HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption

Jayagopal Narayanaswamy, Raghav V. Sampangi, Srinivas Sampalli

2015

Abstract

This paper proposes a hybrid encryption technique that generates a key dynamically, along with integrity check parameters. Our approach generates the key stream using a chained approach, beginning with an initial pre-shared key. Subsequent keys are derived using logical operations on intermediate cipher texts and intermediate keys generated in each stage. This is an improvement over chaining techniques, which use a cipher text to derive successive keys. We validate our algorithm by proof-of-concept implementation and security analysis.

References

  1. Bardis, N., Markovskyy, A., and Andrikou, D. (2004). Method for designing pseudorandom binary sequences generators on nonlinear feedback shift register(nfsr). WSEAS Transactions on Communications, 3(2):758-763.
  2. Biebighauser, D. (2000). Testing random number generators @ONLINE. http://www-users. math.umn.edu/vgarrett/students/reu/pRNGs.pdf.
  3. De Cannière, C. (2006). Trivium: A stream cipher construction inspired by block cipher design principles. In Information Security, pages 171-186. Springer.
  4. Dubrova, E., Teslenko, M., and Tenhunen, H. (2008). On analysis and synthesis of (n, k)-non-linear feedback shift registers. In Design, Automation and Test in Europe, 2008. DATE'08, pages 1286-1291. IEEE.
  5. Engels, D., Fan, X., Gong, G., Hu, H., and Smith, E. M. (2010). Hummingbird: ultra-lightweight cryptography for resource-constrained devices. In Financial Cryptography and Data Security, pages 3-18. Springer.
  6. Hell, M., Johansson, T., and Brynielsson, L. (2009). An overview of distinguishing attacks on stream ciphers. Cryptography and Communications, 1(1):71-94.
  7. Hu, H. and Gong, G. (2011). Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions. International Journal of Foundations of Computer Science, 22(06):1317-1329.
  8. Hu, M. and Wang, Y. (2009). The collision rate tests of two known message digest algorithms. In Computational Intelligence and Security, 2009. CIS'09. International Conference on, volume 2, pages 319-323. IEEE.
  9. Jeddi, Z., Amini, E., and Bayoumi, M. (2013). A novel authenticated encryption algorithm for rfid systems. In Digital System Design (DSD), 2013 Euromicro Conference on, pages 658-661. IEEE.
  10. Jinabade, K. and Rasane, K. (2013). Efficient implementation of hummingbird cryptographic algorithm on a reconfigurable platform. In International Journal of Engineering Research and Technology, volume 2. ESRSA Publications.
  11. Knudsen, L. R. (1994). Practically secure feistel ciphers. In Fast Software Encryption, pages 211-221. Springer.
  12. Kumar, Y., Munjal, R., and Sharma, H. (2011). Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. International Journal of Computer Science and Management Studies, 11(03).
  13. Li, X., Zhang, W., Wang, X., and Li, M. (2012). Novel convertible authenticated encryption schemes without using hash functions. In Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on, volume 1, pages 504-508. IEEE.
  14. Lv, H., Xie, J.-X., Fang, J.-C., and Qi, P. (2012). Generating of a nonlinear pseudorandom sequence using linear feedback shift register. In ICT Convergence (ICTC), 2012 International Conference on, pages 432-435. IEEE.
  15. Mandal, K. and Gong, G. (2012). Probabilistic generation of good span n sequences from nonlinear feedback shift registers. University of Waterloo.
  16. Rachwalik, T., Szmidt, J., Wicik, R., and Zablocki, J. (2012). Generation of nonlinear feedback shift registers with special-purpose hardware. In Communications and Information Systems Conference (MCC), 2012 Military, pages 1-4. IEEE.
  17. Soto, J. Statistical testing of random number generators @ONLINE. http://infosec.pku.edu.cn/ vtly/oldversion/nist-nissc-1999/papers/p24.pdf.
  18. Wang, Y., Manulis, M., Au, M. H., and Susilo, W. (2013). Relations among privacy notions for signcryption and key invisible sign-then-encrypt. In Information Security and Privacy, pages 187-202. Springer.
  19. Wu, Y., Noonan, J. P., and Agaian, S. (2011). A novel information entropy based randomness test for image encryption. In Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, pages 2676- 2680. IEEE.
  20. Zeng, K., Yang, C.-H., Wei, D.-Y., and Rao, T. (1991). Pseudorandom bit generators in stream-cipher cryptography. Computer, 24(2):8-17.
  21. Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) lcost (signature) + cost(encryption). In Advances in CryptologyCRYPTO'97, pages 165-179. Springer.
  22. Zulkifli, M. Z. W. M. (2008). Attack on cryptography @ONLINE. https://idazuwaika.files.word press.com/2008/06/attack-on-cryptography.pdf.
Download


Paper Citation


in Harvard Style

Narayanaswamy J., V. Sampangi R. and Sampalli S. (2015). HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption . In Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-081-9, pages 124-131. DOI: 10.5220/0005273901240131


in Bibtex Style

@conference{icissp15,
author={Jayagopal Narayanaswamy and Raghav V. Sampangi and Srinivas Sampalli},
title={HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2015},
pages={124-131},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005273901240131},
isbn={978-989-758-081-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption
SN - 978-989-758-081-9
AU - Narayanaswamy J.
AU - V. Sampangi R.
AU - Sampalli S.
PY - 2015
SP - 124
EP - 131
DO - 10.5220/0005273901240131