Skip to main content

2018 | OriginalPaper | Buchkapitel

Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers

verfasst von : Hamijah Mohd. Rahman, Nureize Arbaiy, Chuah Chai Wen

Erschienen in: Recent Advances on Soft Computing and Data Mining

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cryptography is a practice of technique to ensure security by using the cryptography keys. Key derivation function (KDF) is a standard algorithm to generate these cryptographic keys. Stream ciphers are one of the cryptographic primitives that are used to construct the key derivation function namely key derivation function based on stream ciphers. Though the key derivation function based on stream ciphers have a great role in security, it is necessary to have a framework which can evaluate the security level of the different types of key derivation function based on stream ciphers. Random oracle model (ROM) is the current procedure to proofs the security of KDF. However, the security evaluation of ROM did not evaluate the degree of secureness of KDF as it can only proof either the KDF is theoretically secure or insecure. Hence, this research applies fuzzy evaluation method to form a framework to evaluate the degree of secureness of the KDF for different types of key derivation function based on stream ciphers. Key sizes and complexity attacks are two main variables which are considered in the design of fuzzy rule. The proposed method introduces the information extraction to construct fuzzy membership function and rules. The result from this proposal is effective to approximate the security aspect in the computer system as well as network system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Annual Cryptology Conference, pp. 631–648. Springer, Berlin, Heidelberg (2010) Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Annual Cryptology Conference, pp. 631–648. Springer, Berlin, Heidelberg (2010)
2.
Zurück zum Zitat Bakhtiari, M., Maarof, M.A.: An efficient stream cipher algorithm for data encryption. Int. J. Comput. Sci. Issues 8(3) (2011) Bakhtiari, M., Maarof, M.A.: An efficient stream cipher algorithm for data encryption. Int. J. Comput. Sci. Issues 8(3) (2011)
3.
Zurück zum Zitat Yun, J., Park, K.W., Shin, Y., Kim, H.D.: An efficient stream cipher for resistive RAM. IEICE Electron. Express 14(7), 20170179–20170179 (2017) Yun, J., Park, K.W., Shin, Y., Kim, H.D.: An efficient stream cipher for resistive RAM. IEICE Electron. Express 14(7), 20170179–20170179 (2017)
4.
Zurück zum Zitat Vidal, G., Baptista, M.S., Mancini, H.: A fast and light stream cipher for smartphones. Eur. Phys. J. Spec. Top. 223(8), 1601–1610 (2014)CrossRef Vidal, G., Baptista, M.S., Mancini, H.: A fast and light stream cipher for smartphones. Eur. Phys. J. Spec. Top. 223(8), 1601–1610 (2014)CrossRef
5.
Zurück zum Zitat Chuah, C.W., Dawson, E., Simpson, L.: Key derivation function: the SCKDF scheme. In: IFIP International Information Security Conference, pp. 125–138. Springer, Berlin, Heidelberg (2013) Chuah, C.W., Dawson, E., Simpson, L.: Key derivation function: the SCKDF scheme. In: IFIP International Information Security Conference, pp. 125–138. Springer, Berlin, Heidelberg (2013)
6.
Zurück zum Zitat Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS ’93, pp. 62–73. ACM Press (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS ’93, pp. 62–73. ACM Press (1993)
7.
Zurück zum Zitat Chuah, C.W., Dawson, E., Nieto, J.M.G., Simpson, L.: A framework for security analysis of key derivation functions. In: International Conference on Information Security Practice and Experience, pp. 199–216. Springer, Berlin, Heidelberg (2012) Chuah, C.W., Dawson, E., Nieto, J.M.G., Simpson, L.: A framework for security analysis of key derivation functions. In: International Conference on Information Security Practice and Experience, pp. 199–216. Springer, Berlin, Heidelberg (2012)
9.
Zurück zum Zitat Lee, Y., Jeong, K., Sung, J., Hong, S.: Related-key chosen IV attacks on Grain-v1 and Grain-128. In: Australasian Conference on Information Security and Privacy, pp. 321–335. Springer, Berlin, Heidelberg (2008) Lee, Y., Jeong, K., Sung, J., Hong, S.: Related-key chosen IV attacks on Grain-v1 and Grain-128. In: Australasian Conference on Information Security and Privacy, pp. 321–335. Springer, Berlin, Heidelberg (2008)
10.
Zurück zum Zitat Quedenfeld, F.M., Wolf, C.: Advanced algebraic attack on Trivium. In: International Conference on Mathematical Aspects of Computer and Information Sciences, pp. 268–282. Springer International Publishing (2015) Quedenfeld, F.M., Wolf, C.: Advanced algebraic attack on Trivium. In: International Conference on Mathematical Aspects of Computer and Information Sciences, pp. 268–282. Springer International Publishing (2015)
11.
Zurück zum Zitat A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester. IACR Cryptol. ePrint Archive 780 (2013) A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester. IACR Cryptol. ePrint Archive 780 (2013)
12.
Zurück zum Zitat Al Maliky, S.B.S., Jawad, S.F.: Fuzzy logic-based security evaluation of stream cipher. In: Multidisciplinary Perspectives in Cryptology and Information Security, pp. 157–178. IGI Global (2014) Al Maliky, S.B.S., Jawad, S.F.: Fuzzy logic-based security evaluation of stream cipher. In: Multidisciplinary Perspectives in Cryptology and Information Security, pp. 157–178. IGI Global (2014)
13.
Zurück zum Zitat Azadegan, A., Porobic, L., Ghazinoory, S., Samouei, P., Kheirkhah, A.S.: Fuzzy logic in manufacturing: a review of literature and a specialized application. Int. J. Prod. Econ. 132(2), 258–270 (2011)CrossRef Azadegan, A., Porobic, L., Ghazinoory, S., Samouei, P., Kheirkhah, A.S.: Fuzzy logic in manufacturing: a review of literature and a specialized application. Int. J. Prod. Econ. 132(2), 258–270 (2011)CrossRef
14.
Zurück zum Zitat Goztepe, K.: Designing fuzzy rule based expert system for cyber security. Int. J. Inf. Secur. Sci. 1(1), 13–19 (2012) Goztepe, K.: Designing fuzzy rule based expert system for cyber security. Int. J. Inf. Secur. Sci. 1(1), 13–19 (2012)
15.
Zurück zum Zitat Sallam, H.: Cyber security risk assessment using multi fuzzy inference system. IJEIT 4(8), 13–19 (2015) Sallam, H.: Cyber security risk assessment using multi fuzzy inference system. IJEIT 4(8), 13–19 (2015)
16.
Zurück zum Zitat Bhusari, K.P., Kale, S.G.: Intrusion detection in wireless network using fuzzy rules. Virus 10 (11) Bhusari, K.P., Kale, S.G.: Intrusion detection in wireless network using fuzzy rules. Virus 10 (11)
17.
Zurück zum Zitat Mohammed, S.A., Sadkhan, S.B.: Block cipher security evaluation based on fuzzy logic. In: 2013 International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE), pp. 169–173. IEEE (2013) Mohammed, S.A., Sadkhan, S.B.: Block cipher security evaluation based on fuzzy logic. In: 2013 International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE), pp. 169–173. IEEE (2013)
18.
Zurück zum Zitat Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic: Theory and Applications (1996) Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic: Theory and Applications (1996)
19.
Zurück zum Zitat Sumathi, S., Paneerselvam, S.: Computational Intelligence Paradigms: Theory and Application Using MATLAB. CRC Press (2010) Sumathi, S., Paneerselvam, S.: Computational Intelligence Paradigms: Theory and Application Using MATLAB. CRC Press (2010)
20.
Zurück zum Zitat Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man Mach. Stud. 7(1), 1–13 (1975)CrossRefMATH Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man Mach. Stud. 7(1), 1–13 (1975)CrossRefMATH
21.
Zurück zum Zitat Iancu, I.: A Mamdani Type Fuzzy Logic Controller. INTECH Open Access Publisher, Rijeka (2012)CrossRef Iancu, I.: A Mamdani Type Fuzzy Logic Controller. INTECH Open Access Publisher, Rijeka (2012)CrossRef
22.
Zurück zum Zitat Mendel, J.M.: Fuzzy logic system for engineering: a tutorial. IEEE Trans. Fuzzy Syst. (1995) Mendel, J.M.: Fuzzy logic system for engineering: a tutorial. IEEE Trans. Fuzzy Syst. (1995)
23.
Zurück zum Zitat Mukherjee, P.: An Overview of eSTREAM Ciphers. Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata, India (2013) Mukherjee, P.: An Overview of eSTREAM Ciphers. Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata, India (2013)
Metadaten
Titel
Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers
verfasst von
Hamijah Mohd. Rahman
Nureize Arbaiy
Chuah Chai Wen
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-72550-5_9