Skip to main content

2021 | OriginalPaper | Buchkapitel

15. Towards a Symmetric Crypto Algorithm: The HAJ

verfasst von : Daniel Alarcón-Narváez, Fausto A. Jacques García

Erschienen in: ITNG 2021 18th International Conference on Information Technology-New Generations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In symmetric encryption, the algorithm and secret key determine the security factor. This paper presents the idea to create a multiple (7 times) and block-separated encryption algorithm. To achieve this, we will use the Hill Cipher and Gauss-Jacques methods. In addition to the above, our most significant contribution will be to obtain large secret keys, which will allow us to obtain as a possible result a meaningful approximation to the Shannon perfect secrecy, as well as the reduction of computational complexity and the verification of security through anti-bot mechanisms such as code breakers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat W. Stallings, Cryptography and Network Security, 4/E (Pearson Education India, 2006) W. Stallings, Cryptography and Network Security, 4/E (Pearson Education India, 2006)
2.
Zurück zum Zitat J. Daemen, V. Rijmen, The Design of Rijndael: The Advanced Encryption Standard (AES) (Springer Nature, 2020) J. Daemen, V. Rijmen, The Design of Rijndael: The Advanced Encryption Standard (AES) (Springer Nature, 2020)
3.
Zurück zum Zitat N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, D. Whiting, Improved cryptanalysis of rijndael, in International Workshop on Fast Software Encryption (Springer, 2000), pp. 213–230 N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, D. Whiting, Improved cryptanalysis of rijndael, in International Workshop on Fast Software Encryption (Springer, 2000), pp. 213–230
4.
Zurück zum Zitat N.F. El Fishawy, O.M.A. Zaid, Quality of encryption measurement of bitmap images with rc6, mrc6, and rijndael block cipher algorithms. IJ Network Security 5(3), 241–251 (2007) N.F. El Fishawy, O.M.A. Zaid, Quality of encryption measurement of bitmap images with rc6, mrc6, and rijndael block cipher algorithms. IJ Network Security 5(3), 241–251 (2007)
5.
Zurück zum Zitat Y.K. Lee, Y.S. Park, Y.S. Kim, S.W. Lee, S.I. Jun, Rijndael block cipher apparatus and encryption/decryption method thereof, Mar. 30 2010, US Patent 7,688,974 Y.K. Lee, Y.S. Park, Y.S. Kim, S.W. Lee, S.I. Jun, Rijndael block cipher apparatus and encryption/decryption method thereof, Mar. 30 2010, US Patent 7,688,974
6.
Zurück zum Zitat N.S. Srinivas, M. Akramuddin, Fpga based hardware implementation of aes rijndael algorithm for encryption and decryption, in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (IEEE, 2016), pp. 1769–1776 N.S. Srinivas, M. Akramuddin, Fpga based hardware implementation of aes rijndael algorithm for encryption and decryption, in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (IEEE, 2016), pp. 1769–1776
7.
Zurück zum Zitat J.R. Paragas, A.M. Sison, R. Medina, An improved hill cipher algorithm using cbc and hexadecimal s-box, in 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE) (IEEE, 2019), pp. 77–81 J.R. Paragas, A.M. Sison, R. Medina, An improved hill cipher algorithm using cbc and hexadecimal s-box, in 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE) (IEEE, 2019), pp. 77–81
8.
Zurück zum Zitat R. Mahendran, K. Mani, Generation of key matrix for hill cipher encryption using classical cipher, in 2017 World Congress on Computing and Communication Technologies (WCCCT) (IEEE, 2017), pp. 51–54 R. Mahendran, K. Mani, Generation of key matrix for hill cipher encryption using classical cipher, in 2017 World Congress on Computing and Communication Technologies (WCCCT) (IEEE, 2017), pp. 51–54
9.
Zurück zum Zitat A.A. Khalaf, M.S. Abd El-karim, H.F. Hamed, Proposed triple hill cipher algorithm for increasing the security level of encrypted binary data and its implementation using fpga, in 2015 17th International Conference on Advanced Communication Technology (ICACT) (IEEE, 2015), pp. 454–459 A.A. Khalaf, M.S. Abd El-karim, H.F. Hamed, Proposed triple hill cipher algorithm for increasing the security level of encrypted binary data and its implementation using fpga, in 2015 17th International Conference on Advanced Communication Technology (ICACT) (IEEE, 2015), pp. 454–459
10.
Zurück zum Zitat S. Saeednia, How to make the hill cipher secure. Cryptologia 24(4), 353–360 (2000)CrossRef S. Saeednia, How to make the hill cipher secure. Cryptologia 24(4), 353–360 (2000)CrossRef
11.
Zurück zum Zitat R.K. Jangid, N. Mohmmad, A. Didel, S. Taterh, Hybrid approach of image encryption using dna cryptography and tf hill cipher algorithm, in 2014 International Conference on Communication and Signal Processing (IEEE, 2014), pp. 934–938 R.K. Jangid, N. Mohmmad, A. Didel, S. Taterh, Hybrid approach of image encryption using dna cryptography and tf hill cipher algorithm, in 2014 International Conference on Communication and Signal Processing (IEEE, 2014), pp. 934–938
12.
Zurück zum Zitat B. Acharya, S.K. Panigrahy, S.K. Patra, G. Panda, Image encryption using advanced hill cipher algorithm. Int. J. Recent Trends Eng. 1(1), 663–667 (2009) B. Acharya, S.K. Panigrahy, S.K. Patra, G. Panda, Image encryption using advanced hill cipher algorithm. Int. J. Recent Trends Eng. 1(1), 663–667 (2009)
13.
Zurück zum Zitat B. Acharya, G.S. Rath, S.K. Patra, S.K. Panigrahy, Novel methods of generating self-invertible matrix for hill cipher algorithm. Int. J. Secur. 1, 14–21 (2007) B. Acharya, G.S. Rath, S.K. Patra, S.K. Panigrahy, Novel methods of generating self-invertible matrix for hill cipher algorithm. Int. J. Secur. 1, 14–21 (2007)
14.
Zurück zum Zitat M.M. Asad, I. Marouf, Q.A. Al-Haija, A. AlShuaibi, Performance analysis of 128-bit modular inverse based extended euclidean using altera fpga kit. Procedia Comput. Sci. 160, 543–548 (2019)CrossRef M.M. Asad, I. Marouf, Q.A. Al-Haija, A. AlShuaibi, Performance analysis of 128-bit modular inverse based extended euclidean using altera fpga kit. Procedia Comput. Sci. 160, 543–548 (2019)CrossRef
15.
Zurück zum Zitat J.W. Bos, Constant time modular inversion. J. Cryptographic Eng. 4(4), 275–281 (2014)CrossRef J.W. Bos, Constant time modular inversion. J. Cryptographic Eng. 4(4), 275–281 (2014)CrossRef
16.
Zurück zum Zitat D. Phiamphu, P. Saha, Redesigned the architecture of extended-euclidean algorithm for modular multiplicative inverse and jacobi symbol, in 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (IEEE, 2018), pp. 1345–1349 D. Phiamphu, P. Saha, Redesigned the architecture of extended-euclidean algorithm for modular multiplicative inverse and jacobi symbol, in 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (IEEE, 2018), pp. 1345–1349
17.
Zurück zum Zitat M. Seysen, Using an rsa accelerator for modular inversion, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2005), pp. 226–236 M. Seysen, Using an rsa accelerator for modular inversion, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, 2005), pp. 226–236
18.
Zurück zum Zitat J.C. Bajard, N. Meloni, T. Plantard, Study of modular inversion in rns, in Advanced Signal Processing Algorithms, Architectures, and Implementations XV, vol. 5910. International Society for Optics and Photonics, 2005, p. 59100T J.C. Bajard, N. Meloni, T. Plantard, Study of modular inversion in rns, in Advanced Signal Processing Algorithms, Architectures, and Implementations XV, vol. 5910. International Society for Optics and Photonics, 2005, p. 59100T
19.
Zurück zum Zitat F.A.J. García, El método gauss-jacques propuesto para la obtención de matrices inversas modulares de tamaño variable sin límite teórico. Digital Ciencia@UAQRO 11(1) (2018). ISSN: 2395–8847 F.A.J. García, El método gauss-jacques propuesto para la obtención de matrices inversas modulares de tamaño variable sin límite teórico. Digital Ciencia@UAQRO 11(1) (2018). ISSN: 2395–8847
20.
Zurück zum Zitat F.A. Jacques-García, D. Uribe-Mejía, G. Macías-Bobadilla, R. Chaparro-Sánchez, On modular inverse matrices, XV Int. Eng. Congress, ISSB:978-1-7281-5108-3/19 (2019) F.A. Jacques-García, D. Uribe-Mejía, G. Macías-Bobadilla, R. Chaparro-Sánchez, On modular inverse matrices, XV Int. Eng. Congress, ISSB:978-1-7281-5108-3/19 (2019)
21.
Zurück zum Zitat B. de Benito Crosetti, J.M.S. Ibáñez, La investigación basada en diseño en tecnología educativa. pp. 44–59. Revista Interuniversitaria de Investigación en Tecnología Educativa (RIITE). ISSN: 2529–9638 (2016) B. de Benito Crosetti, J.M.S. Ibáñez, La investigación basada en diseño en tecnología educativa. pp. 44–59. Revista Interuniversitaria de Investigación en Tecnología Educativa (RIITE). ISSN: 2529–9638 (2016)
22.
Zurück zum Zitat R. McDermott, Experimental methodology in political science. Political Analysis 325–342 (2002) R. McDermott, Experimental methodology in political science. Political Analysis 325–342 (2002)
Metadaten
Titel
Towards a Symmetric Crypto Algorithm: The HAJ
verfasst von
Daniel Alarcón-Narváez
Fausto A. Jacques García
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-70416-2_15