New Symmetric Key Generation Algorithm

被引:0
|
作者
Naiem, Ghada Farouk [1 ]
Elramly, Salwa [2 ]
Hasan, Bahaa Eldin M. [3 ]
Shehata, Khaled [4 ]
机构
[1] Natl Author Remote Sensing & Space Since, Cairo, Egypt
[2] Ain Shams Univ, Cairo, Egypt
[3] Arab Secur Consultants, Cairo, Egypt
[4] Arab Acad, Cairo, Egypt
关键词
S-BOX; AES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two extreme methods are used to overcome the symmetric session key distribution problem via non secure channel. The first one is to store all the desired keys for certain period and change the keys by its index, which will consume very large storage and requires physical update by the end of this period. The other is to make use of secure pseudo random number generator in which its length is long enough to cover the required time period, beside the limitations of the pseudo random number generator length it suffers from synchronization problem. The proposed solution is to mix the two extremes and find a middle way between them to gather only the advantages of both methods. FPGA Design to the proposed algorithm is performed using Mentor Graphics FPGA Adv.Pro. The implementation is performed on XILINX Vertex2P, XC2VP30-6ff896 and utilizes % 13 of its resources. The maximum frequency is 184.570MHz.
引用
收藏
页码:446 / 453
页数:8
相关论文
共 50 条
  • [31] Symmetric Key Algorithm Using Vernam Cipher: VSA
    Pawar, Bhagyashri K.
    Hatkar, S. S.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 412 - 415
  • [32] An anti-symmetric key algorithm for signal encryption
    Wu, Y.
    Vosler, A. C.
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND INFORMATICS (TELE-INFO '07)/ 6TH WSEAS INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (SIP '07), 2007, : 140 - +
  • [33] DES: The Oldest Symmetric Block Key Encryption Algorithm
    Sharma, Mukta
    Garg, R. B.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 53 - 58
  • [34] Enhanced Group Key Generation Algorithm
    Hong, Sunghyuck
    Lopez-Benitez, Noe
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 947 - 950
  • [35] Proper key generation for the IzoSign algorithm
    Szollosi, Lorand
    Feher, Gibor
    Marosits, Tamas
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 368 - 372
  • [36] Biometric certificate key generation algorithm
    Wang, Jinhai
    Wei, Ning
    Cui, Jun
    Li, Xueyan
    Li, Xiuyan
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2016, 48 (11): : 90 - 95
  • [37] New Key-Dependent S-Box Generation Algorithm on AES
    Das P.
    Munshi N.H.
    Maitra S.
    Micro and Nanosystems, 2022, 14 (03) : 263 - 271
  • [38] CHAKRA: A New Approach for Symmetric Key Encryption
    Kumar, P. Ramesh
    Dhenakaran, S. S.
    Sailaja, K. L.
    SaiKishore, P.
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 727 - 732
  • [39] A symmetric neural cryptographic key generation scheme for Iot security
    Sarkar, Arindam
    APPLIED INTELLIGENCE, 2023, 53 (08) : 9344 - 9367
  • [40] A symmetric neural cryptographic key generation scheme for Iot security
    Arindam Sarkar
    Applied Intelligence, 2023, 53 : 9344 - 9367