Skip to main content

2022 | OriginalPaper | Buchkapitel

New Symmetric Key Cipher Based on Quasigroup

verfasst von : Umesh Kumar, Aayush Agarwal, V. Ch. Venkaiah

Erschienen in: Cyber Security, Privacy and Networking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Stream ciphers that use the XOR function for mixing the plaintext and the keystream are vulnerable to attacks such as known-plaintext attack and insertion attack. To overcome such shortcomings of the existing ciphers, we hereby propose a new stream cipher that uses AES. The proposed cipher is based on a large-order quasigroup. It is resistant to brute force attack, due to the exponential number of quasigroups of its order. It is also analyzed against the chosen-ciphertext, chosen-plaintext and known-plaintext attacks, and it is found to resist these attacks. The output of the cipher is subjected to various statistical tests, such as the NIST-STS test suite, and the results show a high degree of randomness of the ciphertext. Hence, it is resistant to correlation-type attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Barker E, Kelsey J (2007) Recommendation for random number generation using deterministic random bit generators. Technical report, NIST (revised) Barker E, Kelsey J (2007) Recommendation for random number generation using deterministic random bit generators. Technical report, NIST (revised)
2.
Zurück zum Zitat Bayer R, Metzger J (1976) On the encipherment of search trees and random access files. ACM Trans Database Syst (TODS) 1:37–52CrossRef Bayer R, Metzger J (1976) On the encipherment of search trees and random access files. ACM Trans Database Syst (TODS) 1:37–52CrossRef
3.
Zurück zum Zitat Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, Berlin Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, Berlin
4.
Zurück zum Zitat Diffie W, Hellman ME (1977) Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10:74–84 Diffie W, Hellman ME (1977) Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10:74–84
5.
Zurück zum Zitat Domosi H (2017) A novel stream cipher based on deterministic finite automaton. Ninth workshop on non-classical models of automata and applications (NCMA 2017), pp 11–16 Domosi H (2017) A novel stream cipher based on deterministic finite automaton. Ninth workshop on non-classical models of automata and applications (NCMA 2017), pp 11–16
6.
Zurück zum Zitat Jacobson MT, Matthews P (1996) Generating uniformly distributed random Latin squares. J Combin Des 4:405–437MathSciNetCrossRef Jacobson MT, Matthews P (1996) Generating uniformly distributed random Latin squares. J Combin Des 4:405–437MathSciNetCrossRef
7.
Zurück zum Zitat Koscielny C (2002) Generating quasigroups for cryptographic applications. Int J Appl Math Comput Sci 12:559–570MathSciNetMATH Koscielny C (2002) Generating quasigroups for cryptographic applications. Int J Appl Math Comput Sci 12:559–570MathSciNetMATH
8.
Zurück zum Zitat Lipmaa H, Wagner D, Rogaway P (2000) Comments to NIST concerning AES modes of operation: CTR-mode encryption Lipmaa H, Wagner D, Rogaway P (2000) Comments to NIST concerning AES modes of operation: CTR-mode encryption
9.
10.
Zurück zum Zitat Markovski S, Gligoroski D, Andova S (1997) Using quasigroups for one-one secure encoding. In: Proceedings of VIII Conference on logic and computer science “LIRA”, vol 97, pp 157–162 Markovski S, Gligoroski D, Andova S (1997) Using quasigroups for one-one secure encoding. In: Proceedings of VIII Conference on logic and computer science “LIRA”, vol 97, pp 157–162
11.
Zurück zum Zitat Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 386–397 Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 386–397
12.
Zurück zum Zitat Paterson KG, Yau A (2004) Padding oracle attacks on the ISO CBC mode encryption standard. In: Cryptographers’ track at the RSA conference. Springer, Berlin, pp. 305–323 Paterson KG, Yau A (2004) Padding oracle attacks on the ISO CBC mode encryption standard. In: Cryptographers’ track at the RSA conference. Springer, Berlin, pp. 305–323
13.
Zurück zum Zitat Petrescu A (2007) Applications of quasigroups in cryptography. In: Proceedings of interdisciplinarity in engineering. TG-Mures, Romania. Academic Press Petrescu A (2007) Applications of quasigroups in cryptography. In: Proceedings of interdisciplinarity in engineering. TG-Mures, Romania. Academic Press
14.
Zurück zum Zitat Petrescu A (2009) A 3-quasigroup stream cipher. In: The international conference interdisciplinarity in engineering INTER-ENG. Editura Universitatii “Petru Maior” din Tirgu Mures, p 168 Petrescu A (2009) A 3-quasigroup stream cipher. In: The international conference interdisciplinarity in engineering INTER-ENG. Editura Universitatii “Petru Maior” din Tirgu Mures, p 168
15.
Zurück zum Zitat Petrescu A (2010) n-quasigroup cryptographic primitives: stream ciphers. Stud Univ Babeş-Bolyai Inf 55 [On table of contents: Anul LIV]:27–34 Petrescu A (2010) n-quasigroup cryptographic primitives: stream ciphers. Stud Univ Babeş-Bolyai Inf 55 [On table of contents: Anul LIV]:27–34
16.
Zurück zum Zitat Rijmen V, Daemen J (2001) Advanced encryption standard. In: Proceedings of federal information processing standards publications. National Institute of Standards and Technology (NIST), pp 19–22 Rijmen V, Daemen J (2001) Advanced encryption standard. In: Proceedings of federal information processing standards publications. National Institute of Standards and Technology (NIST), pp 19–22
17.
Zurück zum Zitat Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST, special publication 800-22, revision 1a Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST, special publication 800-22, revision 1a
18.
Zurück zum Zitat Schneier B (2007) Applied cryptography protocols, algorithms, and source code in C. Wiley Schneier B (2007) Applied cryptography protocols, algorithms, and source code in C. Wiley
19.
Zurück zum Zitat Stallings W (2006) Cryptography and network security, 4th edn. Pearson education, Inc., India Stallings W (2006) Cryptography and network security, 4th edn. Pearson education, Inc., India
20.
Zurück zum Zitat Stinson D (1995) Cryptography: theory and practice. CRC Press, CRC Press LLC Stinson D (1995) Cryptography: theory and practice. CRC Press, CRC Press LLC
21.
Zurück zum Zitat Vojvoda M (2004) Stream ciphers and hash functions-analysis of some new design approaches. Ph.D. thesis. Slovak University of Technology Vojvoda M (2004) Stream ciphers and hash functions-analysis of some new design approaches. Ph.D. thesis. Slovak University of Technology
Metadaten
Titel
New Symmetric Key Cipher Based on Quasigroup
verfasst von
Umesh Kumar
Aayush Agarwal
V. Ch. Venkaiah
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_8

Neuer Inhalt