Chaos based key expansion function for block ciphers

被引:4
|
作者
Kazmi, Shagufta [1 ]
Ikram, Nassar [1 ]
机构
[1] Natl Univ Sci & Technol, Islamabad, Pakistan
关键词
Chaos; Binary sequences; Chaotic maps; Key Expansion Function; Correlation; Weak keys; EXTERNAL KEY; CRYPTOGRAPHY; SYSTEMS; MAPS;
D O I
10.1007/s11042-011-0767-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Key Expansion Function is a vital constituent component of any block cipher. Many of Key Expansion Functions generate subkeys through the algorithms which are based on Feistel or Substitution Permutation Network (SPN) structures against which cryptanalytic methods have been well researched. In this very paper, an efficient method for generating subkeys based on chaotic maps has been suggested. The phenomenon behind the proposed Key Expansion Function is the mixing property of Tent Map. Using chaotic binary sequences, the proposed Key Expansion Function satisfies the specific statistical and cryptographic properties of chaotic generators. A new Bit Extraction Technique based on IEEE-754 Floating-point Standard (binary32) is used to extract the bits of subkeys from the chaotic binary sequences. The generated subkeys are then analyzed. The results show that the given Chaos-based Key Expansion Function is well protected and fully strengthened in all respects.
引用
收藏
页码:267 / 281
页数:15
相关论文
共 50 条
  • [31] Key alternating ciphers based on involutions
    Lee, Jooyoung
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (05) : 955 - 988
  • [32] Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
    Gazi, Peter
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 551 - 570
  • [33] On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers
    Lu, Jinyu
    Liu, Yunwen
    Ashur, Tomer
    Li, Chao
    COMPUTER JOURNAL, 2022, 65 (09): : 2454 - 2469
  • [34] Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers
    Cao, Wenqin
    Zhang, Wentao
    CYBERSECURITY, 2021, 4 (01)
  • [35] An application of genetic algorithm to cryptanalysis of block ciphers by partitioning the key space
    Borges-Trenard, Miguel A.
    Borges-Quintana, Mijail
    Monier-Columbie, Lazaro
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (02): : 325 - 334
  • [36] Key-Recovery Attacks on LED-Like Block Ciphers
    Linhong Xu
    Jiansheng Guo
    Jingyi Cui
    Mingming Li
    TsinghuaScienceandTechnology, 2019, 24 (05) : 585 - 595
  • [37] Key-Recovery Attacks on LED-Like Block Ciphers
    Xu, Linhong
    Guo, Jiansheng
    Cui, Jingyi
    Li, Mingming
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 585 - 595
  • [38] On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers
    Pehlivanoglu, Meltem Kurt
    Akleylek, Sedat
    Sakalli, M. Tolga
    Duru, Nevcihan
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 456 - 461
  • [39] Block Ciphers Classification Based on Random Forest
    Hu, Xinyi
    Zhao, Yaqun
    2018 INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY, 2019, 1168
  • [40] The security of elastic block ciphers against key-recovery attacks
    Cook, Debra L.
    Yung, Moti
    Keromytis, Angelos D.
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 89 - +