Skip to main content
Top

2022 | OriginalPaper | Chapter

New Symmetric Key Cipher Based on Quasigroup

Authors : Umesh Kumar, Aayush Agarwal, V. Ch. Venkaiah

Published in: Cyber Security, Privacy and Networking

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Stream ciphers that use the XOR function for mixing the plaintext and the keystream are vulnerable to attacks such as known-plaintext attack and insertion attack. To overcome such shortcomings of the existing ciphers, we hereby propose a new stream cipher that uses AES. The proposed cipher is based on a large-order quasigroup. It is resistant to brute force attack, due to the exponential number of quasigroups of its order. It is also analyzed against the chosen-ciphertext, chosen-plaintext and known-plaintext attacks, and it is found to resist these attacks. The output of the cipher is subjected to various statistical tests, such as the NIST-STS test suite, and the results show a high degree of randomness of the ciphertext. Hence, it is resistant to correlation-type attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Barker E, Kelsey J (2007) Recommendation for random number generation using deterministic random bit generators. Technical report, NIST (revised) Barker E, Kelsey J (2007) Recommendation for random number generation using deterministic random bit generators. Technical report, NIST (revised)
2.
go back to reference Bayer R, Metzger J (1976) On the encipherment of search trees and random access files. ACM Trans Database Syst (TODS) 1:37–52CrossRef Bayer R, Metzger J (1976) On the encipherment of search trees and random access files. ACM Trans Database Syst (TODS) 1:37–52CrossRef
3.
go back to reference Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, Berlin Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, Berlin
4.
go back to reference Diffie W, Hellman ME (1977) Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10:74–84 Diffie W, Hellman ME (1977) Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10:74–84
5.
go back to reference Domosi H (2017) A novel stream cipher based on deterministic finite automaton. Ninth workshop on non-classical models of automata and applications (NCMA 2017), pp 11–16 Domosi H (2017) A novel stream cipher based on deterministic finite automaton. Ninth workshop on non-classical models of automata and applications (NCMA 2017), pp 11–16
6.
7.
go back to reference Koscielny C (2002) Generating quasigroups for cryptographic applications. Int J Appl Math Comput Sci 12:559–570MathSciNetMATH Koscielny C (2002) Generating quasigroups for cryptographic applications. Int J Appl Math Comput Sci 12:559–570MathSciNetMATH
8.
go back to reference Lipmaa H, Wagner D, Rogaway P (2000) Comments to NIST concerning AES modes of operation: CTR-mode encryption Lipmaa H, Wagner D, Rogaway P (2000) Comments to NIST concerning AES modes of operation: CTR-mode encryption
9.
10.
go back to reference Markovski S, Gligoroski D, Andova S (1997) Using quasigroups for one-one secure encoding. In: Proceedings of VIII Conference on logic and computer science “LIRA”, vol 97, pp 157–162 Markovski S, Gligoroski D, Andova S (1997) Using quasigroups for one-one secure encoding. In: Proceedings of VIII Conference on logic and computer science “LIRA”, vol 97, pp 157–162
11.
go back to reference Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 386–397 Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 386–397
12.
go back to reference Paterson KG, Yau A (2004) Padding oracle attacks on the ISO CBC mode encryption standard. In: Cryptographers’ track at the RSA conference. Springer, Berlin, pp. 305–323 Paterson KG, Yau A (2004) Padding oracle attacks on the ISO CBC mode encryption standard. In: Cryptographers’ track at the RSA conference. Springer, Berlin, pp. 305–323
13.
go back to reference Petrescu A (2007) Applications of quasigroups in cryptography. In: Proceedings of interdisciplinarity in engineering. TG-Mures, Romania. Academic Press Petrescu A (2007) Applications of quasigroups in cryptography. In: Proceedings of interdisciplinarity in engineering. TG-Mures, Romania. Academic Press
14.
go back to reference Petrescu A (2009) A 3-quasigroup stream cipher. In: The international conference interdisciplinarity in engineering INTER-ENG. Editura Universitatii “Petru Maior” din Tirgu Mures, p 168 Petrescu A (2009) A 3-quasigroup stream cipher. In: The international conference interdisciplinarity in engineering INTER-ENG. Editura Universitatii “Petru Maior” din Tirgu Mures, p 168
15.
go back to reference Petrescu A (2010) n-quasigroup cryptographic primitives: stream ciphers. Stud Univ Babeş-Bolyai Inf 55 [On table of contents: Anul LIV]:27–34 Petrescu A (2010) n-quasigroup cryptographic primitives: stream ciphers. Stud Univ Babeş-Bolyai Inf 55 [On table of contents: Anul LIV]:27–34
16.
go back to reference Rijmen V, Daemen J (2001) Advanced encryption standard. In: Proceedings of federal information processing standards publications. National Institute of Standards and Technology (NIST), pp 19–22 Rijmen V, Daemen J (2001) Advanced encryption standard. In: Proceedings of federal information processing standards publications. National Institute of Standards and Technology (NIST), pp 19–22
17.
go back to reference Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST, special publication 800-22, revision 1a Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST, special publication 800-22, revision 1a
18.
go back to reference Schneier B (2007) Applied cryptography protocols, algorithms, and source code in C. Wiley Schneier B (2007) Applied cryptography protocols, algorithms, and source code in C. Wiley
19.
go back to reference Stallings W (2006) Cryptography and network security, 4th edn. Pearson education, Inc., India Stallings W (2006) Cryptography and network security, 4th edn. Pearson education, Inc., India
20.
go back to reference Stinson D (1995) Cryptography: theory and practice. CRC Press, CRC Press LLC Stinson D (1995) Cryptography: theory and practice. CRC Press, CRC Press LLC
21.
go back to reference Vojvoda M (2004) Stream ciphers and hash functions-analysis of some new design approaches. Ph.D. thesis. Slovak University of Technology Vojvoda M (2004) Stream ciphers and hash functions-analysis of some new design approaches. Ph.D. thesis. Slovak University of Technology
Metadata
Title
New Symmetric Key Cipher Based on Quasigroup
Authors
Umesh Kumar
Aayush Agarwal
V. Ch. Venkaiah
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_8