Quantitative Evaluation of Chaotic CBC Mode of Operation

Quantitative Evaluation of Chaotic CBC Mode of Operation

Quantitative Evaluation of Chaotic CBC Mode of Operation Abdessalem Abidi1, Qianxue Wang3, Belgacem bouallègue1, Mohsen Machhout1 and Christophe Gyeux2 1Electronics and Microelectronics Laboratory University of Monastir, Faculty of Sciences of Monastir, Tunisia 2 FEMTO-ST Institute, UMR 6174 CNRS DISC Computer Science Department University of Franche Comté, 16, Route de Gray, 25000, Besançon France 3College of Automation Guangdong University of Technology, Guangzhou 510006 China e-mail: [email protected] Abstract—The cipher block chaining (CBC) block cipher The chaos theory we consider in this paper is the Devaney’s mode of operation presents a very popular way of encrypting topological one [1]. In addition to being recognized as one of which is used in various applications. In previous research work, the best mathematical definition of chaos, this theory offers a we have mathematically proven that, under some conditions, this framework with qualitative and quantitative tools to evaluate mode of operation can admit a chaotic behavior according to the notion of unpredictability [2]. As an application of our Devaney. Proving that CBC mode is chaotic is only the beginning of the study of its security. The next step, which is the purpose of fundamental results, we are interested in the area of this paper, is to develop the quantitative study of the chaotic information safety and security. CBC mode of operation by evaluating the level of sensibility and In this paper, which is an extension of our previous article expansivity for this mode. [3], the theoretical study of the chaotic behavior for the CBC Keywords—Cipher Block Chaining; mode of operation; Block mode of operation is deepened by evaluating its level of cipher; Devaney’s chaos; sensivity; expansivity. sensibility and expansivity [4]. Our fundamental study is motivated by the desire to produce chaotic programs in the area I. INTRODUCTION of information security. Block ciphers have a very simple principle. They do not The remainder of this research work is organized as treat the original text bit by bit but they manipulate blocks of follows. In Section 2, we will recall some basic definitions text for example, a block of 64 bits for the DES (Data concerning chaos and cipher-block chaining mode of operation. Encryption Standard) or a block of 128 bits for the AES Section 3 is devoted to the results of our previous research (Advanced Encryption Standard) algorithm. In fact, the original text is broken into blocks of N bits. For each block, the works. In Section 4 quantitative topological properties for encryption algorithm is applied to obtain an encrypted block chaotic CBC mode of operation is studied in detail. This which has the same size. Then we gather all blocks, which are research work ends by a conclusion section in which our encrypted separately, to obtain the complete encrypted contribution is recalled and some intended future work are message. For decryption, we precede in the same way but this proposed. time starting from the cipher text to obtain the original message using the decryption algorithm instead of the encryption II. BASIC RECALLS function. So, it is not sufficient to put anyhow a block cipher This section is devoted to basic definitions and terminologies algorithm in a program. We can instead use these algorithms in in the field of topological chaos and in the one of block cipher various ways according to their specific needs. These ways are mode of operation. called the block cipher modes of operation. There are several modes of operation and each mode has owns characteristics A. Devaney’s chaotic dynamical systems and its specific security properties. In this article, we will In the remainder of this article, S푛 denotes the n푡ℎ term of a consider only one of these modes, which is the cipher block sequence S while χℕ is the set of all sequences whose elements chaining (CBC) mode. 푡ℎ belong to χ. 푉푖 stands for the i component of a vector V. ƒ푘 = ƒ ° … °ƒ is for the 푘푡ℎ composition of a function ƒ. ℕ is the set of natural (non-negative) numbers, while ℕ* stands for An initialization vector must be generated for each the positive integers 1, 2, 3, . Finally, the following notation execution of the encryption operation, and the same vector is is used: ⟦1; 푁⟧ = {1,2,… , 푁}. necessary for the corresponding execution of the decryption Consider a topological space (휒, 휏) and a continuous operation, see Figure 1. Therefore the IV, or information that is function ƒ: 휒 → 휒 on (휒, 휏). sufficient to calculate it, must be available to each party of any Definition 1. The function ƒ is topologically transitive communication. The initialization vector does not need to be if, for any pair of open sets 푈, 푉 ⊂ 휒 U, there exists an secret, so the IV, or information sufficient to determine the IV, integer 푘 > 0 such that ƒ푘 (U) ∩ V ≠ ∅. may be transmitted with the cipher text. In addition, the initialization vector must be unpredictable: for any given Definition 2. An element 푥 푖푠 푎 푝푒푟푖푑푖푐 푝표푖푛푡 for ƒ of n k plaintext, it must not be possible to predict the IV that will be period 푛 ∈ ℕ, n > 1, 푖푓 ƒ (푥) = 푥 and ƒ (푥) ≠ 푥 . ƒ is associated to the plaintext, in advance to the vector generation ( ) regular on 휒, 휏 if the set of periodic points for ƒ is [8]. dense in 휒 : for any point 푥 in 휒 , any neighborhood of There are two recommended methods for generating 푥 contains at least one periodic point. unpredictable IVs. The first method is to apply the forward Definition 3. (Devaney’s formulation of chaos [1]) The cipher function, under the same key that is used for the function ƒ is chaotic on (휒, 휏) if ƒ is regular and encryption of the plaintext, to a nonce. The nonce must be a topologically transitive. The chaos property is strongly data block that is unique to each execution of the encryption linked to the notion of “sensitivity”, defined on a metric operation. space (휒, 휏) by: For example, the nonce may be a counter or a message Definition 4. The function ƒ has sensitive dependence number. The second method is to generate a random data block on initial conditions if there exists 훿 > 0 such that, for using a FIPS (Federal Information Processing Standard)- any 푥 ∈ 휒 and any neighborhood 푉 of 푥, there exist approved random number generator [8, 9]. 푦 ∈ 푉 and 푛 > 0 such that 푑(푓푛(푥), 푓푛(푦)) > 훿. δ is 2) Padding process called the constant of sensitivity of ƒ. Indeed, Banks et al. have proven in [5] that when ƒ is A block cipher works on units of a fixed size (known as a chaotic and (휒, 휏) is a metric space, then ƒ has the property block size), but messages come in variety of lengths. So some of sensitive dependence on initial conditions (this property modes, namely the ECB (Electronic Codebook) and CBC ones, was formerly an element of the Devaney’s definition of require that the final block is padded before encryption. In chaos). Additionally, the transitivity property is often other words, the total number of bits in the plaintext must be a obtained as a consequence of the strong transitivity one, positive multiple of the block size N. which is defined below [6]. If the data string to be encrypted does not initially satisfy this property, then the formatting of the plaintext must entail an Definition 5. ƒ 푖s strongly transitive on (휒, 푑) if, for increase in the number of bits. A common way to achieve the all point 푥, 푦 ∈ 휒 and for all neighborhood √ of 푥, it necessary increase is to append some extra bits, called padding, 푛 exists 푛 ∈ ℕ and 푥′ ∈ √ such that 푓 (푥′) = 푦. to the trailing end of the data string as the last step in the Finally, a function f has a constant of expansivity equal to 휀 formatting of the plaintext. An example of a padding method is if an arbitrarily small error on any initial condition is to append a single 1 bit to the data string and then to pad the always magnified until 휀 [6]. Mathematically speaking, resulting string by as few 0 bits, possibly none, as are necessary to complete the final block (other methods may be used). Definition 6. The function f is said to have the property of expansitivity if ∃ε > 0, ∀ x ≠ y, ∃ nϵℕ, 푑(푓푛(푥), 푓푛(푦)) ≥ 휀. For the above padding method, the padding bits can be removed unambiguously provided the receiver can determine Then, 휀 is the constant of expansivity of ƒ. We also say that that the message is indeed padded. One way to ensure that the ƒ is 휀 -expansive. receiver does not mistakenly remove bits from an unpadded B. CBC properties message is to require the sender to pad every message, including messages in which the final block is already Like some other modes of operation, the CBC mode requires complete. For such messages, an entire block of padding is not only a plaintext but also an initialization vector (IV) as appended. Alternatively, such messages can be sent without input. In what follows, we will show how this mode of padding if, for each message, the existence of padding can be operation works in practice reliably inferred, e.g., from a message length indicator [8]. 1) Initialisation vector IV As what have been already announced, in addition to the 3) CBC mode characteristics plaintext the CBC mode of operation requires an initialization vector in order to randomize the encryption.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us