On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers

被引:0
|
作者
Chuah, Chai Wen [1 ]
Alawatugoda, Janaka [2 ,3 ]
Arbaiy, Nureize [4 ]
机构
[1] Guangdong Univ Sci & Technol, Dongguang, Guangdong, Peoples R China
[2] Rabdan Acad, Res & Innovat Ctr Div, Abu Dhabi, U Arab Emirates
[3] Griffith Univ, Inst Integrated & Intelligent Syst, Nathan, Qld, Australia
[4] Univ Tun Hussein Onn Malaysia, Fac Comp Sci & Informat Technol, Parit Raja, Malaysia
关键词
Key derivation functions; extractors; expanders; stream ciphers; hash functions; symmetric-key cryptography;
D O I
10.14569/IJACSA.2024.01506148
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to protect electronic data, pseudorandom cryptographic keys generated by a standard function known as a key derivation function play an important role. The inputs to the function are known as initial keying materials, such as passwords, shared secret keys, and non-random strings. Existing standard secure functions for the key derivation function are based on stream ciphers, block ciphers, and hash functions. The latest secure and fast design is a stream cipher-based key derivation function ( SCKDF2 ). The security levels for key derivation functions based on stream ciphers, block ciphers, and hash functions are equal. However, the execution time for key derivation functions based on stream ciphers is faster compared to the other two functions. This paper proposes an improved design for a key derivation function based on stream ciphers, namely I-SCKDF2. - SCKDF2 . We simulate instances for the proposed I-SCKDF2 - SCKDF2 using Trivium. As a result, I-SCKDF2 - SCKDF2 has a lower execution time compared to the existing SCKDF2. The results show that the execution time taken by I-SCKDF2 - SCKDF2 to generate an n- bit cryptographic key is almost 50 percent lower than SCKDF2. The security of I-SCKDF2 - SCKDF2 passed all the security tests in the Dieharder test tool. It has been proven that the proposed I-SCKDF2 - SCKDF2 is secure, and the simulation time is faster compared to SCKDF2.
引用
收藏
页码:1486 / 1493
页数:8
相关论文
共 50 条
  • [21] Secure key-alternating Feistel ciphers without key schedule
    Yaobin Shen
    Hailun Yan
    Lei Wang
    Xuejia Lai
    Science China Information Sciences, 2021, 64
  • [22] Secure and efficient pseudorandom bit generator for chaotic stream ciphers
    Wang Xiao-Min
    Zhang Jia-Shu
    CHINESE PHYSICS LETTERS, 2007, 24 (05) : 1166 - 1169
  • [23] Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream Ciphers
    Hosoyamada, Akinori
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VIII, 2025, 15491 : 396 - 430
  • [24] A note on the improvement of a fast correlation attack on stream ciphers
    Hosobuchi, Satoshi
    Saito, Tomohiko
    Matsushima, Toshiyasu
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2007, 90 (04): : 9 - 17
  • [25] Compared performance of fast correlation attacks on stream ciphers
    Canteaut, A
    Trabbia, M
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 213 - 213
  • [26] An Improved Algorithm for Fast Correlation Attack on Stream Ciphers
    Wanzhi Chen
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2126 - 2129
  • [27] Fast algebraic attacks on stream ciphers with linear feedback
    Courtois, NT
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 176 - 194
  • [28] Fast Discrete Fourier Spectra Attacks on Stream Ciphers
    Gong, Guang
    Ronjom, Sondre
    Helleseth, Tor
    Hu, Honggang
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) : 5555 - 5565
  • [29] Synchronization of Two Chaotic Stream Ciphers in Secure CDMA Communication Systems
    Alshammari, Ahmed S.
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2020, 10 (04) : 5947 - +
  • [30] The Optimal Key Estimation of Stream Ciphers and Its Approximation Algorithm Based on a Probabilistic Inference
    Iikubo, Yuji
    Horii, Shunsuke
    Matsushima, Toshiyasu
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 531 - 535