Skip to main content
Top

2018 | OriginalPaper | Chapter

Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers

Authors : Hamijah Mohd. Rahman, Nureize Arbaiy, Chuah Chai Wen

Published in: Recent Advances on Soft Computing and Data Mining

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cryptography is a practice of technique to ensure security by using the cryptography keys. Key derivation function (KDF) is a standard algorithm to generate these cryptographic keys. Stream ciphers are one of the cryptographic primitives that are used to construct the key derivation function namely key derivation function based on stream ciphers. Though the key derivation function based on stream ciphers have a great role in security, it is necessary to have a framework which can evaluate the security level of the different types of key derivation function based on stream ciphers. Random oracle model (ROM) is the current procedure to proofs the security of KDF. However, the security evaluation of ROM did not evaluate the degree of secureness of KDF as it can only proof either the KDF is theoretically secure or insecure. Hence, this research applies fuzzy evaluation method to form a framework to evaluate the degree of secureness of the KDF for different types of key derivation function based on stream ciphers. Key sizes and complexity attacks are two main variables which are considered in the design of fuzzy rule. The proposed method introduces the information extraction to construct fuzzy membership function and rules. The result from this proposal is effective to approximate the security aspect in the computer system as well as network system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Annual Cryptology Conference, pp. 631–648. Springer, Berlin, Heidelberg (2010) Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Annual Cryptology Conference, pp. 631–648. Springer, Berlin, Heidelberg (2010)
2.
go back to reference Bakhtiari, M., Maarof, M.A.: An efficient stream cipher algorithm for data encryption. Int. J. Comput. Sci. Issues 8(3) (2011) Bakhtiari, M., Maarof, M.A.: An efficient stream cipher algorithm for data encryption. Int. J. Comput. Sci. Issues 8(3) (2011)
3.
go back to reference Yun, J., Park, K.W., Shin, Y., Kim, H.D.: An efficient stream cipher for resistive RAM. IEICE Electron. Express 14(7), 20170179–20170179 (2017) Yun, J., Park, K.W., Shin, Y., Kim, H.D.: An efficient stream cipher for resistive RAM. IEICE Electron. Express 14(7), 20170179–20170179 (2017)
4.
go back to reference Vidal, G., Baptista, M.S., Mancini, H.: A fast and light stream cipher for smartphones. Eur. Phys. J. Spec. Top. 223(8), 1601–1610 (2014)CrossRef Vidal, G., Baptista, M.S., Mancini, H.: A fast and light stream cipher for smartphones. Eur. Phys. J. Spec. Top. 223(8), 1601–1610 (2014)CrossRef
5.
go back to reference Chuah, C.W., Dawson, E., Simpson, L.: Key derivation function: the SCKDF scheme. In: IFIP International Information Security Conference, pp. 125–138. Springer, Berlin, Heidelberg (2013) Chuah, C.W., Dawson, E., Simpson, L.: Key derivation function: the SCKDF scheme. In: IFIP International Information Security Conference, pp. 125–138. Springer, Berlin, Heidelberg (2013)
6.
go back to reference Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS ’93, pp. 62–73. ACM Press (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS ’93, pp. 62–73. ACM Press (1993)
7.
go back to reference Chuah, C.W., Dawson, E., Nieto, J.M.G., Simpson, L.: A framework for security analysis of key derivation functions. In: International Conference on Information Security Practice and Experience, pp. 199–216. Springer, Berlin, Heidelberg (2012) Chuah, C.W., Dawson, E., Nieto, J.M.G., Simpson, L.: A framework for security analysis of key derivation functions. In: International Conference on Information Security Practice and Experience, pp. 199–216. Springer, Berlin, Heidelberg (2012)
9.
go back to reference Lee, Y., Jeong, K., Sung, J., Hong, S.: Related-key chosen IV attacks on Grain-v1 and Grain-128. In: Australasian Conference on Information Security and Privacy, pp. 321–335. Springer, Berlin, Heidelberg (2008) Lee, Y., Jeong, K., Sung, J., Hong, S.: Related-key chosen IV attacks on Grain-v1 and Grain-128. In: Australasian Conference on Information Security and Privacy, pp. 321–335. Springer, Berlin, Heidelberg (2008)
10.
go back to reference Quedenfeld, F.M., Wolf, C.: Advanced algebraic attack on Trivium. In: International Conference on Mathematical Aspects of Computer and Information Sciences, pp. 268–282. Springer International Publishing (2015) Quedenfeld, F.M., Wolf, C.: Advanced algebraic attack on Trivium. In: International Conference on Mathematical Aspects of Computer and Information Sciences, pp. 268–282. Springer International Publishing (2015)
11.
go back to reference A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester. IACR Cryptol. ePrint Archive 780 (2013) A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester. IACR Cryptol. ePrint Archive 780 (2013)
12.
go back to reference Al Maliky, S.B.S., Jawad, S.F.: Fuzzy logic-based security evaluation of stream cipher. In: Multidisciplinary Perspectives in Cryptology and Information Security, pp. 157–178. IGI Global (2014) Al Maliky, S.B.S., Jawad, S.F.: Fuzzy logic-based security evaluation of stream cipher. In: Multidisciplinary Perspectives in Cryptology and Information Security, pp. 157–178. IGI Global (2014)
13.
go back to reference Azadegan, A., Porobic, L., Ghazinoory, S., Samouei, P., Kheirkhah, A.S.: Fuzzy logic in manufacturing: a review of literature and a specialized application. Int. J. Prod. Econ. 132(2), 258–270 (2011)CrossRef Azadegan, A., Porobic, L., Ghazinoory, S., Samouei, P., Kheirkhah, A.S.: Fuzzy logic in manufacturing: a review of literature and a specialized application. Int. J. Prod. Econ. 132(2), 258–270 (2011)CrossRef
14.
go back to reference Goztepe, K.: Designing fuzzy rule based expert system for cyber security. Int. J. Inf. Secur. Sci. 1(1), 13–19 (2012) Goztepe, K.: Designing fuzzy rule based expert system for cyber security. Int. J. Inf. Secur. Sci. 1(1), 13–19 (2012)
15.
go back to reference Sallam, H.: Cyber security risk assessment using multi fuzzy inference system. IJEIT 4(8), 13–19 (2015) Sallam, H.: Cyber security risk assessment using multi fuzzy inference system. IJEIT 4(8), 13–19 (2015)
16.
go back to reference Bhusari, K.P., Kale, S.G.: Intrusion detection in wireless network using fuzzy rules. Virus 10 (11) Bhusari, K.P., Kale, S.G.: Intrusion detection in wireless network using fuzzy rules. Virus 10 (11)
17.
go back to reference Mohammed, S.A., Sadkhan, S.B.: Block cipher security evaluation based on fuzzy logic. In: 2013 International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE), pp. 169–173. IEEE (2013) Mohammed, S.A., Sadkhan, S.B.: Block cipher security evaluation based on fuzzy logic. In: 2013 International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE), pp. 169–173. IEEE (2013)
18.
go back to reference Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic: Theory and Applications (1996) Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic: Theory and Applications (1996)
19.
go back to reference Sumathi, S., Paneerselvam, S.: Computational Intelligence Paradigms: Theory and Application Using MATLAB. CRC Press (2010) Sumathi, S., Paneerselvam, S.: Computational Intelligence Paradigms: Theory and Application Using MATLAB. CRC Press (2010)
20.
go back to reference Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man Mach. Stud. 7(1), 1–13 (1975)CrossRefMATH Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man Mach. Stud. 7(1), 1–13 (1975)CrossRefMATH
21.
go back to reference Iancu, I.: A Mamdani Type Fuzzy Logic Controller. INTECH Open Access Publisher, Rijeka (2012)CrossRef Iancu, I.: A Mamdani Type Fuzzy Logic Controller. INTECH Open Access Publisher, Rijeka (2012)CrossRef
22.
go back to reference Mendel, J.M.: Fuzzy logic system for engineering: a tutorial. IEEE Trans. Fuzzy Syst. (1995) Mendel, J.M.: Fuzzy logic system for engineering: a tutorial. IEEE Trans. Fuzzy Syst. (1995)
23.
go back to reference Mukherjee, P.: An Overview of eSTREAM Ciphers. Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata, India (2013) Mukherjee, P.: An Overview of eSTREAM Ciphers. Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata, India (2013)
Metadata
Title
Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers
Authors
Hamijah Mohd. Rahman
Nureize Arbaiy
Chuah Chai Wen
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-72550-5_9

Premium Partner