Chaos based key expansion function for block ciphers

被引:4
|
作者
Kazmi, Shagufta [1 ]
Ikram, Nassar [1 ]
机构
[1] Natl Univ Sci & Technol, Islamabad, Pakistan
关键词
Chaos; Binary sequences; Chaotic maps; Key Expansion Function; Correlation; Weak keys; EXTERNAL KEY; CRYPTOGRAPHY; SYSTEMS; MAPS;
D O I
10.1007/s11042-011-0767-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Key Expansion Function is a vital constituent component of any block cipher. Many of Key Expansion Functions generate subkeys through the algorithms which are based on Feistel or Substitution Permutation Network (SPN) structures against which cryptanalytic methods have been well researched. In this very paper, an efficient method for generating subkeys based on chaotic maps has been suggested. The phenomenon behind the proposed Key Expansion Function is the mixing property of Tent Map. Using chaotic binary sequences, the proposed Key Expansion Function satisfies the specific statistical and cryptographic properties of chaotic generators. A new Bit Extraction Technique based on IEEE-754 Floating-point Standard (binary32) is used to extract the bits of subkeys from the chaotic binary sequences. The generated subkeys are then analyzed. The results show that the given Chaos-based Key Expansion Function is well protected and fully strengthened in all respects.
引用
收藏
页码:267 / 281
页数:15
相关论文
共 50 条
  • [21] Detecting faults in four symmetric key block ciphers
    Breveglieri, L
    Koren, I
    Maistri, P
    15TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, PROCEEDINGS, 2004, : 258 - 268
  • [22] Known-key distinguishers for some block ciphers
    Knudsen, Lars R.
    Rijmen, Vincent
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 315 - +
  • [23] On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers
    Chuah, Chai Wen
    Alawatugoda, Janaka
    Arbaiy, Nureize
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 1486 - 1493
  • [24] A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance
    Asanuma, Takaki
    Isobe, Takanori
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (02) : 248 - 255
  • [25] A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules
    Pudovkina, Marina
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 90 - 101
  • [26] Key alternating ciphers based on involutions
    Jooyoung Lee
    Designs, Codes and Cryptography, 2018, 86 : 955 - 988
  • [27] Power analysis based reverse engineering on the secret round function of block ciphers
    Tang, Ming
    Qiu, Zhenlong
    Li, Weijie
    Sun, Weijin
    Hu, Xiaobo
    Zhang, Huanguo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (08): : 1531 - 1545
  • [28] Strengthening the Known-Key Security Notion for Block Ciphers
    Cogliati, Benoit
    Seurin, Yannick
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 494 - 513
  • [29] Parallelization of standard modes of operation for symmetric key block ciphers
    Bielecki, Wlodzimierz
    Burak, Dariusz
    BIOMETRICS, COMPUTER SECURITY SYSTEMS AND ARTIFICIAL INTELLIGENCE APPLICATIONS, 2006, : 101 - 110
  • [30] Towards Understanding the Known-Key Security of Block Ciphers
    Andreeva, Elena
    Bogdanov, Andrey
    Mennink, Bart
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 348 - 366