORHOOD RULES display a more complex behavior, effectively characterizing them and mathematically analyzing them is much difficult Neighborhood Rule 32640 (nonlinear) Rule 27030 (linear) than their 1-dimensional counterpart. This explains that much configuration 푥푖−2 ⊕ 푥푖−1. 푥푖. 푥푖+1 푥푖−2 ⊕ 푥푖−1 ⊕ 푥푖 ⊕ 푥푖+1 of the studies conducted on cellular automata and their 1111 0 0 application in cryptography has been done on 1-dimensional 1110 1 1 cellular automata, particularly a special kind of cellular automata introduced by Stephen Wolfram [2]. These cellular 1101 1 1 automata are called Elementary Cellular Automata (ECA) [8]. 1100 1 0 They are 1-dimensional, 3Neighborhood and 2-state cellular 1011 1 1 3 automata. For ECAs, there are 2 = 8 neighborhood 1010 1 0 23 configurations and 2 = 256 total rules. Table I shows an 1001 1 0 example of a linear and a non-linear rule. 1000 1 1 In Table I, 푥푖−1, 푥푖and 푥푖+1are the left neighbor, the cell 0111 1 1 and the right neighbor respectively. The rule name (e.g. Rule 0110 0 0 120) is the decimal representation of the binary rule read from left to right. This naming convention was introduced by 0101 0 0 Wolfram [9]. 0100 0 1 For 4Neighborhood cellular automata, two possible 0011 0 0 neighborhood arrangement are possible [5]: 0010 0 1 0001 0 1 Left skewed: each cell ( 푥푖 ) depends on two left 0000 0 0 neighbors ( 푥푖−2 and 푥푖−1 ) and one right ( 푥푖+1 ) neighbors. Right skewed: each cell ( 푥푖 ) depends on one left neighbors ( 푥푖−1 ) and two right ( 푥푖+1 and 푥푖+2 ) neighbors. For 1-dimensional, 2-state, 4Neghborhood cellular automata, there are 24 = 16 neighborhood configurations and Fig. 1. Rule 90 Space Time Diagram. 309 | P a g e www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 4, 2020 For practical reasons, cellular automata are studied for a were presented as good candidates to solve the problem of finite cellular space L. In this case, boundary conditions attacks related to LFSR/NFSR based stream cipher designs. should be specified. Two broad categories of boundary conditions exist [6] for 1-dimensional cellular automata: open In [2] and [3], Stephen Wolfram was the first to propose boundary conditions and periodic conditions. For open the use of cellular automata as a keystream generator using boundary conditions, the neighbors of the leftmost and rule 30.
Recommended publications
  • Advanced Encryption Standard (Aes) Modes of Operation
    ADVANCED ENCRYPTION STANDARD (AES) MODES OF OPERATION 1 Arya Rohan Under the guidance of Dr. Edward Schneider University of Maryland, College Park MISSION: TO SIMULATE BLOCK CIPHER MODES OF OPERATION FOR AES IN MATLAB Simulation of the AES (Rijndael Algorithm) in MATLAB for 128 bit key-length. Simulation of the five block cipher modes of operation for AES as per FIPS publication. Comparison of the five modes based on Avalanche Effect. Future Work 2 OUTLINE A brief history of AES Galois Field Theory De-Ciphering the Algorithm-ENCRYPTION De-Ciphering the Algorithm-DECRYPTION Block Cipher Modes of Operation Avalanche Effect Simulation in MATLAB Conclusion & Future Work References 3 A BRIEF HISTORY OF AES 4 In January 1997, researchers world-over were invited by NIST to submit proposals for a new standard to be called Advanced Encryption Standard (AES). From 15 serious proposals, the Rijndael algorithm proposed by Vincent Rijmen and Joan Daemen, two Belgian cryptographers won the contest. The Rijndael algorithm supported plaintext sizes of 128, 192 and 256 bits, as well as, key-lengths of 128, 192 and 256 bits. The Rijndael algorithm is based on the Galois field theory and hence it gives the algorithm provable 5 security properties. GALOIS FIELD 6 GALOIS FIELD - GROUP Group/Albelian Group: A group G or {G, .} is a set of elements with a binary operation denoted by . , that associates to each ordered pair (a, b) of elements in G an element (a . b) such that the following properties are obeyed: Closure: If a & b belong to G, then a . b also belongs to G.
    [Show full text]
  • Block Ciphers
    Block Ciphers Chester Rebeiro IIT Madras CR STINSON : chapters 3 Block Cipher KE KD untrusted communication link Alice E D Bob #%AR3Xf34^$ “Attack at Dawn!!” message encryption (ciphertext) decryption “Attack at Dawn!!” Encryption key is the same as the decryption key (KE = K D) CR 2 Block Cipher : Encryption Key Length Secret Key Plaintext Ciphertext Block Cipher (Encryption) Block Length • A block cipher encryption algorithm encrypts n bits of plaintext at a time • May need to pad the plaintext if necessary • y = ek(x) CR 3 Block Cipher : Decryption Key Length Secret Key Ciphertext Plaintext Block Cipher (Decryption) Block Length • A block cipher decryption algorithm recovers the plaintext from the ciphertext. • x = dk(y) CR 4 Inside the Block Cipher PlaintextBlock (an iterative cipher) Key Whitening Round 1 key1 Round 2 key2 Round 3 key3 Round n keyn Ciphertext Block • Each round has the same endomorphic cryptosystem, which takes a key and produces an intermediate ouput • Size of the key is huge… much larger than the block size. CR 5 Inside the Block Cipher (the key schedule) PlaintextBlock Secret Key Key Whitening Round 1 Round Key 1 Round 2 Round Key 2 Round 3 Round Key 3 Key Expansion Expansion Key Key Round n Round Key n Ciphertext Block • A single secret key of fixed size used to generate ‘round keys’ for each round CR 6 Inside the Round Function Round Input • Add Round key : Add Round Key Mixing operation between the round input and the round key. typically, an ex-or operation Confusion Layer • Confusion layer : Makes the relationship between round Diffusion Layer input and output complex.
    [Show full text]
  • Visualization of the Avalanche Effect in CT2
    University of Mannheim Faculty for Business Informatics & Business Mathematics Theoretical Computer Science and IT Security Group Bachelor's Thesis Visualization of the Avalanche Effect in CT2 as part of the degree program Bachelor of Science Wirtschaftsinformatik submitted by Camilo Echeverri [email protected] on October 31, 2016 (2nd revised public version, Apr 18, 2017) Supervisors: Prof. Dr. Frederik Armknecht Prof. Bernhard Esslinger Visualization of the Avalanche Effect in CT2 Abstract Cryptographic algorithms must fulfill certain properties concerning their security. This thesis aims at providing insights into the importance of the avalanche effect property by introducing a new plugin for the cryptography and cryptanalysis platform CrypTool 2. The thesis addresses some of the desired properties, discusses the implementation of the plugin for modern and classic ciphers, guides the reader on how to use it, applies the proposed tool in order to test the avalanche effect of different cryptographic ciphers and hash functions, and interprets the results obtained. 2 Contents Abstract .......................................... 2 Contents .......................................... 3 List of Abbreviations .................................. 5 List of Figures ...................................... 6 List of Tables ....................................... 7 1 Introduction ..................................... 8 1.1 CrypTool 2 . 8 1.2 Outline of the Thesis . 9 2 Properties of Secure Block Ciphers ....................... 10 2.1 Avalanche Effect . 10 2.2 Completeness . 10 3 Related Work ..................................... 11 4 Plugin Design and Implementation ....................... 12 4.1 General Description of the Plugin . 12 4.2 Prepared Methods . 14 4.2.1 AES and DES . 14 4.3 Unprepared Methods . 20 4.3.1 Classic Ciphers, Modern Ciphers, and Hash Functions . 20 4.4 Architecture of the Code . 22 4.5 Limitations and Future Work .
    [Show full text]
  • A Block Cipher Algorithm to Enhance the Avalanche Effect Using Dynamic Key- Dependent S-Box and Genetic Operations 1Balajee Maram and 2J.M
    International Journal of Pure and Applied Mathematics Volume 119 No. 10 2018, 399-418 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu A Block Cipher Algorithm to Enhance the Avalanche Effect Using Dynamic Key- Dependent S-Box and Genetic Operations 1Balajee Maram and 2J.M. Gnanasekar 1Department of CSE, GMRIT, Rajam, India. Research and Development Centre, Bharathiar University, Coimbatore. [email protected] 2Department of Computer Science & Engineering, Sri Venkateswara College of Engineering, Sriperumbudur Tamil Nadu. [email protected] Abstract In digital data security, an encryption technique plays a vital role to convert digital data into intelligible form. In this paper, a light-weight S- box is generated that depends on Pseudo-Random-Number-Generators. According to shared-secret-key, all the Pseudo-Random-Numbers are scrambled and input to the S-box. The complexity of S-box generation is very simple. Here the plain-text is encrypted using Genetic Operations and S-box which is generated based on shared-secret-key. The proposed algorithm is experimentally investigates the complexity, quality and performance using the S-box parameters which includes Hamming Distance, Balanced Output and the characteristic of cryptography is Avalanche Effect. Finally the comparison results motivates that the dynamic key-dependent S-box has good quality and performance than existing algorithms. 399 International Journal of Pure and Applied Mathematics Special Issue Index Terms:S-BOX, data security, random number, cryptography, genetic operations. 400 International Journal of Pure and Applied Mathematics Special Issue 1. Introduction In public network, several types of attacks1 can be avoided by applying Data Encryption/Decryption2.
    [Show full text]
  • FPGA Implementation and Analysis of the Block Cipher Mode Architectures for the PRESENT Light Weight Encryption Algorithm
    ISSN (Print) : 0974-6846 Indian Journal of Science and Technology, Vol 9(38), DOI: 10.17485/ijst/2016/v9i38/90314, October 2016 ISSN (Online) : 0974-5645 FPGA Implementation and Analysis of the Block Cipher Mode Architectures for the PRESENT Light Weight Encryption Algorithm A. Prathiba* and V. S. Kanchana Bhaaskaran School of Electronics Engineering, VIT University Chennai, Chennai - 600127, India; prathi_communication@yahoo. co.in, [email protected] Abstract Objective: This paper presents the Field Programmable Gate Array (FPGA) implementations of the different block cipher mode architectures of the ISO standardized light weight block cipher PRESENT, designed for resource constrained devices. Methods/ Statistical Analysis: The performance evaluations compare the implementations of the different block cipher modes, namely Electronic Code Book (ECB) mode, Cipher Block Chaining (CBC) mode, Cipher Feedback Mode (CFB), Output Feed Back Mode (OFB) and CounTeR (CTR) mode for the PRESENT cipher. The throughput of encryption of three successive 64 bit blocks of data ranges from 565.312Mbps to 574.784Mbps for the modes other than the cipher feedback arrives as 68.912 Mbps, 155.392Mbps and300.8 Mbps for a 64 bit block of data for the input streams of size 8 bits, 16 bits andmode 32 in bits the respectively.Spartan-3 FPGA. Findings: The throughput The throughput for providing of the confidentialityblock cipher mode through hardware encryption architectures in the cipher of the feedback light weight mode cipher PRESENT demonstrates the high speed performance of the cipher in encryption/decryption of data as blocks and streams. Application/ Improvement: different modes of operation for the light weight block cipher PRESENT.
    [Show full text]
  • FPGA Implementation Using VHDL of the AES-GCM 256-Bit Authenticated Encryption Algorithm
    NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS DEPARTMENT OF INFORMATICS AND TELECOMMUNICATIONS THESIS FPGA Implementation using VHDL of the AES-GCM 256-bit Authenticated Encryption Algorithm Ioannis-T. - Stavrou Supervisor: Antonis Paschalis, Professor ATHENS NOVEMBER 2016 ΕΘΝΙΚΟ ΚΑΙ ΚΑΠΟΔΙΣΤΡΙΑΚΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΑΘΗΝΩΝ ΣΧΟΛΗ ΘΕΤΙΚΩΝ ΕΠΙΣΤΗΜΩΝ ΤΜΗΜΑ ΠΛΗΡΟΦΟΡΙΚΗΣ ΚΑΙ ΤΗΛΕΠΙΚΟΙΝΩΝΙΩΝ ΠΤΥΧΙΑΚΗ ΕΡΓΑΣΙΑ Υλοποίηση σε FPGA με τη Χρήση VHDL του Αλγόριθμου Κρυπτογράφησης με Πιστοποίηση Αυθεντικότητας AES-GCM 256-bit Ιωάννης - Θ. - Σταύρου Επιβλέπων: Αντώνης Πασχάλης, Καθηγητής ΑΘΗΝΑ ΝΟΕΜΒΡΙΟΣ 2016 THESIS FPGA Implementation using VHDL of the AES-GCM 256-bit Authenticated Encryption Algorithm Ioannis - T. - Stavrou Α.Μ.: 1115200700128 Supervisor: Antonis Paschalis, Professor ΠΤΥΧΙΑΚΗ ΕΡΓΑΣΙΑ Υλοποίηση σε FPGA με τη Χρήση VHDL του Αλγόριθμου Κρυπτογράφησης με Πιστοποίηση Αυθεντικότητας AES-GCM 256-bit Ιωάννης - Θ. - Σταύρου Α.Μ.:1115200700128 Επιβλέπων: Αντώνης Πασχάλης, Καθηγητής ABSTRACT Achieving high-speed network performance along with data integrity and security was always a challenge. The necessity to communicate through public channels securely led to the use of asymmetric key cryptography algorithms that commonly use a “hand- shake” mechanism allowing the implementation of a “trust” system that could quarantine the security of the transaction and the integrity of the data as long as the algorithm could provide strong resistance to cryptographic attacks. Although, there is no mathematical proof that these algorithms are invulnerable to attacks there is strong indication that they are highly resistant to most of them, making brute force the only attack that can have a 100% success rate which is countered by the huge computational power someone needs to succeed. While asymmetric key cryptography algorithms where the solution to public communication, the ongoing demand for higher bandwidth made the use of them inefficient, because the complexity of the algorithms demanded a processing cost that were creating latency gaps.
    [Show full text]
  • A Novel Construction of Efficient Substitution-Boxes Using Cubic
    entropy Article A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation Amjad Hussain Zahid 1,2, Muhammad Junaid Arshad 2 and Musheer Ahmad 3,* 1 Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan; [email protected] 2 Department of Computer Science, University of Engineering and Technology, Lahore 54000, Pakistan; [email protected] 3 Department of Computer Engineering, Jamia Millia Islamia, New Delhi 110025, India * Correspondence: [email protected]; Tel.: +91-112-698-0281 Received: 27 January 2019; Accepted: 28 February 2019; Published: 5 March 2019 Abstract: A symmetric block cipher employing a substitution–permutation duo is an effective technique for the provision of information security. For substitution, modern block ciphers use one or more substitution boxes (S-Boxes). Certain criteria and design principles are fulfilled and followed for the construction of a good S-Box. In this paper, an innovative technique to construct substitution-boxes using our cubic fractional transformation (CFT) is presented. The cryptographic strength of the proposed S-box is critically evaluated against the state of the art performance criteria of strong S-boxes, including bijection, nonlinearity, bit independence criterion, strict avalanche effect, and linear and differential approximation probabilities. The performance results of the proposed S-Box are compared with recently investigated S-Boxes to prove its cryptographic strength. The simulation and comparison analyses validate that the proposed S-Box construction method has adequate efficacy to generate efficient candidate S-Boxes for usage in block ciphers. Keywords: substitution box; cubic fractional transformation; block ciphers; security 1. Introduction Cryptography helps individuals and organizations to protect their data.
    [Show full text]
  • A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System
    JOURNAL OF COMPUTERS, VOL. 7, NO. 7, JULY 2012 1671 A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System Jiandong Liu Information Engineering College, Beijing Institute of Petrochemical Technology, Beijing, China [email protected] Xiahui Wang, Kai Yang, Chen Zhao Information Engineering College, Beijing Institute of Petrochemical Technology, Beijing, China {Wnagxiahui, Yangkai0212, zhao_chen}@bipt.edu.cn Abstract—This paper proposes a novel one-way Hash collisions by SHA-1” by Wang and Yu is another function which is based on the Coupled Integer Tent breakthrough in the hash functions history [11]. Mapping System and termed as THA (THA-160, THA-256). Based on the MD iteration structure [3], the The THA-160 compresses a message of arbitrary length into conventional Hash functions (MDx and SHA) have many a fingerprint of 160 bits, well the THA-256 compresses a common design guidelines. The designs of their mixed message of arbitrary length into a fingerprint of 256 bits. The algorithm adopts a piecewise message expansion operations for each round are very similar, and all of scheme. Compared with SHA-1 and SHA-256 message them adopt integer modulo addition and logic function; expansion, the message expansion scheme has enhanced the therefore, many Hash functions have been breached degree of nonlinear diffusion of the message expansion, and successively within a short period of time, which thus increased the computation efficiency. In addition, as indicates the defects in the design of the Hash functions. the major nonlinear component of compression function, the In recent years, in order to obtain more secure hash traditional logic functions are replaced by the integer tent functions, the research on constructing one-way hash map, and so the scheme has ideal properties of diffusion and function has been carried out and it has achieved progress confusion.
    [Show full text]
  • Data Encryption Standard (DES)
    6 Data Encryption Standard (DES) Objectives In this chapter, we discuss the Data Encryption Standard (DES), the modern symmetric-key block cipher. The following are our main objectives for this chapter: + To review a short history of DES + To defi ne the basic structure of DES + To describe the details of building elements of DES + To describe the round keys generation process + To analyze DES he emphasis is on how DES uses a Feistel cipher to achieve confusion and diffusion of bits from the Tplaintext to the ciphertext. 6.1 INTRODUCTION The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST). 6.1.1 History In 1973, NIST published a request for proposals for a national symmetric-key cryptosystem. A proposal from IBM, a modifi cation of a project called Lucifer, was accepted as DES. DES was published in the Federal Register in March 1975 as a draft of the Federal Information Processing Standard (FIPS). After the publication, the draft was criticized severely for two reasons. First, critics questioned the small key length (only 56 bits), which could make the cipher vulnerable to brute-force attack. Second, critics were concerned about some hidden design behind the internal structure of DES. They were suspicious that some part of the structure (the S-boxes) may have some hidden trapdoor that would allow the National Security Agency (NSA) to decrypt the messages without the need for the key. Later IBM designers mentioned that the internal structure was designed to prevent differential cryptanalysis.
    [Show full text]
  • RAGHAV a New Low Power S-P Network Encryption Design for Resource Constrained Environment
    RAGHAV A new low power S-P network encryption design for resource constrained environment Gaurav Bansod Associate Professor [email protected] Pune Institute of Computer Technology(PICT), Pune India Abstract— This paper proposes a new ultra lightweight cipher considered to be the workhorse in the cryptographic RAGHAV. RAGHAV is a Substitution-Permutation (SP) environment. The most ignored metric in design of a network, which operates on 64 bit plaintext and supports a lightweight cipher is power dissipation which is a very crucial 128/80 bit key scheduling. It needs only 994.25 GEs by using in the environments like IoT and Wireless Sensor Networks 0.13µm ASIC technology for a 128 bit key scheduling. It also (WSN). In Wireless Sensor Network, most of the nodes are needs less memory i.e. 2204 bytes of FLASH memory , which is less as compared to all existing S-P network lightweight ciphers. battery powered and there is a need to protect these nodes This paper presents a complete security analysis of RAGHAV, against external attacks. The versatile cipher like AES, Triple which includes basic attacks like linear cryptanalysis and DES fails in such kind of environment as they need huge differential cryptanalysis. This paper also covers advanced attack memory space as well as they dissipated more power. There is like zero correlation attack, Biclique attack, Algebraic attack, urgent need to secure these nodes without incurring more Avalanche effect, key collision attack and key schedule attack. In power to make the technologies like IoT feasible. This paper this cipher,use of block permutation helps the design to improve presents a cipher RAGHAV which has less GE’s, needs less the throughput.
    [Show full text]
  • CRYPTREC Report 2001
    CRYPTREC 2001 CRYPTREC Report 2001 March 2002 Information-technology Promotion Agency, Japan Telecommunications Advancement Organization of Japan CRYPTREC 2001 Contents Introduction 1 On the CRYPTREC Evaluation Committee Report 3 Note on the use of this report 7 1 Overview of Cryptographic Technique Evaluation 8 1.1 Evaluation Organs and Schedule ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・8 1.2 How cryptography evaluation was carried out. ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・12 1.3 Terminology ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・13 1.4 Evaluation Committee Members ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・14 2 Evaluation of public key cryptographic techniques 17 2.1 Target of Evaluation and Evaluation Method ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・17 2.1.1 Evaluated Cryptographic Techniques ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・17 2.1.2 Evaluation Policy・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・17 2.1.3 Evaluation Method ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・19 2.2 Evaluation result ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・21 2.2.1 Outline of evaluation result ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・21 2.2.2 General Evaluation of the Difficulty of Arithmetic Problems・・・・・・・・・・・・・・・・・23 2.2.3 Overall Judgment of Cryptographic Techniques that were the Target of Detailed Evaluation ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・23 2.2.4 Overall Judgment of Cryptographic Techniques under Observation ・・・・・・・・・・・26 2.2.5 Overall Judgment of Cryptosystems that were Targets of Screening Evaluations in 2001
    [Show full text]
  • Modified Advanced Encryption Standard Algorithm for Information
    S S symmetry Article Modified Advanced Encryption Standard Algorithm for Information Security Oluwakemi Christiana Abikoye 1 , Ahmad Dokoro Haruna 2 , Abdullahi Abubakar 1, Noah Oluwatobi Akande 3,* and Emmanuel Oluwatobi Asani 3 1 Computer Science Department, University of Ilorin, Ilorin 240103, Kwara State, Nigeria; [email protected] (A.O.C.); [email protected] (A.A.) 2 Computer Science Department, Gombe State University, Gombe 760214, Gombe State, Nigeria; [email protected] 3 Data and Information Security Research Group, Computer Science Department, Landmark University, Omu-Aran 251101, Kwara State, Nigeria; [email protected] * Correspondence: [email protected] Received: 19 July 2019; Accepted: 9 September 2019; Published: 5 December 2019 Abstract: The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that were aimed at securing information while using AES is still being undermined by the activities of attackers This has further necessitated the need for researchers to come up with ways of enhancing the strength of AES. This article presents an enhanced AES algorithm that was achieved by modifying its SubBytes and ShiftRows transformations. The SubBytes transformation is modified to be round key dependent, while the ShiftRows transformation is randomized. The rationale behind the modification is to make the two transformations round key dependent, so that a single bit change in the key will produce a significant change in the cipher text. The conventional and modified AES algorithms are both implemented and evaluated in terms avalanche effect and execution time.
    [Show full text]