- Substitute bytes: This operation provides the
non-linearity in the cipher.
- Shift rows and Mix columns provide diffusion in
the cipher (i.e. making the relationship between
plaintext and cipher text as complex as possible).
As we have proven earlier in section 3, computing
the logarithm of a complex exponential using two
complex numbers is, under restrictions, a one-to-ma-
ny relation. This applies to plaintext binary represen-
tations and encrypted ones. In the aforementioned
algorithm, chain encryption is used between
and
1
, providing the “avalanche effect” mention-
ed earlier which increases the difficulty in cryptana-
lyzing a text encrypted with the above method.
Our encryption method is probabilistic, meaning
that a single plaintext can be encrypted to many pos-
sible cipher texts, without the consequence of size
expansion between plaintext and cipher text, such as
with the case of ElGamal (ElGamal, 1985). Perfect
secrecy states that a cipher text leaks no information
about the plaintext (to any, even an all-powerful ad-
versary). This is equivalent to stating that the proba-
bility that a given message maps to a given cipher
text is exactly identical for every pair of messages
and cipher texts (for randomly chosen keys) (Raghu-
nathan, 2011). The chain exponential encryption is
depended on a random first complex number. This
choice propagates to all exponential computations
afterwards thus, if the first random complex is diffe-
rent each time, same plain texts encrypt to different
cipher texts with no relation whatsoever.
4.4 Efficiency and Computational
Costs
Knowing that logarithms of complex numbers can
be reduced to elementary functions of real numbers
for a specific branch as we presented earlier, the
computational cost of this complex exponentiation
step is the same as computing an elementary functi-
on of a real logarithm.
Most algorithms compute elementary functions
by composing arithmetic operations. Some known
algorithms use Taylor series applicable to logarithm,
with O ((log n) 2 M (n)) complexity (Chudnovsky et
al., 1988). This shows that encryption and decrypti-
on algorithms for our method can be relatively fast
with no excessive computational cost. On a sample
encryption-decryption test we tested in our labs,
simple transformations of a simple plaintext abide to
the computational costs presented earlier (a simple
plain text sentence was encrypted and decrypted in
less than 0.1 sec (computer time) using open-source,
ready-made complex number calculators).
5 CONCLUSIONS
We proposed a method for implementing a secret-
key cryptosystem using complex logarithms and an
AES-like structure. Its security rests in part on the
difficulty in computing chained functions of comp-
lex logarithms in specific open connected groups
(logarithms computed using the notion of chain-
block encryption for the avalanche effect in the one-
to-many relations between complex logarithms and
their exponentials).
If the security of our method proves to be ade-
quate or our complex logarithm complex proves use-
ful in cryptosystems, it introduces a new concept in
secure communications and also opens up alternati-
ves in creating robust key-schedules or more. In this
case, the method could be utilized for hardening the
protection of critical applications or infrastructures
(Iliadis, 2000, Lekkas, 2006, Marias, 2007).
Future work on the subject with involve real-
world encryptions on relatively big files and tho-
rough testing of the proposed cryptosystem on nu-
merous attacks, involving semantic analysis, known-
plaintext attacks etc. in order to prove its robustness.
On top of that, the average computational complexi-
ty in cryptanalyzing cipher texts must be tested and
proven true, either through reductions in Complexity
Theory using similar, proven algorithms or through
extended testing.
ACKNOWLEDGEMENTS
Authors would like to thank Dr. Nikos Sotiropoulos
for his useful insight in complex analysis and the
complex numbers.
REFERENCES
Biryukov, A., Khovratovich, D., Nikolić, I., 2009. Distin-
guisher and related-key attack on the full AES-256,
Advances in Cryptology, pp. 231-249, Springer.
Bogdanov A., Khovratovich D., Rechberger C., 2011. Bic-
lique Cryptanalysis of the Full AES, Advances in Cry-
ptology, Springer, 2011, p. 344-371.
Chudnovsky, D., Chudnovsky, G. 1988. Approximations
and complex multiplication according to Ramanujan.
Ramanujan revisited, Academic Press.
Daemen, J., Rijmen, V., 2003. AES Proposal: Rijndael,
National Institute of Standards and Technology.
Ehrsam W., Meyer C, Smith J., Tuchman W., 1976. Mes-
sage verification and transmission error detection by
block chaining, US Patent 4074066.
SECRYPT2013-InternationalConferenceonSecurityandCryptography
578