On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers

被引:0
|
作者
Chuah, Chai Wen [1 ]
Alawatugoda, Janaka [2 ,3 ]
Arbaiy, Nureize [4 ]
机构
[1] Guangdong Univ Sci & Technol, Dongguang, Guangdong, Peoples R China
[2] Rabdan Acad, Res & Innovat Ctr Div, Abu Dhabi, U Arab Emirates
[3] Griffith Univ, Inst Integrated & Intelligent Syst, Nathan, Qld, Australia
[4] Univ Tun Hussein Onn Malaysia, Fac Comp Sci & Informat Technol, Parit Raja, Malaysia
关键词
Key derivation functions; extractors; expanders; stream ciphers; hash functions; symmetric-key cryptography;
D O I
10.14569/IJACSA.2024.01506148
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to protect electronic data, pseudorandom cryptographic keys generated by a standard function known as a key derivation function play an important role. The inputs to the function are known as initial keying materials, such as passwords, shared secret keys, and non-random strings. Existing standard secure functions for the key derivation function are based on stream ciphers, block ciphers, and hash functions. The latest secure and fast design is a stream cipher-based key derivation function ( SCKDF2 ). The security levels for key derivation functions based on stream ciphers, block ciphers, and hash functions are equal. However, the execution time for key derivation functions based on stream ciphers is faster compared to the other two functions. This paper proposes an improved design for a key derivation function based on stream ciphers, namely I-SCKDF2. - SCKDF2 . We simulate instances for the proposed I-SCKDF2 - SCKDF2 using Trivium. As a result, I-SCKDF2 - SCKDF2 has a lower execution time compared to the existing SCKDF2. The results show that the execution time taken by I-SCKDF2 - SCKDF2 to generate an n- bit cryptographic key is almost 50 percent lower than SCKDF2. The security of I-SCKDF2 - SCKDF2 passed all the security tests in the Dieharder test tool. It has been proven that the proposed I-SCKDF2 - SCKDF2 is secure, and the simulation time is faster compared to SCKDF2.
引用
收藏
页码:1486 / 1493
页数:8
相关论文
共 50 条
  • [31] Stream ciphers based on the elliptic curves
    Nithin, V. S.
    Deepthi, P. P.
    Dbanaraj, K. J.
    Sathidevi, R. S.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 99 - 104
  • [32] Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics
    Ryabko, Boris
    ENTROPY, 2023, 25 (10)
  • [33] New Key Recovery Attack on the MICKEY Family of Stream Ciphers
    Ding, Lin
    Gu, Dawu
    Wang, Lei
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 239 - 249
  • [34] Fast construction of binary ring FCSRs for hardware stream ciphers
    Zhiqiang Lin
    Dingyi Pei
    Dongdai Lin
    Xiaolei Zhang
    Designs, Codes and Cryptography, 2018, 86 : 939 - 953
  • [35] Secure and efficient group key management with shared key derivation
    Lin, Jen-Chiun
    Huang, Kuo-Hsuan
    Lai, Feipei
    Lee, Hung-Chang
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 192 - 208
  • [36] Fast construction of binary ring FCSRs for hardware stream ciphers
    Lin, Zhiqiang
    Pei, Dingyi
    Lin, Dongdai
    Zhang, Xiaolei
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (04) : 939 - 953
  • [37] Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
    Hawkes, P
    Rose, GG
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 390 - 406
  • [38] Multi-pass fast correlation attack on stream ciphers
    Zhang, Bin
    Feng, Dengguo
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4356 : 234 - +
  • [39] Key alternating ciphers based on involutions
    Jooyoung Lee
    Designs, Codes and Cryptography, 2018, 86 : 955 - 988
  • [40] Key alternating ciphers based on involutions
    Lee, Jooyoung
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (05) : 955 - 988