HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption
Jayagopal Narayanaswamy, Raghav V. Sampangi, Srinivas Sampalli
2015
Abstract
This paper proposes a hybrid encryption technique that generates a key dynamically, along with integrity check parameters. Our approach generates the key stream using a chained approach, beginning with an initial pre-shared key. Subsequent keys are derived using logical operations on intermediate cipher texts and intermediate keys generated in each stage. This is an improvement over chaining techniques, which use a cipher text to derive successive keys. We validate our algorithm by proof-of-concept implementation and security analysis.
References
- Bardis, N., Markovskyy, A., and Andrikou, D. (2004). Method for designing pseudorandom binary sequences generators on nonlinear feedback shift register(nfsr). WSEAS Transactions on Communications, 3(2):758-763.
- Biebighauser, D. (2000). Testing random number generators @ONLINE. http://www-users. math.umn.edu/vgarrett/students/reu/pRNGs.pdf.
- De Cannière, C. (2006). Trivium: A stream cipher construction inspired by block cipher design principles. In Information Security, pages 171-186. Springer.
- Dubrova, E., Teslenko, M., and Tenhunen, H. (2008). On analysis and synthesis of (n, k)-non-linear feedback shift registers. In Design, Automation and Test in Europe, 2008. DATE'08, pages 1286-1291. IEEE.
- Engels, D., Fan, X., Gong, G., Hu, H., and Smith, E. M. (2010). Hummingbird: ultra-lightweight cryptography for resource-constrained devices. In Financial Cryptography and Data Security, pages 3-18. Springer.
- Hell, M., Johansson, T., and Brynielsson, L. (2009). An overview of distinguishing attacks on stream ciphers. Cryptography and Communications, 1(1):71-94.
- Hu, H. and Gong, G. (2011). Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions. International Journal of Foundations of Computer Science, 22(06):1317-1329.
- Hu, M. and Wang, Y. (2009). The collision rate tests of two known message digest algorithms. In Computational Intelligence and Security, 2009. CIS'09. International Conference on, volume 2, pages 319-323. IEEE.
- Jeddi, Z., Amini, E., and Bayoumi, M. (2013). A novel authenticated encryption algorithm for rfid systems. In Digital System Design (DSD), 2013 Euromicro Conference on, pages 658-661. IEEE.
- Jinabade, K. and Rasane, K. (2013). Efficient implementation of hummingbird cryptographic algorithm on a reconfigurable platform. In International Journal of Engineering Research and Technology, volume 2. ESRSA Publications.
- Knudsen, L. R. (1994). Practically secure feistel ciphers. In Fast Software Encryption, pages 211-221. Springer.
- Kumar, Y., Munjal, R., and Sharma, H. (2011). Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. International Journal of Computer Science and Management Studies, 11(03).
- Li, X., Zhang, W., Wang, X., and Li, M. (2012). Novel convertible authenticated encryption schemes without using hash functions. In Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on, volume 1, pages 504-508. IEEE.
- Lv, H., Xie, J.-X., Fang, J.-C., and Qi, P. (2012). Generating of a nonlinear pseudorandom sequence using linear feedback shift register. In ICT Convergence (ICTC), 2012 International Conference on, pages 432-435. IEEE.
- Mandal, K. and Gong, G. (2012). Probabilistic generation of good span n sequences from nonlinear feedback shift registers. University of Waterloo.
- Rachwalik, T., Szmidt, J., Wicik, R., and Zablocki, J. (2012). Generation of nonlinear feedback shift registers with special-purpose hardware. In Communications and Information Systems Conference (MCC), 2012 Military, pages 1-4. IEEE.
- Soto, J. Statistical testing of random number generators @ONLINE. http://infosec.pku.edu.cn/ vtly/oldversion/nist-nissc-1999/papers/p24.pdf.
- Wang, Y., Manulis, M., Au, M. H., and Susilo, W. (2013). Relations among privacy notions for signcryption and key invisible sign-then-encrypt. In Information Security and Privacy, pages 187-202. Springer.
- Wu, Y., Noonan, J. P., and Agaian, S. (2011). A novel information entropy based randomness test for image encryption. In Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, pages 2676- 2680. IEEE.
- Zeng, K., Yang, C.-H., Wei, D.-Y., and Rao, T. (1991). Pseudorandom bit generators in stream-cipher cryptography. Computer, 24(2):8-17.
- Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) lcost (signature) + cost(encryption). In Advances in CryptologyCRYPTO'97, pages 165-179. Springer.
- Zulkifli, M. Z. W. M. (2008). Attack on cryptography @ONLINE. https://idazuwaika.files.word press.com/2008/06/attack-on-cryptography.pdf.
Paper Citation
in Harvard Style
Narayanaswamy J., V. Sampangi R. and Sampalli S. (2015). HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption . In Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-081-9, pages 124-131. DOI: 10.5220/0005273901240131
in Bibtex Style
@conference{icissp15,
author={Jayagopal Narayanaswamy and Raghav V. Sampangi and Srinivas Sampalli},
title={HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2015},
pages={124-131},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005273901240131},
isbn={978-989-758-081-9},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption
SN - 978-989-758-081-9
AU - Narayanaswamy J.
AU - V. Sampangi R.
AU - Sampalli S.
PY - 2015
SP - 124
EP - 131
DO - 10.5220/0005273901240131