One considers the user key as the system
memory where both the user key data and cipher
re-programmability parameters are stored. The
proposed cipher is a word-based cipher with
variable word and key sizes. The bit-level S-orb
replaces the conventional S-box leading to a
noticeable increase in addressing space and
added security. The key stream and the number
of rounds are both key-dependent; thus
eliminating the possibility of trap door functions.
The generated S-orb is key-dependent using a
specially-developed hash- function. The large
integer numbers used in generating the different
S-orb words are also key-dependent. The ergodic
process, on which the cipher is based, is also key
initiated emulating a faulty compass. These key-
dependencies provided the foundation from
which this polymorphic cipher acquired its name.
Furthermore, these substitutions provide the
required aperiodic random walks. We have used
the concept of a faulty compass rather than
chaotic maps since these chaotic systems usually
suffer from unpredictable reproducibility
problems. We have used selective additions
leading to an enhanced homophonic substitution.
In these homophonic bit-level substitutions, the
mapping of characters varies depending on the
sequence of bits in the message text. Inside the
encryption process, the round keys act initially as
pointers in the homophonic substitutions without
directly being part of the computations. This
contributes to added security. Finally, a poly-
alphabetic substitution is performed on the data.
This involves using bit-wise XOR between the
partially ciphered data and the generated keys.
The operation can be viewed as a linear masking
operation. The high security of this cipher is a
direct consequence of the polymorphic key-
dependent design of the cipher operations’
parameters.
The paradigm of polymorphic encryption
provides the required security with relatively
simple round function constructs. The security of
the cipher was not compromised for an increase
in its speed. We have preserved the pseudo-
random permutations using robust bit-wise
homophonic substitutions. In addition, we have
utilized the capabilities of contemporary
processors’ superior performance to achieve
acceptable
execution speeds.
REFERENCES
ANSI X3.92, (1981). American National Standard for
Data Encryption Algorithm (DEA). American
National Standards Institute.
Kostadin Bajalcaliev, May (2001). Quasi Functions and
Polymorphic Encryption. http://eon.pmf.ukim.edu.mk/
~kbajalc
Aiden A. Bruen, Mario A. Forcinito, (2005).
Cryptography, Information Theory and Error
Correction, Wiley-Inter-science.
Daemen and V. Rijmen, (1998). AES Proposal: Rijndael.
First AES conference, California, US.
Federal Information Processing Standard Publication,
April 17, (1995). Specifications for Secure Hash
Standard. FIPS PUB 180-1,
http://www.itl.nist.gov/fipspubs/fip180-1.htm
Gray, R.M., (2008). Probability, Random Processes, and
Ergodic Properties. Springer Verlag, New York.
Gunther, C., (1988). A Universal algorithm for
homophonic coding. Advances in Cryptology,
Eurocrypt 88, LNCS No. 330, pages 405-441,
Springer-Verlag.
Hans Dobbertin, Antoon Bosselaers, Bart Preneel, (1996).
RIPEMD-160: A Strengthened Version of RIPEMD.
Fast Software Encryption, LNCS 1039, Springer-
Verlag, pp. 71–82.
Hussein A. AlHassan, Magdy Saeb, Hassan D. Hamed,
(2005). The Pyramids Block Cipher. International
Journal of Network Security, Vol. 1, No., 1, pages 52-
60.
Karatsuba A. and Yu Ofman, (1962). Multiplication of
Many-Digital Numbers by Automatic Computers.
Proceedings of the USSR Academy of Sciences, 145,
pages 293-294.
Ralph C. Merkle, June, (1979). Secrecy, Authentication
and Public Key Systems, Ph.D. Dissertation, Stanford
University.
Merkle, R.C., (1991). Fast Software Encryption Functions.
Advances in Cryptology-CRYPTO ’90 Proceedings,
pages.476-501, Springer Verlag.
Massey, J. L., (1987). On Probabilistic Encipherment.
IEEE Information Theory Workshop, Bellagio, Italy.
Massey, J. L., (1994). Some Applications of Source
Coding in Cryptography. European transactions on
Telecommunications, Vol. 5, No. 4, pp.7/421-15/429.
Penzhorn, W. T., (1994). A fast homophonic coding
algorithm based on arithmetic coding. Fast Software
Encryption, second International Workshop, Leuven,
Belgium, Lecture Notes in Computer Science1008,
pages 329-346.
Discussions by Terry Ritter, et al., 2007.
http://www.ciphersbyritter.com/LEARNING.HTM.
Rivest, R.L., (1990).. The MD4 Message Digest
Algorithm. RFC 1186.
Rivest, R. L., (1992). The MD5 Message Digest
Algorithm. RFC 1321.
Rogaway, P., Coppersmith, D., (1994). A software-
oriented Encryption Algorithm. Fast Software
SECRYPT 2009 - International Conference on Security and Cryptography
208